48aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfffffffffffffd4b, 0x10000}], 0x109000, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000140)={0x100000001, 0x0, 0x5, "fa07d63963a358215e87d1f3a1df341c532ee38d40dff20da5468a6e73a38259282e7f32c27372be2d8431ad6b74937157f6ffa472c2b5143bf5fca5", 0x19, "2a6f83e29eecbbc1666875f108391720273cea7c46425e54157829090f876467661486d30ca852a4cd3869f2a6c361e1bd07e401f2d6febfe211ad57", 0xa0}) syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x7, 0x200000) getresuid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) write$vnet(r0, &(0x7f0000000640)={0x1, {&(0x7f0000000480)=""/247, 0xf7, &(0x7f0000000580)=""/177, 0x1, 0x7}}, 0x68) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000100)={'ip6_vti0\x00', {0x2, 0x4e21, @rand_addr=0xfff}}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0xeeb, 0x13eee97, 0x8, 0x282, 0x2, 0x7, 0x3, 0x2, r2}, &(0x7f0000000340)=0x20) 13:15:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xc5, 0x10000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) 13:15:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 13:15:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) 13:15:36 executing program 0: r0 = socket(0xa, 0x5, 0x3) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e23, @rand_addr=0x6}}) socket$inet_smc(0x2b, 0x1, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x24a) getsockname$tipc(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000140)={{0x2, 0x4e21, @remote}, {0x306, @dev={[], 0x14}}, 0x6, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}, 'veth1_to_bridge\x00'}) 13:15:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 13:15:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 384.895169] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 384.914459] BTRFS error (device loop1): superblock checksum mismatch 13:15:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 384.984758] BTRFS error (device loop1): open_ctree failed [ 384.997603] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 385.017340] BTRFS error (device loop1): superblock checksum mismatch 13:15:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10080, 0x0) r1 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000000) inotify_rm_watch(r0, r1) 13:15:36 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x100) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000140)={@nfc={0x27, 0x0, 0x1, 0x5}, {&(0x7f0000000040)=""/44, 0x2c}, &(0x7f00000000c0), 0x1}, 0xa0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000200)=""/45) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10108}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x120, r1, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf86}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x544}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x55}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) [ 385.069241] BTRFS error (device loop1): open_ctree failed [ 385.078281] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 385.102862] BTRFS error (device loop1): superblock checksum mismatch [ 385.327581] BTRFS error (device loop1): open_ctree failed 13:15:39 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:15:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000040)=0x401) 13:15:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:15:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:39 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:39 executing program 2: setgid(0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000040)={0x5, 0xb8b7, 0x2b8e800000000, @empty, 'ipddp0\x00'}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0xfffffffffffffffe, 0x400, 0x2, 0x925}) [ 387.843089] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 387.875053] BTRFS error (device loop1): superblock checksum mismatch 13:15:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 387.909254] BTRFS error (device loop1): open_ctree failed [ 387.923769] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 387.931610] BTRFS error (device loop1): superblock checksum mismatch [ 387.970335] BTRFS error (device loop1): open_ctree failed [ 387.978533] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 387.986119] BTRFS error (device loop1): superblock checksum mismatch 13:15:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) 13:15:39 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 388.036933] BTRFS error (device loop1): open_ctree failed [ 388.053220] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 388.072531] BTRFS error (device loop1): superblock checksum mismatch 13:15:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:15:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', '(\x00'}, &(0x7f00000000c0)='@}vboxnet1lo/\x00', 0xe, 0x2) 13:15:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 388.151765] BTRFS error (device loop1): open_ctree failed 13:15:42 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:15:42 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0xfffffffffffffff9}], 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000040)={0x7fffffff, 'syz1\x00'}) 13:15:42 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x103002, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000140)={0x10001}, 0x1) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xaaaaaaaaaaaad2f, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10004}], 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x181000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x5, 0x7, 0x100000001, 0x4, 0x400}) 13:15:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:15:42 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x6, &(0x7f0000000340)=[{&(0x7f0000000940)="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", 0x1000, 0x100000001}, {&(0x7f0000001940)="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", 0x1000, 0x2}, {&(0x7f00000000c0)="d7f7e0831c5f62c482aa06d241e492b2", 0x10, 0x5}, {&(0x7f0000000140)="8aa6aaac6d8ee90323a01efe58df801d8e099c7d11352622e1abb4e602717f4dd0e042624536bddd8cacf8cc2bdcfd0e5bb8aa7bba3a11c6aa1ce8ea4cdaaaf1da9ce438e7e59b6a2b8285356cd746fdcee4c15b00323369e5fba905914ca8997f59557a084ddad00a119dc2b2aa64aa5c31cb6a24a725c77f8d6e8b6cc40110bb8c3ba24b6cef7362a0974bea1b87a5f220ff6dabf9b26b9c3f30692e186f7149a8136a8efe8643f0f180763fd11670a86a0f6a1941e632629a9e7d6a0799613eaee5fe7e394b1e1c4370", 0xcb, 0x400}, {&(0x7f0000000240)="ceede1764fa0cbbe6f177a8cf2be82a9227091ba85cff8ec4884590d892f6338227986612043847875ed62cb5334c6133fce5d721b1544fb15305bf982d8856d378aefb6a1c8ebca6fb5255b", 0x4c, 0x20}, {&(0x7f00000002c0)="29833f36714aa16eb45a73387c924d72da194f96752e370d5a015266556fe356f999de47883c4d352230da3c404ca22876d6a566e5963c574fdacb9fedbccb30a4e74010a4121022aeab90ea6cc6ec12caa5a51b54250cbb87b4cdbbe770dad676f5550edb7ad1b1e80a1a57", 0x6c, 0x7}], 0x100000, &(0x7f0000000440)={[{@session={'session', 0x3d, 0x6}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'btrfs\x00'}}, {@hash='hash'}, {@permit_directio='permit_directio'}, {@fsname={'fsname', 0x3d, 'keyringprocself&'}}, {@fsname={'fsname', 0x3d, '}'}}, {@smackfsroot={'smackfsroot', 0x3d, '*'}}]}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:15:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000009c0)="165321ffb98b7af6720bf393f847ca15b63ef66766916d9973a635ee9236f698ee54b2921cde8f97eac39e815e5caeda9e785347e13173ee72c1279fa73c6af3ee1145f4df92fd7b82cd0f2190213fc8c4fc6ebcee671dfa4c3ff0094cfc76697705ade440c8e40533d39f00c65c126ac7c2635e823905f00d521e9aeea83113c909637ae32794557eb7d689ab9a9f83e56f3e65287c0ab02634e6bc604a33039984a365b302b1daa24d294f243d13407e1b78e5c9d3bc48f6e1a224f292105d23b1bc68f22869d495196d11b38d6e09b010533ce57833db9dbb2399d23ea6b5f88286313a375e85c9ca57cb711aafb95bd80cdcf22e7621251944677859407d0f1849d2548915c023f13bbca593f7df3328d52e4409a1607a88fc6b8db950e23bad22912049ea8bba14021bbdebce843e375f49ce85dfa1e7306dfa4988c0b31a9fda72be6b837bb11003ec2cf1fe35bd5e55c7a4db62f5717cb054c694e40a421b2978886fbc331d660d46d87c828ce79d5af315abbd279d378f7ae20168a9f5acb9499c1d8460dc666e04b89c3ef731bb72566dd94408a2946bc56e7d222543f84790bea2f3b330806e0d497aabdc05bcbe97386c86faea154875da6140f3c3103d65bb2463b774a6364bf4bf213220b1367fec068470e740c31b6e758c36eb0001c0da708cc27150d0202fae0ca4ce607151897fa22608ac7b0c3e759ff86232202aa39555d6b2749fea6821cd6c413a8bf146b33c98410e941f4811aad01fb8ee0f8db7f1d49f990ceac1b2e1f717517a93590dd79f2fc0b4753a58407d91e8690f9b9d9751dbbcdbd5bbc07d8dd39d711389fedd8c229277b2ab80451588de5d0e521ed2d5016510a99b91a99b4839838f0af50930d953549f7cce1570e1992f76d1a443a8ea3cb9edd690dc072249f49b7b0f0cf62203061541238f2c0976af51e96b54c6d6b1b6fce6ad46e622b2b435f8db9c3ff32189ba09bfe423e2b2a1fe601d72b9cd89150ed2edcb08b5276ebf9fc014700a924024f326d3eb3b842c1aa7805c0327bec96fb50df871a529662a3de520b2f7580c306b63b1a52872c625533b59457331fc9f4952b61d14db17eafe5fdd4cb75598927c797ef01dfea37e1aaf88d1b1ae2048acb71a5ae072f5d487c1928f90c333df296767da7a9e83b5cab892a069878b2590ea119c559ec45c3d12bfbc6a2023532ffc3d8da61d6fc69c9fbe007e5d4e1c46a360783d5d0da218f47f4c5dfed19d62eb73e4486bcaa4d9f481c344db6f118b4a5354a740e2fdfbb0462ad9573603769744f6a6fdbcb207fe8abd0725ef32063f584c8b5e3e532d4c60c64287067d90cbb888024c2a3da5b50fbaa6006761378b4ccbc03ca6b6aa1e4410f15d03f8103a97c1b56f700bdd2321f1d67897f9c0311d04a6adda9af3eb89fe98938338ecd7333b69ecba24cd30995132656655ab163fb662e60aff92da35445abca6d7008a457a2e5141d20e611752f2eda08c529dab9ea2537d8f849e1f701275ca8ebe38ed055be232cf44138304df61e3638d350c363bebef0c346dde9a4de493c99b2fe374ce76c968f293e872300a0a8c74fc687ec7320fb67ad937ff0f137c962df0737f302c6c9b590ac91fe66ae9925044e28b36c3fe24b1b093b183f951a96acbc7e53c114f7e9b930122e7b42df2c3f4251893181045b0e48bad507ed89bb34b54e12ae96d91720021622c5330a10e3a6701c185dc3433aee5e90dfba0e3304dfb2d65f0b3775bedc62f4caa4bda88ec42b90ba90aeb1aea1943f5dc8ed81c4f5e267b55ffc40548b25fb04e8f6ae632be55ee1e22b30069708c72bb206f158f3a216903e56a1c059403cd70cb78c4cc92fba19c11e09322d122e5331293b22589e622cf6d2510e0a1472edbe47f9cb6a9922fc10d70b565c67a5cec914fc63fdb35a8011143478eb352cb4984dd1b524df84fe660c7c8d0e09fc7c99d8705f2ed867d6ab0296503aae9ae2f5c294e484b53f12500f45cec9959e2194912fab81e5d29b978c9dc4451fd380f1fe1947b681d83016d8d905b4f6c420a075cee0081cc3503dfade56fe40a0a9e9b1e3e14c4923f388c8585f14d7e60fdf1938c821faf6c8c29b528b4722ac47d0d2b2e84a1a36d48eeaf28a1179f8683adc272cde3e8b7c75c11e9a5a82169e50f9418759cea84b9a82d10650ef5e6b6cb20369ebac0a2185bc8681023168cd91d57fb615afb5e10b98f8860168561d168dbb35c8e476a11a8ef03b414a89a7d2cd3c5d0292f94fd6961109ade39dbb214d057cff2137feae6daa04eb6f8dfc2423d6605f63e1cb200a41d7dd20d0e7220856761cc7b4a91b96f29df22d28d6756ef24b19190dafbfa35c88574bd5f78be1a623b4ea73624f54508dff079bac67dd74807ee5a4919c6ad37bbde9ee1ccd8ba1077ef36944c6a602178cd80764d977b59577f48ff44b959861c6ff41d8735c90fb193f4bfacd3e68f4e1033e8499041d76f0e55736ab1db66bc65f623162677f7f569deb4bdc689422ac3fe53b47571b697e57701c70d0df57553f89f4180c3e06d57c6d3f14a1b2e32c83b481757da5a9d9f7c467e4c8e774df931122dbc4da4f78ebfeb1187147c4e8f6330acacf1c8f5159af175fdc3d91df809852856492224f6a58494c26fa9c3f98e886a1dfb021525e031a29de74411da29b4003257cca0276041021d1ca9b181a07ed9eae551fa5c6e185b724c92fa0107069ffb0914ae98b45f48200b166acda39943f85ad10ccd7e684494ababce594d664c154316243c965b5a5c0d3bea0daae866a9f40d5d6f3f1cf51432300118944a13d49d6e46ddfcb3b06e1e5d31061d247ab083115b05851ac0a12fd229a8f34d325b8af9f6cd380eeb348d1fb8ba9e0542f7bbf35f13ece0224a56e4929605095a11647137641a7ae074f27cda7f5d973b5fbfd7a40096fe5f77cf0c7bb1283939aae45c794d0b096f337543e977beae1f59ebd1469afc07d9c0b0b594ee16e6dd6e1ebeacdecc624d87e769813e61ee95bd6ebfbf0e7b5e2dc2d3d5b8b8e044548b5499bdd6c7f98d6a05f768286702d2572db8269b8570fb92a57dbf37e272e6b59d41e042c780c04a7500a6a39c843372c0d93edd2db2c9a931a5f5a4a855ad144f2ac31f4d684f1e35f962c7390fa8897c490d6259495cfe7a8b0ef81c1c08eb1155dad9b9d1d5643d1253d4a5fca003f94e00d7b7f8aee537a4d1ee6596e29412bf60023baa1005a90ec3a262b9cb09a391e8501651d5996b49fd569c6adefd0832e296a7394a826ccfb2120d53a1d66abbf180635f333afa0febcf9de4cd046f706b99bf43d246061e1daf9971c97a82546bcfc076ba4a9a32a9df9bd4d59650e03b254fb9ce6303da799342cb5c4e25b6a323df946f5a7c5cbc7adea26f599edc1685e26da949f0059df300f79c2ee6f1393a1c45451ce152f0993a95bf1ffc2447e68796f8100ff40c22678e1ed87e93577b333d7d832393f9af28c5da7d95e4d0e362c1743952f49f832c1373a8176550a451ef05366247d48b7c394200561c716da35b6679a82c0caf76f507ee3d0bb248f1154322f638145bda44f7a917a7e7b537ff18bafba1717487a98f3d651e8dde6b7f3ebbb078681009afcf0f20c7ce7fac71ade2d55657a83e0214d20a66a222b39d4d7cb36de7465c21273e45b199ee3413cd52972c1609f317945116ca75f1b47fe4011830c610fdcccd54747821a3deacab486952ec47e5ddcb908ab0f427057204254895717e9d9cdcc1c05c1abe9ec00961d757dc191119022e3043dcad8442e478566cb6c52c3aa1808b5f3f45438c79bb60cbcaae485aeeaaf142bf43ee6157a8c5a3e3230945fd3d962a7124dd81c465eca5d25a9ebe83493c54f34b429083470e0aac7fc8809ec742d43b179ddf5a0b2dca6f3b8e4e916fb87cb8f6dd9eee0cf66863ee225daba52f1d4e7ac9b260b9229cdbb0df0db7b8835685146700a8495ff0451aca34bdde68293eda46ba9e74b5133fa21fb1394b582d2928c8096f286de34e73c447ed2528e53f5cf389018a8e06418d43fd24218d458850e6e2f804f7681a7b9fd6aca71076ccb19bc5858d10dbd229cac8d671e55cc937f4b345179167a988b2c3dbd4c36d479c614ff571f5faa77ed23e73467db1dd7d1dd1fa0471c22679fedf1e719e9cdd9bf05688eb97731b5037f5b523d5f62fffbcfed614ee09aa65821df03e8b2c670efdbdc45a823f3725ee669422f33a4e51b84ddc41c1a81fb0fc0d17222553dad5b8ebd9744dabfead7665af84b97c0f575de3fb3c5e1e64aad04d6e8e94ff63408dd5aefd00038bcb7c41352938869982b74735844c1b4c0476ba8a4c9c5339e7d6dc39fb3dff74722d3dddd443b8cd8fca4cf001bb899ebbdc62b18f67c99acd842e8218547993c569cc352a31da2e317236abf7c2a2621cd23aa63cc874fabf50fe9cf4a668dca1252e1412c59d543731da81360579ebdbd999d7f638b4db76a9a2951a6de810e88ac695e63a668ffa39aecca8dedc41049ff97db8f8169f1190eb24913087cb1a919330343c148e921bd558a11b5d84191c0449299cf69a0dab67464067da5190434eae7aef7f546d8102e20cf0f3bed4c2ca27557f0df8ec11c1afb3989dc231caff3b486502015e179d642fe003712be718e63ae4f8c153e3d79e5b0728ccac04bef85fd0534352a1e57d74a0e42694107a7ecc54aaaa76037bac22291e76eac2f904c7a1909f7b775a234806ea7e3df3cc0520a97fd06b6e25571dcc2bc52c0a6ed16a0c20c0786b723b7880b767b622147165487f54f7e3d2f0ce949e53412989f22a924d8962c0f948fce5ec83a6d6e20d7c3b03789bf1d04e3649451b0b8d12e4302362dca47f19cb03febb5bd53078ecbdcb7ac383843b395baf206a8401c41b0afd806786f489ef1bf94a036bf13e3a41aa08c62957a062687dee864ee1f2752f86662e8fc0f17ed7a8106303531e2272e8361cb5bd7673d707977290133511a4065c8b16be0bc62076bf17c010e870d9e5439ef1b59f88fba3fc54a8219c3cbb3113f77d51baec8d65b28e4fcaf5fd838c3862410f654000b3d80915faa59d7206a3fb63c3e0bd6ecb48cf73f7da1b2a1a7b65586651ce70f40597f5a2a350be9cb9d72e4e6a61b63c30d5967a78fc656a70604d4d1a6f3b7b0b82e4f7583ea9ece1020c3e19563ceae0a2c9fcb4d68f7ecb355f3efaf586fb5a5eb0e4b4b75134099342e8e2d10abfe800f86d3fa24cfabe3060d301311f7d9280c5a165a21e98f9ab35ba2f32fcfe113c3cbea800e37ff840b784917e9584d6ec2899065000defe40f704d8d668e169c95fe8b9e9aee362dcd732560bebbfb8f8edcae8055dd877315564891f52b4489c128a91ed09baa66d1b01e29df6a841daa954401cadee73d5b9c60e40a358271570ad6bc6d8b2cb21a3e597fb5367b742d19e7970ed03e0a6e344f17230f471adcbe022fa1c7fff8f0d257394560b8d799a723222812c1bda7cf5ca80af7465307e0d89dd35b65d0cbb05edc669de08ddda5572d8cdb9aec20133cb8f101fa2a0935f7524935497580588eb3b7f5b60ca65c3017b771f1e47adb96242fb707a97527ce9d461d00575026840009d3685150b663fa9af6dbb369cd20e7ab1d7e548a3da12cbeb9eedf18f07aafdc79a515365c5b1d29231085a00b1cd8d6382077dc30ba7828c04579a32c7530f20adfd745772ccea0c11c0065bf1fd5909a71b8e2865b7a6d0d89bfbb591", &(0x7f0000000180)="731ecc9dd6a59beb8a212c62a5f0fd9741abadcce78f81c6b5b49d2c5a2976bd91df76f763229a4c3ee15ae194646fa464cabb95f0c1eb58241f95635ab7c97ac86601c000f1c601780b154e19eb930a16234e8982e30c07c4ca0d901b7ec624abc80e511a49440e49aedb5d75f27a2c1b6d58a8cf53f564051cefd16773cc42e829b89b38fce82b3650fa1ce5455906c82ad3c23fdf2b96f28476adfe88d23700076f3af5cda7711aa733c46dc9f63ccd0b1b8f8362a5141fcd0984b6424af5bd59ca3ffb19bcb7cca0f930a85ee7", 0x1}, 0x20) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x7530}}) 13:15:42 executing program 0: restart_syscall() syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:42 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x141000, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x8, 0x6}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 391.229545] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 391.276552] BTRFS error (device loop1): superblock checksum mismatch [ 391.338992] BTRFS error (device loop1): open_ctree failed [ 391.350319] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 391.367800] BTRFS error (device loop1): superblock checksum mismatch [ 391.428552] BTRFS error (device loop1): open_ctree failed [ 391.444517] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 391.453548] BTRFS error (device loop1): superblock checksum mismatch [ 391.498815] BTRFS error (device loop1): open_ctree failed [ 391.507681] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 391.515513] BTRFS error (device loop1): superblock checksum mismatch [ 391.682089] BTRFS error (device loop1): open_ctree failed 13:15:45 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:15:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:15:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:45 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x400, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "826d2dd447d2388f60c5f6aba105309158265b3f5eb04cd17eaf1ab98c37a0502f5d5cb8857ef51ec4d05575faed790a7ec264798b51eefb80a7e6271630b6e23b4cf0cca3ca9f90fa7a9984d49e5c211f4bc039bcbce122f7da6a51c1f57145e2e35e3ef6214040f944ac0033c3daa3c0b495f498bd3218672ac65d208f7a9b659442c446f5"}, 0x8a) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10) getsockopt$inet_dccp_buf(r1, 0x21, 0xcf, &(0x7f0000000100)=""/202, &(0x7f0000000200)=0xca) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x289, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) 13:15:45 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8003, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299648aeb81e1b0035a757b9b0e1d4eebe289d3a8b40da83f14d644a45c2a35700164a6085ac949ce81147000001fb3900130000005f42485290315f4d", 0xffffffffffffff05, 0x10000}], 0x0, 0x0) 13:15:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) 13:15:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:15:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x3, r1}) 13:15:45 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000180)={0x60, 0xfffffffffffffff5, 0x7, {{0x8ce, 0x0, 0x745, 0xfffffffffffffffd, 0x6, 0x4, 0xfff, 0x4}}}, 0x60) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400, 0xc) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 394.237997] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 394.248009] BTRFS error (device loop1): superblock checksum mismatch [ 394.291962] BTRFS error (device loop1): open_ctree failed [ 394.304955] BTRFS error (device loop1): unsupported checksum algorithm 22813 13:15:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 394.334886] BTRFS error (device loop1): superblock checksum mismatch [ 394.384731] BTRFS error (device loop1): open_ctree failed [ 394.396723] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 394.404419] BTRFS error (device loop1): superblock checksum mismatch [ 394.451115] BTRFS error (device loop1): open_ctree failed [ 394.479213] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 394.498394] BTRFS error (device loop1): superblock checksum mismatch [ 394.665107] BTRFS error (device loop1): open_ctree failed 13:15:48 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:15:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:15:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:48 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="3d0000006f01000400360400000004000000000000000000004003000000070000400000000000020000000600050000000000851e3d24c6f65fcb0b0697d2487d9c8f014f31edd986a2d449cc07"], 0x3d) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000000)={0x7fffffff, 0x7, 0x3d10}) 13:15:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x8, 0x0, 0x3ff}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000440)={r1, 0x7fffffff, 0x46, "d29d51430d2bf896f0c51ec452de0c27159a593101c78122ca54552c99054f8ccc30628c96a7b73eb96a6bc5506584c4637b2c13781360cd09b045f367e2404613d09d1c0b19"}, 0x4e) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000040)={0x3, [0x40, 0x7, 0xca4a]}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x4, 0x4) 13:15:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfb49, 0x8, &(0x7f0000001580)=[{&(0x7f0000000140)="62215f951b523d49bab556fec0761880216f1879ec036692a3246abb9d6bf5d7f2bab760d3934be8214a9b4e4339b854c6f4e0ce9d6826446f4346752f84e6032546f3cdeb00c60f9e77e48beab28ff1e3f06511f0c6a74a52990a97d181196281c565026e07cdae1bf7bf604130b9cc556d9620f100f3fd1b1f116159e488a3f6a4cd6e3236c6d36e04cb5df35e3d7cde60240b5a7527db43ad18da19d827e6d9f47088b6e67dc4eb56ce5f5adcd842a1df074c4084ee003efc5a2bd2d5ff7c83f6d43155377ab2", 0xc8, 0x8001}, {&(0x7f0000000240)="1070b24c46ef010e2c221c4860c06ad60e9ac92dc632362e484ec30ad0660944c59b80b17fc127002f61bd63df97c329397c3b2e24e80c53afaa6ab68f9ce2bb20a408b78ce4f7cf8aad424644cf260a51d2519b6589c8b3e7a8e2318bcec02a2680cba0a1f1bd03378f97637395b1d79f794d052858dce6372e11e4e4aa4216ee19f5eb648c6b7bc7fa24c15bfd3160984bd8496d59f4bc2db3592d46af506fdbc6b768c476b00415919ea7ca6c06", 0xaf, 0xffffffffffffffff}, {&(0x7f0000000000)="962592f5b7c73f7ac5fa467e990d20f3910312ec0c6d97704e9f8d0cb4f5c73b13ed0e53bdf66dfe34a161a83d439d56589a614b246e3657aaf489ea21a4d3748a8d6be9676d79fdbf889528d8", 0x4d, 0x10001}, {&(0x7f0000000300)="7afbf0e2406298ff567f8c7c279250e083de8310f4a0d8222a32fb960236679b3bb6bad6eeb9b37f3e5b1debdf171c343a6f6d98eee3ba03757c727cf0172fe359f5043e03deec7275aa1e9975933deb417273b06a65579d9f323778f98671afd991e577ac58c541a985ddaed1554cf6c7c7c33fc5feaf559c2c67bb917ea6323aad0c637583354829ae4620d1c5ba9adadc1fa0781137dbaf00fc", 0x9b, 0xffffffff}, {&(0x7f00000000c0)="273c994bb4ac98fba064d4", 0xffffffb2, 0x8}, {&(0x7f00000003c0)="3bd98377bcd96b07243cad42a00bed13699ad42f9109e89dd6bffd88543f059efd7b9d118dadf8a5253f0fcf7ff906631745104b724f59c18d552703ad178ba9dc2297d090aa", 0x46, 0xff}, {&(0x7f0000000440)="035b0f89922e87a1aa1e0fd9f7da51064bbd0e2632c23a9502ab290769b878817c56be9fee1d5165629143747e579add3afa386e3f9a19450aeaf234b6f2636d1f39f27d27723c1bf7adcbcb6ca414afb52b326177b84bbb92db9eacac49814b33931ecfd66080c7bc904116e3d6aa132d0a4503d0850c108fb92b8e8af0fdbc002dd33ea8801666fb3536ce1d682d087e3ac12c217dd1ce130cff6a00e67072caad9d6578b3e4c2081adb94e448c88bf3dc3b3c72afcf8a38c7476c10f6d374304c63315f5df4087cec09e6f0588e24e3ffce263faa58030c5f32bc2ee9ec8adde86ad592cebb6052d36bef603f5bbfbeccdbbbc05087e0f76957c22e0525b5fb070f6f2ef5229f569482c6bb1839e1f0117b021b964073ad17b6802796675dbb4185493a1fd08e53f818273c0a1921bfbff315f7897e9d8ad0c79b1e73e084ffdecdadf8cc0503ac7864eff33f888c46e3f9b200fdbf67cd9227c7bc4ee47748b581b1eef4e0dd0c725e7c2fbc3d212356bd50ca6d63b72e58ccf7d0b9c564c7ad48a121bb65242cc3f39bfb23dfe17604a250b124702e95df8e2bd25b6b0cf4f0b06c4bbaf3640cff4d71ddb151d5ca674ccf9df1ad6a33b8f36d795cf521513485c01a208125d72f8f0f3050bcd12486e890991bef73afaf27b6f354ce115a2b287d6d607c1ebea7390edbce61fdc2b9986bd1acf4a4b018f789916b6798590a818754bcf0ebb5cfc975f529e86bf0d58a862c08612ac49342c566c7054c4b8ae5ab94247ede4a6d143fd4679c065a36df96d7e71876b39207e8a735117d3805cf3f8747e3402ae0f8ca4835fe8a6121769d3da36bd246f86f81e256968ce7556d8ce1889e6986dc6b1ea20d55303456dbb474288ae289357ac834a83eb978e2f5ac6d1cd2c54872cc4b4e6b96ff5eff1b883b3a01700f1ef8aa8e5e91fe1a6981c9c3ed4067db61abfbd0e70b2137275228259676853faaacf9bb5ffc8468e83622301eb86afb75ced744236f222b96385646263110de02bd19002e0dbdfef8c49110af82eba8e67e441f215c4c4c1c5849fa3e2f902abd113af54b412caa601f101fb56ffdbe8cacdbd25af65a759447f337244629b3fd3cda6cc99e18b85407eae32010de17ce7a321ef4ebe94b1ab12556ec288b3d7c294228c0f279eec50b726493476a4a1f82672703f5d04914c0908f0f28dbaa82a227d06debfa917091a4936042c266c8be2b991c38869d6358892221fc4b803c5c93b5096b1072b9a016d345b6dddaa15db6d34dc9fd786bf7ed36ebba5d96100eeabe2ff095de2cac1454413eaee9730eebe916ead7e2131b82c782540dfa03296749b55e53d7b9d9401d057482f79e27dbb6f88120db2638018f93d5e7c2c86c9f90098736d074375912ab4b5ed4d29eb83ddf0f83c1a14975b681dd18ca371151a08b2e513dfd88a303eda33b90772fefec47210b93f72fbc01cc20a3b5b2f92537c77b478ffb546113b8491d58420c6d2b289bc29fa1e5a006d293c08e3e856d86ec06461574971f85d20ae633778b05108abeb4338630dd1e5937f88241a813d38f9c4edaca9b154c80fbddaa73f89851b8d9dbcf1bf6bdadf58a0755a98e25f29f698411830eecada10046b9957b31fa5210c546525077fdecbb6a6fe18905ebe4cb020248ab7f34192ce53e8fdb5620bcb951b755c9eab7c01384a658f4f14280a3d22d4f9ffd0a65ebdbea6522cb749ee693a9b36d4e69a7e7fdb871665b84f4b2f902d0d3a61e62591e5a8e14bb0b2609e636ebfd7394141c5a7dcc7c2c17cede2aed426b0c62f7e8b97a7532e238abad65798f25ad397a73e3e63c70ea4ee8cb8af4ca1a60daba361c1884893d49a7eaa7dec7529b8845c92720155c0c9b38e59abb6333f54f88be3ca60c83a48fe33953626dbd925eb46335a345b1815151b66914529750938d56f5842f1d7a6dc9e912e222bdd23993a9aedae74e6461efd19230d605dadebed4a1d5cfdbac1ade89b59ec2a964d9d62c3dc3e2d7a4f2eccbff8b52c4b50b45570689f149b109e0b51416c3d93a8e5df4d667e0b6abc40bb64ac148fa5d4afa827a4d65848e0d7b06413586d9c21f06b16c1847f8d8d5dfaf584d49c941931f84c19f162839a94df22b65fabe0a92d8c0f02e6879d2eafbbce712e30051b4d2c205ce8bb8664302a6c03e09c4328eb705e3bda3dc7c9797fe841f53d042b3adfd6a810d1827e3cf09a7b02dcbaaf4b0a1f9e585241946d0deba1c15216547d3a39dfabfce9aebabbca63b04d8e9772da08873b85d2330bd347750ea10c18001f0f3acd3349ec8725d4961440f981cb4300ca87e545442e911780e3783d18b82b101f1e654798cfcb2703315760bac727e62e05a3d629820249e2935e22e37e4bc60b54fe7e82eb0a1ff86bc2fe20e423dda4731051c40a62e90dfb1d925ba8a3a9f4a5f7907639ee78666b805a753d502d823db8a762d77ff17c5447286631f4d6a019478f32ae5a5f5ab9dc1c62d4f8af3a3291c141e744ff5731079f323bebdfe7f09be9a8fa34c733ddcceb811c857695ec27cfbe6e7d4d410de06cf977a93ef48df6f511a7e2aa8378ca139e99baab6dce8699c1b95c90b7884d3ea0d4dcefb88f9402f4050b614a61988b579632e216a76ece569c9d5a9e9a6103be160e71bfea59a96cedd23ad0675984a3bf3e4d72f1dbd838694fc52147ca4ea5353d1499131bc9dfc2c91ef4060d20b1754aad2174ef2efb172966dd3660bc6946bae256f63ffcc45d273860ce7c840e39a1960a567d0393ae41ab6521d0cc3706538c20964ac73e62ab811b29d8412b96339148698c3dbf73430175d6c92e3652776d7a7ff88a455b62c9eda6ea94c5d905d104cd8386ae0f6e530486f53cc0c855513e5edda26f4d48965b94c4a0850189524df36b483a646ee0ebc373918b39442a5cee2518a76ed280a5ae9a025d548e6ab3641b84430cad677f100ce35596d5d49cc042213e90dc02e06368e65c2cd3dfd6301cc2a2afd37c9f8a66b3d883c68fdac23dd2fe70f8a14b2aed89ff3e643a4beda21322dcd614200d7b84bf8385e66e44744a053903bad7fe026989af44cb6ceb64b036edae6ae0561c619dfbbf2a491e5e8de9a6d18d171ac5082f435f322ddcc862f8a7949c4711da84841d48ec633d90599ab972e7cfa61b62977a171e0405eb9ef5cf7a3c648356f0f956b652afada1250d8a9a5642cd4783f55e4895731e56221c4795556d4bc9de03019f0125f34c1661b82f66bed7852610e495f9d45ea0a1bcc23646917927205938ab8df84593e18218dcc54c6c1de8dedb56c668158597e017604ed4ecd70044423b2e83faf35e32ad6bf8215b3c7fc84e3610072e91841883802343e802ab22480ccbd07229c5bce777175a5c65f7d05e0a5c7bf281ec316bce49af2b87d6f1a86d68b842e2c3cb1587599cfa210a1e7a2ee3a4f4ee460361c9cb33253ca33e668f0d4af0ee58c5325ef8cc78e173f7c0edc5d1b7dca51a77017027882e831e2db50f2c87863550cad2750390968e33b26abbee3f15d8c2ea8e942f89f4c097c48ea0312fcfcb51beee7e3271b418764403e7c78edcac4c26f1678cb379b0caa0409f8ba31b1a7f33800623d9cfc807b4a7a9679306dfb4b35384888fa3bc3c6460c6802f25df045843517079ba42c69cc9f3f784734354d52a42ac059a544b4648c146609fcae352d14df5bf719cd95a133ffc1781915d90f0608f16880d381daf647ee4d0f0d15129ebc8189887acbb9a5abf4bca642a2bc862dacdfdf1211478573aa10b394b03ec63e8492dd53b801310dcd3c725c0687cf67999ed76a0f44ecbb3f7161cd6df64aa2eac0b88c00246654d67c39108a8beee83333cba07be50b8880f8adb2613284c9b05022db18257f0fcdeaab90236ef02727f255601c998d90062891b01c695569221e38e6fec8ffb9b95e006a90029cec45ed35214256e4d06261cc6532db4188251cb98f429e26e7c541603c213dfd7180e5e43e550a10ae707fc9199379b133aa3f23b36438274dc6bbe1bae8e94b7e4c77ab3997cff69a198a970ddff2b6d1fe3998fa293ebbbef9c82ac1288b84e89cf8d84ae785b4933482de3498cf7af48043ca8f1de0773c32f869db317a7bb54ef38f1b058399290532d4c7cf6f114dee8b6cccc77eae06cb038fb40ab52c150cf49721766ae971bc021f9d32c60ae51b619a5b4d71445fa458b3ea06702b89221473dd0ccde16d7772d70888fb0094ae92b0d08021adcbb19ebbc46e45cc76812dc03c61efb1043df9265ce99907c0c938943c030bd4dcdeea88c7cdb81d87bcec511f4fef9dafc89eea53907f8f647a5d2db2301eb4004d2cb273d549ddb90a0d4e9c6a9390ee5f29966de9488e377be8c91f6501c8f49fcd0bf7c17dbbaad3f6499ffc4f3c394ac271fca8cfcc72998efe0f79d64b6f87e44e5a7cf56b8209994643ff323776efab701efa28edc18499795495621b2dc3a27d296ad01703eebb0691d62948792e90e9ae6066918351f220f8e8a4c211713a68211a7499d2a694d0213154921410c8b2c5e21f95870d26c22cc3a96aaae9d618f9ac39cefb4e9b351b3544b933acb466c8fca52cac13ab8f3e96b278d6291db479c40e28ac738ea4c218059457dc64336c03348451095e80783e92fc7e40b0552de4b800a15ea0a3a381efc6134e40b7f6be175a084875795243b544732b01af75de7f68c29746fda8983ca734f8fbdf13a65a128d092ce866c1eaa25dd80bbabadbda70b629d148e6b9f291ce1d317e286117e6dec80bdc4868fb09f5974a2d02ff44bc1260ceb040665ea6add153498035bd7d909ec32888e1261afdb750e7925bf79a6ea768d7cf5ea6108bad8dbb10a31c03c243116f6bcafd770f350f4ad197ace4defafc2cb8c7de3edc9b09474714d145970b3f8ff95fec128bdd3a89da5066073180e571aab2773d9f2cc80ab0c8272e4f3f192b52fbac80eb2b15909743785a7aa0a2c794c22fdb7e08fde583e8d65c1738e05a6c40c60c605a6c193d222f499045a180f6e32804b981604d88f4ee9e1c03f8fcf015c54f6b6c012abe67eaa17d1dbb52861f2523bbe503093770de14175548167dc9450758d2b4bf4d5972d193baca694a5572efe056ff67a353e39a3aeebd0e4cf18dce70b8a5f94be07f9fa2cb1a2a2c3705aad194829dbe828ea9376f8d80e05f1a5ff4da83c71fc91276889eec5f931b711479264ebdd1dae92f165670883cd0269ab059b8857d8e5fc6d6b88cb16bbb0637c1d2a70cf3a1641f7e6cf80ba68e134ec6c1ea63c43d7f534e3151828e2c966202364d5984033e278bcaf93a060ccda50041aaf17481e02b1c0a46aa017c4426ae7b14c4f0fed4fbab6dc09baf3985414cb8711ffff782a802ab08018cc0d2db1c280d31fb5cb7b756b708cd44a04ed2ed8f9a59fac2c3e9ecb838133235cef9fc20d2c927639496b428acfae93898fb4cd9997dce46998b87a5fa0a2e835e9ce4bd0521c382ddc3daf23a42a8dd52f03090ac2d4c5c5485f8db92618f3bb8a11cb0709cb7633b87e718456d6ee27c78d6d344f77b3eea51407d6d36191c064e57efb9976d7adc9f80b58753207ebdcfed85e00899ab4b9f58e79f56412e61f4b7e1d7e0e695743d8fe295d41967c4fbce0b00a90b385d777f4d1d39720534c1201a0b6b9881ba10f21159d963b446941a521edfb57c9daccef4a2c899ac1d59528efdbb959185a36e2e7ab174fef3545bbec6e65c9ce3b2f6", 0x1000, 0x1}, {&(0x7f0000001440)="dd5500b934d03d19b4423a026078d35eb857b2e7816164e8373c28b27fbcddedffb5994b2221f0122905e38a0fdfb6ba2412b06a0d9fbe0f3756ef41bc181317044abe1d66a5a2b1c36700664af58fbef750d64343f2cb6e097b733126d0e10b7290", 0x62, 0xffff}], 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001540)='/dev/zero\x00', 0x101580, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000001640)) rename(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='./file0\x00') 13:15:48 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x108fe, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x2, {0xffffffffffff4692}}, 0x18) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x80040, 0x0) 13:15:48 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) write$smack_current(r0, &(0x7f00000000c0)='btrfs\x00', 0x6) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5254e705, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199298a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) 13:15:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:15:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:48 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x21, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,sq=0x0000000000000006,debug=0x0000000000000800,rq=0x0000000000000007,rq=0x0000000000000000,fowner>', @ANYRESDEC=r0, @ANYBLOB="2c6673757569643d63773638753777372d377166322d353835392d6335397f2d3d3d3566323933312c636f6e746578743d737973e00b0000752c00"]) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000380)={0xffffffffffffffff}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000003c0)={0x1, 0x5}, 0x8) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 397.322351] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 397.337868] BTRFS error (device loop1): superblock checksum mismatch 13:15:49 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000001c0), 0xffffff01) setsockopt(r0, 0x65, 0x110000000002, &(0x7f00000005c0)="c8d63f23", 0x4) close(r0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000200)={&(0x7f0000000040)=[0x1184], 0x1, 0xb6, 0x4, 0x389, 0x5, 0xc1, {0x84, 0x10001, 0x7ff, 0x7f, 0x0, 0x1, 0x3, 0x800, 0x401, 0x8, 0x6, 0xe90e, 0x6, 0x7, "f4a150a7700fd1935a6c183d929bcf14bd5165b2a841a606deb8fe1df258f36b"}}) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000280)={0x7c8f, 0x1}) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r3, 0x7d8}, 0x8) [ 397.368002] BTRFS error (device loop1): open_ctree failed 13:15:51 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:15:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed000000000000000000000000000000000000000000ecf6f2a22997489bb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d0000000000", 0x48, 0x10000}], 0x0, 0x0) 13:15:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:15:51 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x41fd, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x8000, 0x8, &(0x7f0000000040)=0x5}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) 13:15:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) futimesat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{}, {0x0, 0x7530}}) [ 400.136964] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 400.144754] BTRFS error (device loop1): superblock checksum mismatch 13:15:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) 13:15:51 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/106, 0x6a) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 400.193182] BTRFS error (device loop1): open_ctree failed [ 400.215427] BTRFS error (device loop1): unsupported checksum algorithm 22813 13:15:51 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r1, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa13a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4048081}, 0x40) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000640)={&(0x7f0000000440), 0xc, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="08a0073e361701004000000000002a", @ANYRES16=r1, @ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) lsetxattr$security_capability(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.capability\x00', &(0x7f0000000700)=@v2={0x2000000, [{0xfffffffffffff4cd, 0x6}, {0x6, 0x4}]}, 0x14, 0x2) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xd0, r1, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x762}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000001}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8724}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6d1}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x80}, 0x40000) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 400.258124] BTRFS error (device loop1): superblock checksum mismatch 13:15:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f00000000c0)={0x4, 0x2, 0x3, 0xfe40}) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000180)) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000140)=0xa3) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x400, 0x81, 0x3, 0x7, 0x5, 0x800}) [ 400.342970] BTRFS error (device loop1): open_ctree failed [ 400.355091] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 400.363266] BTRFS error (device loop1): superblock checksum mismatch [ 400.402921] BTRFS error (device loop1): open_ctree failed 13:15:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:15:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa8, &(0x7f0000000740)=[{&(0x7f0000000140)="b0d6dd7c91c183867593730766247224d6d168ba8ed4fdd3f60b17d0a042a8e38604db789a56452dee5ed0a2568696e7bafce3bfa794fb7a0c5eefa349673e82e9ffbcb65e6c7a4a710e44ad819374f604f004e17be5771154dd3cd187e9b5583e0575a9bf69d10662db7fe9326329431fd5ddd2e653cb92e01511d351f054fd05508c65d329813cfe8e96af86e0ae98ee2618c523e6d5d9879c65ef3bafd9e7810f60e6baa6089f158914a5142ed7c5cfded96d36abd203d2960f9b1d7697b4c7afca67c855a55344e63977a7a8a08a8bca2027025278aba09a2329ede75d6e1a878e4c8d09e0d35666", 0x0, 0x2}, {&(0x7f00000009c0)="752bfb1c0604bd779639a5429b2ee5b156648c66ceade260cfc4ddc1f14b0344931593f23c4b13306dde5e8c846197eacd3034c6956ccf1c73a8a7d2f07396bc0ca7afc1665d737a1145ca600ab8e24d00abfb8685931094bf5db15ae64696b04ad7f2024491de601bbbe2a1b04b818f6809dff1d5d10566c004f2287c73398cd078b5be3575f58a146462b5798d2bac", 0x0, 0x1}, {&(0x7f0000000840)="36c325bd56f3b85cdf51", 0x0, 0x2}, {&(0x7f0000000340)="4dd033033ca4a65824a2ca795b96f261c22fb6e861d576326471a928466d7d89bcf631daf5ec55f0d4c4c0c04a54a0787561822b47788971051fba37d0215ea54886a924e46768e06e1ecaad9687aa7832e7a94db4bc5b80db9bb3394840279f89d839e472d4d6ca5997b6d2e237d6c8bc807bf2aa3e15f30d83b76fa4dc00c6babd105b0bb88f8369b87423c608f27b768e0a79a1ac74fa7c4761b4b6", 0x0, 0x6}, {&(0x7f0000000440)="1a172d9e795d2335fd57ec243562010af0f77a8f793d06b45395237dd5cd9bd2c2d0f76c8dc669b485cb0772d322210714d42152f82397b4eea9c7107e91a534d05ffa3d6748120c036263545bb7bae84b6047279004a0312a7e4a6926666e259575a15c9c07baa363f6c6bce1fa51c77732a8965d061db0f06deacf9e94b7a09eb9147ba70e3013fa4cd05808a5289404390b2bcea6ab148cdd35b58a49b37380447dd9fe6bf3e3b80d20ec3cf80c89d37d568ff83442b083700f46de212258269c", 0x0, 0x2}, {&(0x7f0000000540)="e856b1b32fec68bc38a3b5a4c6ce61a4e60a6dd8579ef1895f05c4bd744b0c14f820e6003165b8fc95435aa390bac79b71a98c9fa07bf2d710c6fb89c8d56b958a", 0x0, 0x3}, {&(0x7f00000005c0)="7aa8a3c974792a3abbce825edba49c39d5a9d1f305a4d56135f5", 0xffffffffffffff9d, 0xfff}, {&(0x7f0000000600)="8120b9a50099fc745132afa668acbfee832ce92d21bec53bb8256396a8661c06e5170a796a77dd759a2517c5a02eae48d38b8b25c43a1209c6d8c0546c2b25ec348e09ff344257e178c39c0112f9c111a03df7f381f6d3aad491bc3314d746e4f45dcd6588efd6e5bc6a5ba22130e550246bd6af529714f8da489fa62bdd23ce3635549f3866aa6dbd6ffb", 0x0, 0x2a1b}, {&(0x7f00000006c0)="d2d276950a832d9dcea1dc8be99cc7be7113a8e409e25511287779658719b6445f7fcf5a83e66912d00be478ac1c2d739d686da9554a206476b2786d3d504f45e9dc7348ee2fae3391a2973c021eacbd293fdda889578cf144013b7f475c6111848b03d9cd4fda4ec8b654ab7548b161fcb0b1520e", 0x0, 0x5}], 0x1000, 0x0) 13:15:54 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:15:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:15:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d010000000000000000000000000000e3ebf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x100800, 0x0) 13:15:54 executing program 2: prctl$PR_SET_THP_DISABLE(0x29, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:15:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 403.256809] print_req_error: I/O error, dev loop0, sector 128 13:15:54 executing program 0: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000180)="8da43623c0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000142485266535f4d", 0x3a, 0x10000}], 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x100, 0x0, 0x0, 0x351, 0x6, @remote}, 0x10) readlinkat(r0, &(0x7f0000000340)='./file0\x00', &(0x7f00000005c0)=""/254, 0xfe) getresuid(&(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000240)=0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380)='bcsh0\x00', 0x10) mount$bpf(0x0, &(0x7f0000000080)='\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000440)=ANY=[@ANYBLOB='mode=00000000000000000000126,mode=00000000000000000000676,mode=01777777777777777777774,mode=00000000000000000000001,mode=00000000000000000000003,mode=00000000000037777777777,mode=00000000000000000000011,mode=00000070000000000000011,mode=00000000000000000000001,mode=00000000000000000000001,fowner<', @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r2, @ANYBLOB=',smackfstransmute=btrfs\x00,\x00']) 13:15:54 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x220000, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000040)={0x3, 0x1, [0xeb2, 0x5, 0x80000000, 0x6, 0x8, 0x400, 0x1, 0x2]}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x18) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000020}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0xa08, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x6, 0x5, 0x9, 0x2, 0x3}, 0x14) 13:15:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:15:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:55 executing program 1: setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb570000d93fdebbe8b9f6ecfaeac882ce032ae7b2b38ecb3bb42b049acab0d6334cb93538f1e69c4906523b79c58c930e15ae2d0769d0c8ec43329d177ab9d1790e1b613d7753a70368587555c49d00509c003a5f486e"], 0x57, 0x2) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) [ 403.654489] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 403.671837] BTRFS error (device loop1): superblock checksum mismatch [ 403.713503] BTRFS error (device loop1): open_ctree failed [ 403.724532] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 403.732465] BTRFS error (device loop1): superblock checksum mismatch [ 403.820972] BTRFS error (device loop1): open_ctree failed 13:15:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x20000, &(0x7f0000000440)={[{@xino_on='xino=on'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@nfs_export_off='nfs_export=off'}, {@xino_on='xino=on'}, {@xino_auto='xino=auto'}, {@xino_on='xino=on'}, {@index_on='index=on'}], [{@uid_lt={'uid<', r0}}, {@permit_directio='permit_directio'}, {@uid_eq={'uid', 0x3d, r1}}, {@context={'context', 0x3d, 'user_u'}}, {@euid_eq={'euid', 0x3d, r2}}]}) mkdir(&(0x7f0000000540)='.\x00', 0x91) r3 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) accept4$unix(r3, 0x0, &(0x7f0000000500), 0x80000) 13:15:57 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:15:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:15:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000140)="c8fe96a014cbec9e7263ed974306026edd6ec911458f2fa6e9c80ae1ec426c7e5ce3a2cb56aedf12862ba0b78a41d148fce1160b0a2f8908ed0efdbedff1587eb3137d4e836119d930040b50762a43c5b2b0c11002f85779cf0add3287c39fd9faed7c3769de66ecb12d2aaea114b0dbfa9b65efc94939ef19d36c444227c8b0055eb341335d9622cfe61e65", &(0x7f0000000200)=""/98}, 0x18) 13:15:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:15:57 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x8, &(0x7f0000000640)=[{&(0x7f00000001c0)="0cefec5b489dbefc6207a1facf72b4ee02c0d8e9d7c3a9d9b89eab023f2805668cb2dcc5b59eb462943d913c6d9f7f5409db2120a2df8372663ea9d473eb375f36b1201205f7ab8da37b4833f9b63e0e69b3973cc7ca06a5ee7dbab7329832454203367bb57a5df5159fb1e39457cbfc1595e917f9a04aaa27c8da7150dcdcdbaf7e98bd9b0cc05ce4ed1cb919c9186e88431709c10432b1a08da97860e1cae24cd0794d451ccfc7092d87f46f6b180e89ad", 0xb2, 0x3}, {&(0x7f0000000280)="b685b572e226d68cbafe08c76845e6b76ff38285f6479c4120298b955e894a0563271f0fef52c6316522eba29c5705d28e97874fb74ea0836cb0ff760c15c0c95ae5909647229af6de51bc90172123de", 0x50, 0xfff}, {&(0x7f0000000300)="1b15dcf2a428477852eddcd10b5d0973ca77ef52d6ff7eb10341331fde45ef52c8ef13c6b7a94683ea25c6f6ab1ace95b6bb0062f238f3222b5641535bd40883cec5391194946a4b6bafc0d21ea5b651c3d8c3d72e4f2457b79330cdf4819570111ef05fa42fc102a8cc9e85e57a0abd2567ce62574361935885629c41f0dfb6693bef07effe5e04409d2fe84fea2dc21006ae32ebfa3f74c1cf6e9d146b4f96317aa26342c76afcbfaee44d97471626ca20450dc3533c1bffbeff94aa1e3a4ac724f825ea1bae7e103ffe8f53d13d499b25c9ac6493ec725d53b8d0d507e1c828283aa95d08fd37", 0xe8, 0x6}, {&(0x7f0000000440)="87f5c4f43e2b3c2fa5f73d84cb63a37c42390d2def38a133333924c8f059ae2ff70eedd9fb32b8155c2a7048807832c3b33c03fb0f4447c4ed6281bafdf91ed67e03dacc4c85f7cffbd025de2ce0baaa5586198f5cd18ba30a7e5643f50567c4f4df1663f80ef79c0b463b2174c020658f3a9a9b6db0e7edd059f7bb353480337136c6bda4c1396c533f166c1ddaef562bddc84752d4be820a68cc7199fc", 0x9e, 0x1}, {&(0x7f0000000940)="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", 0x1000, 0x3f}, {&(0x7f0000001940)="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", 0x1000, 0x9}, {&(0x7f0000000500)="f9b1b1b60ab505ce5539226af20c2556cdbb9d5851a037026d1686f9f8bbc6ef91b9c7", 0x23, 0x3}, {&(0x7f0000000540)="0dcc4d7cfd096bc286ecd1983816302b0b4855daeaf7861ad4a9574dc7d1f8e1a5c1b19ed32d5c9e6f0f756c9a5dd49677888c0e0483c45e6d83e759bc55fc8b53f99f32f184554cb50adef020a772307c12d47cc0c4bbf1ea67427f68cb794440cfcff8ef244bb9b1e6e2b596daa2f16331351529fcd1244cf5060bc1f9865ea02d68246b83c85d38168a97c85bb96baa8bfc7683de7d0061565bb102f5f6e4efa186f3e8006130692a027fdc7da7c55073ed620aa7962dcce2b41ea298a0eacbe2c45b8fc3cae509433185c3572328ba62aa539749c8d6", 0xd8, 0x1000}], 0x184000, &(0x7f0000000700)={[{@show_sys_files_yes='show_sys_files=yes'}], [{@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x30, 0x7a, 0x65, 0x65, 0x77, 0x77, 0x37], 0x2d, [0x62, 0x33, 0x35, 0x7f], 0x2d, [0x66, 0x73, 0x36, 0x64], 0x2d, [0x39, 0x77, 0x7d, 0x75], 0x2d, [0x35, 0x65, 0x62, 0x77, 0x37, 0x77, 0x37, 0x77]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'eth0%md5sum'}}, {@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) 13:15:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x521000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x42}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x800}, &(0x7f0000000180)=0x8) 13:15:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:15:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 406.302237] BTRFS error (device loop1): unsupported checksum algorithm 22813 13:15:57 executing program 0: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 406.347820] BTRFS error (device loop1): superblock checksum mismatch [ 406.402410] BTRFS error (device loop1): open_ctree failed [ 406.411255] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 406.420042] BTRFS error (device loop1): superblock checksum mismatch 13:15:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 406.516961] BTRFS error (device loop1): open_ctree failed 13:15:58 executing program 2: 13:15:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x45, 0x6}], 0x40, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x8, 0x723507ba) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@empty, @in=@multicast2}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) [ 406.688103] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 406.698802] BTRFS error (device loop1): superblock checksum mismatch [ 406.745431] BTRFS error (device loop1): open_ctree failed 13:16:00 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:00 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0xee0}, 0x28, 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) 13:16:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000000c0)=0xfffffffffffffffd) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x800100a, 0x200, 0x3}) 13:16:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:16:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/241, 0xf1) 13:16:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 409.299450] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 409.314308] BTRFS error (device loop1): superblock checksum mismatch 13:16:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x9}], 0x4, 0x0) [ 409.377710] BTRFS error (device loop1): open_ctree failed [ 409.399454] BTRFS error (device loop1): unsupported checksum algorithm 22813 13:16:00 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x3e, 0x0) write$nbd(r0, &(0x7f0000000000)={0x5000000, 0x0, 0x0, 0x0, 0x0, "a3ef41749fa527ab78fc57f180bd82099cbab35a2fdbede5fbb11bedfb1f8cd557b0bdfcd7f42f63af872a0a11e32f7a0ebebb02f6b78b1ea580f6ba185947306a8404425fc78b343624c6c5e7be78ab9406a3ea21ad8514"}, 0x68) 13:16:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000140)="b800008ee00f20c06635000000400f22c0360f01ca66b96403000066b86f00000066ba000000000f3065640f011a7ef8660f72d4820f20d86635080000000f22d8baf80c66b85079b48966efbafc0c66b8ba8e000066ef0f20d86635200000000f22d8", 0x63}], 0x1, 0x0, &(0x7f00000001c0)=[@efer={0x2, 0x9d00}, @vmwrite={0x8, 0x0, 0x7, 0x0, 0x5, 0x0, 0x7, 0x0, 0x2}], 0x2) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) 13:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x3, 0xfb) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bond0\x00'}) [ 409.442358] BTRFS error (device loop1): superblock checksum mismatch [ 409.488286] BTRFS error (device loop1): open_ctree failed 13:16:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 13:16:03 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c12") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) 13:16:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x5}], 0x0, 0x0) 13:16:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x405, 0x0, &(0x7f00000000c0)) 13:16:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x4, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000001c0)=0x100000000, 0x4) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x40, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="f1e41da2812fd35a7a22fc5cac512727891f4a6f0d689311b3f1b9678847a4347655584e248a826def", 0x29, 0x3e48}, {&(0x7f00000000c0)="b1dec3d1c2dc8ef0603b1e4dd5217edf6eb338a1e6b8123d5a8892ec8e80ac8f3f1fc25618bbe8ee30f47bf26d26a99779a5d7b9017d47e9f2fa786aa8649b90e75274409e6d0355d664b6d9f37fb71a90e4b5fdfd3e8c9e1f5565ee0690c1ee167455dd9267555e0dd650030c93886ce7dce01c7c6caf287e49b5a0f94e03c75128ee6cd60d6f267d005ba7bd2730effe731da5b475acd1491dc38f90e7448fff1b946111", 0xa5, 0xff}, {&(0x7f0000000200), 0x0, 0x2}, {&(0x7f0000000240)="38670ed71408", 0x6}], 0x800, &(0x7f0000000300)=')\x00') clock_settime(0x7, &(0x7f0000000200)) 13:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd8137e540afbbea3) 13:16:03 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10000000000010, 0x0, &(0x7f0000000080)) [ 412.414783] ceph: device name is missing path (no : separator in /dev/loop2) 13:16:04 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000140)=""/181) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) 13:16:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e23, 0x8000, @rand_addr="456d01cd5a9a4ef575a302a362703b64", 0x9}}, 0x2d64, 0x3}, &(0x7f0000000600)=0x90) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000640)={r1, 0x2, 0xbc, 0x9e1}, 0x10) r2 = accept(r0, &(0x7f0000000000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) connect$netlink(r2, &(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x2c000000}, 0xc) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000200)) ioctl$sock_bt_hci(r0, 0x400448e2, &(0x7f0000000280)="8ce5233daba344c554a3954483e81ac082b07ca8cf54fb231334a2ab9ee9d2f037de2bc1b812b58d567e12b6a289309273376fa73fd0098eb1e321968a678ce52a11ead340a8fd5a1a696d4138291fcae30c0fe9d15ac1fcb54587d3ca26e27d4b99d9d2be805206fbe0ce46874e71325f862f16f0e17cf19b2cf58bbce1122d52d595de0e8b085cfdeaa7d8d9c694b3a5117cb5f7e63e1c88a79a8f252cc10b72ccd92c8cefbfab8fbfafb69a3157214e46663a57c7e23d0da3a655dfceb12f6447104adea85a74032923d3351616ac6726db432044817d") ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={@loopback, 0x78, r3}) 13:16:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319b") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:04 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x1, @pix_mp}) [ 412.703884] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 412.729473] BTRFS error (device loop1): superblock checksum mismatch [ 412.795788] BTRFS error (device loop1): open_ctree failed [ 412.803748] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 412.815015] BTRFS error (device loop1): superblock checksum mismatch [ 412.857302] BTRFS error (device loop1): open_ctree failed [ 412.865701] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 412.874250] BTRFS error (device loop1): superblock checksum mismatch [ 413.017355] BTRFS error (device loop1): open_ctree failed 13:16:06 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x15) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 13:16:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000340)={0xffffffffffffff9c}) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000380)=0x6, 0x4) sendto$x25(r0, &(0x7f0000000140)="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", 0xfe, 0x800, 0x0, 0x0) 13:16:06 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/nfsfs\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 13:16:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x1, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x6, &(0x7f00000000c0)=0xfffffffffffffdbd) r1 = geteuid() ioprio_get$uid(0x3, r1) 13:16:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x4}, [{0x2, 0x1, r0}, {0x2, 0x4, r1}, {0x2, 0x6, r2}, {0x2, 0x7, r3}], {0x4, 0x2}, [{0x8, 0x3, r4}], {0x10, 0x2}, {0x20, 0x4}}, 0x4c, 0x2) 13:16:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319b") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:06 executing program 5: 13:16:06 executing program 5: 13:16:06 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x15) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 415.443489] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 415.479618] BTRFS error (device loop1): superblock checksum mismatch 13:16:06 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x15) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 13:16:06 executing program 5: 13:16:07 executing program 3: r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = semget(0x3, 0x3, 0x400) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000140)=""/208) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 13:16:07 executing program 5: [ 415.542402] BTRFS error (device loop1): open_ctree failed [ 415.551648] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 415.570915] BTRFS error (device loop1): superblock checksum mismatch 13:16:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x8000) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x1e, 0x18, 0xe, 0x17, 0x2, 0x7, 0x0, 0x12f}) [ 415.623138] BTRFS error (device loop1): open_ctree failed [ 415.629056] audit: type=1400 audit(1555420567.061:138): avc: denied { ioctl } for pid=21489 comm="syz-executor.0" path="socket:[75407]" dev="sockfs" ino=75407 ioctlcmd=0x6612 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 415.717957] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 415.727188] BTRFS error (device loop1): superblock checksum mismatch [ 415.790315] BTRFS error (device loop1): open_ctree failed [ 415.799365] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 415.811262] BTRFS error (device loop1): superblock checksum mismatch 13:16:07 executing program 5: 13:16:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0xfffffffffffffffd, 0x4) [ 415.933872] BTRFS error (device loop1): open_ctree failed 13:16:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319b") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x20) 13:16:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x10, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000180)=0x40) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x280, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e23, 0x100000001, @dev={0xfe, 0x80, [], 0xa}, 0x1ff}, {0xa, 0x4e21, 0x3, @mcast1, 0x7ff}, 0x1, [0x0, 0x10000, 0xffffffffffffffff, 0x0, 0x1, 0xd214, 0x4, 0x6]}, 0x5c) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, 0xffffffffffffffff, &(0x7f00000000c0)) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:16:07 executing program 5: 13:16:07 executing program 5: 13:16:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x6}, 0x28, 0x3) [ 416.159235] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 416.185960] BTRFS error (device loop1): superblock checksum mismatch [ 416.295728] BTRFS error (device loop1): open_ctree failed [ 416.407810] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 416.416736] BTRFS error (device loop1): superblock checksum mismatch [ 416.456094] BTRFS error (device loop1): open_ctree failed 13:16:10 executing program 3: r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd0") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:10 executing program 5: 13:16:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000040)}) 13:16:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:16:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) 13:16:10 executing program 5: 13:16:10 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000080)='\x00\x00R', 0x3) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 418.622157] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 418.633278] BTRFS error (device loop1): superblock checksum mismatch 13:16:10 executing program 5: 13:16:10 executing program 5: [ 418.694557] BTRFS error (device loop1): open_ctree failed [ 418.711913] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 418.728510] BTRFS error (device loop1): superblock checksum mismatch 13:16:10 executing program 5: 13:16:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x40) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8022}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x4, 0x70bd2d, 0x25dfdbfe, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x814}, 0x4000) [ 418.776203] BTRFS error (device loop1): open_ctree failed [ 418.809029] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 418.838167] BTRFS error (device loop1): superblock checksum mismatch [ 418.926314] BTRFS error (device loop1): open_ctree failed 13:16:13 executing program 3: r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0xfffffffffffffff7, 0x10000) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000001c0)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) renameat2(r1, &(0x7f0000000280)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffd) 13:16:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd0") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:13 executing program 5: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) 13:16:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x64, 0x2, 0x9, "34d664053dea36989a1e2429621516bd", "55359a04f103dea6b5b0f09b5efa440660b4e1d25626efc4e31887edfc2d10c8da4fd49585f9b57798774e127e9f89dd3c4d750440c35aa8b5a335a3a46b90f78c951197e173f449d0862c9129b4c2"}, 0x64, 0x2) 13:16:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x1, 0x4) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6, 0x1) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000140)={0xffffffffffffffff, 0x3, 0x9, 0x400}) 13:16:13 executing program 5: clone(0x4105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 421.697382] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 421.717702] BTRFS error (device loop1): superblock checksum mismatch 13:16:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd0") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 421.760375] BTRFS error (device loop1): open_ctree failed [ 421.775046] BTRFS error (device loop1): unsupported checksum algorithm 22813 13:16:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfd14, 0x10000}], 0x0, 0x0) 13:16:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0x59bf07bb98da0ef9, 0x8002}], 0xfffffffffffffffe, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x1) stat(&(0x7f0000001680)='./file0/file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000340)='ntfs\x00', &(0x7f0000000380)='./file0/file0\x00', 0x573, 0x4, &(0x7f0000001600)=[{&(0x7f0000000440)="5652707117a18eca334c1be0b36181c1a7427b3ca1a9d414e4e3b7b33c6ee34cfe80b4601fdfc64209d2c1ac17829c0b5f1650f83ea5fb4048edae267207d262799ceae3930acde73c7b9aac6dd08d7f3a2303ebc7b8a5b6ae266c8c9b15087eb9f37df093eed8c2332f1658c2cbdd2648f8743e4ba54994d660718526cd698733c60e8cec220a37d51b24913711a0d3d95c3f801c12b11afcba69ae1d5fb8404966105c8c2eb05582f91c11a984ca3172b59805fce8e8f571bfa635e592edfb7c9424b55900", 0xc6, 0x2000000}, {&(0x7f0000000540)="6a0f3bff3dd5fb4d9aaaa035e3dfbbf0d1473c90865e862c884c07308bdb2c2686e91b3c551f8e47ce5bb52e896958979abf87b8a628bf011571aaa761d6e493f179913048df0bcb4af229605274fbb2716fc41eb5d588452ff0fa579522120a7e017a8fedd6a48ebcc210ddc81103b9494a275d44e3e576e088cc4a9c6ae87936653a39c9a5d1d83f5a41621dc028de35680a4c7b99780dd516", 0x9a, 0x6}, {&(0x7f0000000600)="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", 0x1000, 0x7fff}, {&(0x7f00000003c0), 0x0, 0x5}], 0x2a000, &(0x7f0000001740)=ANY=[@ANYBLOB="6572d8726f72733d72cfa2201baeb17aca4dd8d1", @ANYRESDEC=r1, @ANYBLOB=',pcr=00000000000000000036,\x00']) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x58, r2, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7e36}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x10000}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}]}, 0x58}}, 0x80) r3 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000017c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r3, &(0x7f0000001800)=""/142, 0x8e) 13:16:13 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) r1 = dup2(r0, r0) accept$netrom(r1, 0x0, 0x0) [ 421.803103] BTRFS error (device loop1): superblock checksum mismatch 13:16:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="8da4363ac0fd0000000000000000004d01000000000000000000000000000000ecf6f2a229972caeb81e1b00920efd9a000001000000871f000001000000000000005f42485266535f4d", 0x4a, 0x10000}], 0x0, 0x0) [ 421.911287] BTRFS error (device loop1): open_ctree failed [ 421.926116] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 421.944784] BTRFS error (device loop1): superblock checksum mismatch [ 422.165086] BTRFS error (device loop1): open_ctree failed 13:16:16 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:16 executing program 1: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x81, 0x80) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000140)={0x7fff, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}}, {{0x2, 0x4e21, @remote}}}, 0x108) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 13:16:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) 13:16:16 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) bind$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x2, {0x41, 0x0, 0x3}}, 0xffffffffffffff48) 13:16:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$rose(r0, 0x104, 0x0, &(0x7f0000000000)=0xb1, 0x4) 13:16:16 executing program 5: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='nfsd\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 424.745800] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 424.755977] BTRFS error (device loop1): superblock checksum mismatch 13:16:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80800) getpeername(r0, &(0x7f0000000140)=@can, &(0x7f00000001c0)=0x80) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x44200, 0x0) [ 424.805234] BTRFS error (device loop1): open_ctree failed [ 424.815594] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 424.823204] BTRFS error (device loop1): superblock checksum mismatch 13:16:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x20) 13:16:16 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x105100, 0x0) socket$tipc(0x1e, 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0x1}}, 0x20) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) 13:16:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000040)=0x100000) [ 424.951243] BTRFS error (device loop1): open_ctree failed [ 425.056770] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 425.066664] BTRFS error (device loop5): superblock checksum mismatch [ 425.098396] BTRFS error (device loop5): open_ctree failed [ 425.108148] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 425.115524] BTRFS error (device loop5): superblock checksum mismatch [ 425.179026] BTRFS error (device loop5): open_ctree failed [ 425.193872] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 425.201798] BTRFS error (device loop1): superblock checksum mismatch [ 425.309489] BTRFS error (device loop1): open_ctree failed [ 425.347551] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 425.355032] BTRFS error (device loop1): superblock checksum mismatch [ 425.400811] BTRFS error (device loop1): open_ctree failed 13:16:19 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x20) epoll_pwait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x2, &(0x7f00000000c0)={0x9}, 0x8) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x78aa, 0x7fff, 0x0, 0x8, 0x3ff, 0x8}) accept4$alg(r0, 0x0, 0x0, 0x80000) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000140)={0x0, @bt={0x1cb0, 0x81, 0x0, 0x3, 0x9, 0x5deef3bd, 0x1000, 0xfffffffffffeffff, 0x0, 0x50d6, 0x6, 0x3f, 0x6, 0x1, 0x7, 0x10}}) 13:16:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, &(0x7f0000000400), 0x2, 0x0) 13:16:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400200, 0x0) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x20) 13:16:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x2) signalfd4(r0, &(0x7f0000000040)={0x146}, 0x2, 0x80000) [ 427.831131] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 427.848814] BTRFS error (device loop1): superblock checksum mismatch 13:16:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 427.901316] BTRFS error (device loop1): open_ctree failed [ 427.916454] BTRFS error (device loop1): unsupported checksum algorithm 22813 13:16:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x31, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0xd4, "c75dd3877c7d75941a59703ba6e099a289d9130fe07b8f2ef796876ce0f3781f6af1a20a5200d3241ec5c78b6b8ce8728bbfa95c2d19e6629730c31926bd1829a2e871c9cc4621d0cdb5e25475416e4f49e22220aeb1deb8c1539ee0c8678dc30cbf1e6e6b3dc9e9df26b3dd13f7c3a2d5c845dc48f1123cd2850742108978c6e63fdb6f7152ac919c87376ab457ff4144c6b1225292b339f3c09b767365743e5f045f17c32327fdb64301d939fefec7e66359f10e39fdf914b693ddce907eaa5d560fc1f751c0303398333aa0136c14e1366751"}, &(0x7f0000000040)=0xf8) [ 427.950995] BTRFS error (device loop1): superblock checksum mismatch 13:16:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 428.001889] BTRFS error (device loop1): open_ctree failed [ 428.011917] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 428.019454] BTRFS error (device loop1): superblock checksum mismatch 13:16:19 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000006c0)=0xe8) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x6, &(0x7f0000000500)=[{&(0x7f0000000140)="731dda8006b2c7c5f2539a0b47dad8358f8f2c061ad05f801e10eda7fae563bd790bea575a63ef61ab398a64e00ffea56e683c35f8c83b6a5284b09a6fe1b00b076c3aa0cd79d21d545877", 0x4b, 0x80}, {&(0x7f00000001c0)="c2a60000cc4dd972403e8c516feca8c029e428250d85643533645586ab7a0f72262f819840f51c888b888a12a0a0bad426de74c544ab0f99c0f3468fb13fd8f3af848d99724334f6b4f9f23c1b3d608e8dcde66d5a235fae6e9d12f170487dbc4779dce3393210e1f1bd5ce8052ce3ac5010b5631acfe474a974d6", 0x7b, 0x66}, {&(0x7f0000000240)="ada801a63b64a5f0a9da96cb8d4e5849e2c3639509eb50a1ed64bdb770902650459259a298c2f3058725c9d29cc3171275fd8459b28b002848e7a492df34a5f6e7e08b680d25cd9b437cf5e21aa2328a77c338c5b18842f133bbc986d25ad2743da5456ef2ff315e61973c58d2bc0b07a0b172ae9cb859d6ac286bebd1993301183a758f3d35a3e2960fb06d4f8904d48749cb4e075b97fd8d15cc4263b3be3c35ed00f3632afadcf28c6e8791902023a393f6f0acaa4e529d0b2da347b29d1e2172c5f5fb572409a8d8fdf01c526dff633f8956c782aed590917fceddd6af098e08d53e6730f1b1d238b00a805438fb51a56fda", 0xf4, 0x6}, {&(0x7f00000000c0)="a64f25d9fa3f62c1f6b17cf9def71c6a598fabb4e8631ffaae38d8ecdc5a5d32950cd1", 0x23, 0x1000}, {&(0x7f0000000340)="ec1860ca31f6d095856709b580a04f05f5dec124c89a8226700384378252c74194051677233c3c8ab4b7df324b9840be00d6e48f61f7fbd899dcc4c17d1fb6cecd712ab2585db32fbac3fb0696d9368ebf7cf420acb8bcf09783a0ec06cf2603cdf486a9729d985f2655b345bc69166a3371c315cb3daf0a22e475f0c5336b181108776d26a552156976bf52e10362d068452fc1664fcdfb73a8532e65d25db556bed8abfa1d19cff27799", 0xab, 0x4}, {&(0x7f0000000440)="fc53bf971d52394c3cb1ca9554d31ec23952a9b206fbbc8ef33e09a2bcb79c2ce1aad63901ed79f06e2dfb6356e384b181ed4a85c4ea1ea64efb81eaf70baa1ecf101add1d44262c9816afa82b14081abaecbf62f23f6f2dcae3c4b4e2ef1b34951d11abd2b3ceb878eaa73efd370b21c26d74d94fe54140e7f8e0f6297c4d75e5df3c974a31385cb9866db03e3068db6caf1cb04f44ba5c405aca686f57bc322ee222e98303", 0xa6, 0xefa}], 0x2000000, &(0x7f0000000700)={[{@check_relaxed='check=relaxed'}, {@nocompress='nocompress'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@obj_user={'obj_user', 0x3d, '%'}}, {@smackfshat={'smackfshat', 0x3d, ')self'}}]}) socket$unix(0x1, 0x3, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) 13:16:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x3, r1}) [ 428.203693] BTRFS error (device loop1): open_ctree failed [ 428.346534] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 428.363902] BTRFS error (device loop5): superblock checksum mismatch [ 428.426160] BTRFS error (device loop5): open_ctree failed [ 428.434054] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 428.442231] BTRFS error (device loop5): superblock checksum mismatch [ 428.526078] BTRFS error (device loop5): open_ctree failed 13:16:22 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 13:16:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0xb5e31548fcbc8ee5) ioctl$KDSKBLED(r0, 0x4b65, 0x0) getgid() 13:16:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x3, r1}) 13:16:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 430.899517] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 430.908686] BTRFS error (device loop1): superblock checksum mismatch [ 430.956423] BTRFS error (device loop1): open_ctree failed [ 430.965851] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 430.974405] BTRFS error (device loop1): superblock checksum mismatch 13:16:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:16:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="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", 0x132, 0x10000}], 0x0, 0x0) init_module(&(0x7f0000000000)='vboxnet1\x00', 0x9, &(0x7f0000000040)='btrfs\x00') r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000003c0)={0x1ff, 0x8, 0x940, 0x4, 0x1f3}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x2000000, &(0x7f0000000440)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f66696c65302c6e66735f6578706f72743d6f6e2c78696e6f3d6175746f2c6e66735f6578706f72743d6f66662c6e66735f6578706f72743d6f66662c7375626a5f757365723d2c61707072616973655f747970653d0400000000000000ad42c0a3febbd99e525dbe7369643c", @ANYRESDEC=r1, @ANYBLOB="2c7375626a5f726f6c653d3b5b766d6e65753173656375105e74792c7375626a5f757365723d76626f786e657431002c000406dedaea00b80a62cdcce43b4d30375b08675a3bd9414fcd1559a56f300eb1"]) [ 431.006643] BTRFS error (device loop1): open_ctree failed [ 431.027947] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 431.045369] BTRFS error (device loop1): superblock checksum mismatch 13:16:22 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 431.077501] BTRFS error (device loop1): open_ctree failed [ 431.104321] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 431.114892] BTRFS error (device loop1): superblock checksum mismatch 13:16:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x41) [ 431.181784] BTRFS error (device loop1): open_ctree failed [ 431.583017] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 431.590475] BTRFS error (device loop1): superblock checksum mismatch [ 431.682417] BTRFS error (device loop1): open_ctree failed 13:16:25 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x819b}], 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{0x7f, 0x6, 0x7e, 0x1}, 'syz1\x00', 0x12}) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') lstat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_ima(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f0000000680)=@v2={0x5, 0x1, 0x14, 0x40, 0xea, "9f14bfe9d9eadfc58aac3e0eec0238cafaec47f657d15f08fe65821c486ba6fdb19ad94017ee1bf345794882c3d990652c8c548db94d664efd6caac733cac8b474f5d4c773b27792082b2f76ee0ac9b99827027876b58ef8435d53db3f5946257c1b14aad5fb5737b0569e21d980d234e256abf4457ff4fb0f50ae0b13da9e902af7aa3226c0933d7ab1c8694ba391f85acc502d389ca9836fded5e19e7c8bd4f198fe905bf911477f451c4bf5de98dbdc2b79db5202b2c9034116d352d4347a987b54765693f0ae7b5b3ef37ca34319db964acfd82e411028b8cd92af9e44bd83ba3fc36acf73984b5b"}, 0xf4, 0x1) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000940)="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", 0x1000, 0x5}], 0x1050000, &(0x7f0000000300)={[{@utf8='utf8'}, {@fmask={'fmask', 0x3d, 0x1000}}, {@errors_remount='errors=remount-ro'}, {@case_sensitive_yes='case_sensitive=yes'}, {@uid={'uid', 0x3d, r1}}], [{@smackfshat={'smackfshat', 0x3d, 'syz1\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000540)) setxattr$security_ima(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@md5={0x1, "0b3a80d708ef5e26ce67e3d179511ab5"}, 0x11, 0x3) 13:16:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:16:25 executing program 2: r0 = geteuid() fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x7, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="55ac579edc33062d8ad362b6879b84f420445d4785fe252b490ed69900291b60fe5107e368f7b2a80a4ab15de37a4f6e02f8e9f7407b828c26855e36e586b4b924da78b272fc157daf170d9e177d56e6f2cb5678e74fe0e42d73842f0a8acbc53a7403e8aec769b638cb0e9e409073c1a705d8d8c6f7018e738c379c12bf6ed823fec6d058c484f20a0167e46a9ae483c97a789d6ad4d3bd7aed0be3a19590c115d403995257d179bea636d0177bfb7ced9c7b9f4583ffd11efb276780c1e7a70523b55013dd1aa4236f", 0xca, 0x5}], 0x2004000, &(0x7f0000000340)={[{@show_sys_files_no='show_sys_files=no'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, 'btrfs\x00'}}, {@audit='audit'}, {@euid_gt={'euid>', r0}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@seclabel='seclabel'}, {@euid_gt={'euid>', r1}}, {@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:25 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffff7, 0x101080) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x800, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x7, 0x70, 0x5, 0x5fb, 0x6, 0x4bd7, 0x0, 0x2, 0x80, 0x3, 0x1, 0x0, 0x7, 0x3a, 0x10000000, 0x2, 0xffffffffffff524a, 0x2, 0x1, 0x6, 0x4, 0x4, 0x100000000, 0xe1, 0x2, 0x7fffffff, 0x0, 0x5, 0x57, 0x7, 0x70f5, 0x200, 0x50, 0x1, 0x6, 0x3, 0x6, 0x2, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x64, 0x5, 0x1f, 0x4, 0x9, 0x400, 0x9}, r0, 0x0, r1, 0x4) acct(&(0x7f00000000c0)='./file0\x00') r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="73797a300c0bb72f9005390e0caba64ec2e369aadb3c266ae2dd457de8b126d780bae2ac8076e321d93a4269539ff66954ffaca7dcf3c49ccdf5425b79ec6f016555a07203c9b0d876fc59a114e0f62580a6ebb4acd3b786d883eede9d101f78876036b1b2a2406dadc100b042a4a53b7e51b9c58bc9e41351750e"], 0x7b) 13:16:25 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getpeername(r0, &(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, &(0x7f00000000c0)=0x80) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) [ 433.954179] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 433.961872] BTRFS error (device loop1): superblock checksum mismatch 13:16:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:16:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x2d, 0xe63}], 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x7) ioctl(r0, 0x7, &(0x7f0000000140)="36e04e826db98ec806648be702aad91ed2925f880e3514ae810b979eb2e218a0093066a217d13af7b296ff44c37af86df1835bf70a964415e3452c919ec7c12596c75668ddee68915f43406000969028b1166a797f") ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) [ 434.010651] BTRFS error (device loop1): open_ctree failed 13:16:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0xb5e31548fcbc8ee5) ioctl$KDSKBLED(r0, 0x4b65, 0x0) getgid() [ 434.086203] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 434.106431] BTRFS error (device loop1): superblock checksum mismatch [ 434.153953] BTRFS error (device loop1): open_ctree failed [ 434.163750] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 434.177059] BTRFS error (device loop1): superblock checksum mismatch 13:16:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:16:25 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000140)={0x10001, 0x7f, 0x8004, 0xf7, 0x8ba, 0x3, 0xb5, 0x6, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r1, 0x5, 0x9}, 0x8) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x4000, 0x0) [ 434.223326] BTRFS error (device loop1): open_ctree failed 13:16:28 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000040)=0x401) 13:16:28 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x100) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000140)={@nfc={0x27, 0x0, 0x1, 0x5}, {&(0x7f0000000040)=""/44, 0x2c}, &(0x7f00000000c0), 0x1}, 0xa0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000200)=""/45) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10108}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x120, r1, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf86}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x544}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x55}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) 13:16:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000040)="d3e75e22ed772c494f6a47287c26d189b01ae10962660f4dd310b8710e47323d593e69c4ffe0968631b7cbf7e8275dabb5fcbb7129f1961be37fa6", &(0x7f0000000140)=""/76}, 0x18) 13:16:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x81, 0x83) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f0000000140)=""/216, &(0x7f0000000040)=0xd8) 13:16:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 437.010632] print_req_error: I/O error, dev loop0, sector 128 [ 437.022105] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 437.039347] BTRFS error (device loop1): superblock checksum mismatch 13:16:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:16:28 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000380)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6c7, 0x20000) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000140)=""/228) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 437.094930] BTRFS error (device loop1): open_ctree failed [ 437.111297] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 437.119839] BTRFS error (device loop1): superblock checksum mismatch 13:16:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f", 0xdc, 0x10000}], 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) [ 437.181620] BTRFS error (device loop1): open_ctree failed [ 437.199437] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 437.213629] BTRFS error (device loop1): superblock checksum mismatch 13:16:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 437.278827] BTRFS error (device loop1): open_ctree failed [ 437.292426] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 437.300589] BTRFS error (device loop1): superblock checksum mismatch 13:16:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:16:28 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 437.391624] BTRFS error (device loop1): open_ctree failed [ 437.399314] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 437.435577] BTRFS error (device loop1): superblock checksum mismatch [ 437.481324] FAULT_INJECTION: forcing a failure. [ 437.481324] name failslab, interval 1, probability 0, space 0, times 0 [ 437.494154] CPU: 0 PID: 22021 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 437.502008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.511661] Call Trace: [ 437.514502] dump_stack+0x138/0x19c [ 437.518288] should_fail.cold+0x10f/0x159 [ 437.522570] should_failslab+0xdb/0x130 [ 437.526703] __kmalloc+0x2f3/0x7a0 [ 437.530391] ? __sb_end_write+0xc1/0x100 [ 437.534590] ? strnlen_user+0x120/0x1a0 [ 437.538618] ? SyS_memfd_create+0xba/0x3a0 [ 437.542861] SyS_memfd_create+0xba/0x3a0 [ 437.546927] ? shmem_fcntl+0x130/0x130 [ 437.550814] ? do_syscall_64+0x53/0x630 [ 437.554949] ? shmem_fcntl+0x130/0x130 [ 437.559106] do_syscall_64+0x1eb/0x630 [ 437.563617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.568938] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 437.574143] RIP: 0033:0x458c29 [ 437.577614] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 437.585656] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 437.593048] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 437.600448] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 437.608203] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f2d39cac6d4 [ 437.616306] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 437.719610] BTRFS error (device loop1): open_ctree failed 13:16:31 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaaa25, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:31 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000001a00)={0x0, 0x3c, &(0x7f00000019c0)=[@in={0x2, 0x4e24, @rand_addr=0x3}, @in6={0xa, 0x4e24, 0xff, @local, 0x1f8}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000001a40)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000001a80)={r2, 0xfffffffffffffffc}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r3, &(0x7f00000002c0)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a8c9512d7703f319bd070") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000500)='nfs4\x00', &(0x7f0000000540)='./file1\x00', 0x0, 0x7, &(0x7f0000001880)=[{&(0x7f0000000580)="58d5ec4e7e6d5ed1d0f86b46b00b96a72ec3aab3ce5610bbbb6e5fea4538d98f36b82a1e4bd44747fa89baf76cd77f5df351e8ff2ef9760586b93cb84532ccd77f09c9e8917102094ee17ed659f8b27636e3ae8af014c00cc023c2f974d2bb4fa0b19d11012895a1014a4ff1cf1e62ad6b759f9dd8d2c3dd31b22d6e66fc70725d5a83c09c547379623f879819c2ba2b60aa9022aef0c93781c28fd466540fd4d38b2abe82472ac2d2cd5d1c1e3547e6f61754afa1af", 0xb6, 0x1}, {&(0x7f0000000640)="d6dd67e009e97e3502b273132d95fe8889bb90a2a83363ce36cc5e1efe9bf283a501b3ace29db98f8010afa6731110c6c0855b935c89f6b2a4f58fd328adb811ec02d9a17636332f61766eed88aa9c96bdd93f6d713166792bd99f899e36d8863da83567caec92d166440b09b16e6a0b9b9a11fde7200159c0f58b", 0x7b, 0x40}, {&(0x7f00000006c0)="f1c01261221f5aea06533d036acb67085d98731ccf3e499884a3bfdb8325e3837bcb62e070d308614f991209da2ff4e566d0cd3bc5e9ef5bae13d24af9cd4b115ff461c5655e30d31c33bdca", 0x4c, 0x101}, {&(0x7f0000000740)="7bf28f4f02d9a7a523b34a216de46bc0b862e2a52f48c682da3d5367230718482c5aa14c03d37b25d54bb07252085687ca087be4bc6093943d35a90b8dc98e2bc18b45b9275151daffe1858ea6550288467a7da9bd99ddf381ad89e2aa8489a42af0900813fcbf74eb53f73aaf87b2fe", 0x70, 0x100000000}, {&(0x7f00000007c0)="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", 0x1000, 0x2}, {&(0x7f00000017c0)="d3cb6cb90f8f92fb4ca6771ceffd202afffbdc3dfe931b455dc83aabe5458a0d4dc3f3c31ba43a54980fc78aebffe562aa5592555788f59562785f72761c9c3e483741d1047b0f1c05986e9c6699", 0x4e, 0x8}, {&(0x7f0000001840)="65fbd2a7cfff13cb899e23269d61d267b52b9dce4da2906fd30a28467abe6b1e73f3c8e0eee52a205ad7aa", 0x2b, 0x7}], 0x800000, &(0x7f0000001940)='broadcast-link\x00') mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='tracefs\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000180)={'filter\x00', 0x17, "7580abb55a8eaefe7e9fdea077a71f64f0497195f845e0"}, &(0x7f0000001ac0)=0x3b) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x1ac, r5, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x54e2}]}]}, @TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffe1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3283}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd59f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa888}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x61}]}, @TIPC_NLA_BEARER={0x4}]}, 0x1ac}}, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000001980)={0x8, 0x2e73}) 13:16:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 13:16:31 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80080, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xfffffffffffffff9, 0x8, 0xffffffffffff8001, 0x4}, 0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0xffffffffffffffff) r4 = dup3(r3, r1, 0x0) write(r4, &(0x7f0000000000)="b03f673a829adb63bd876f1fb41b7a3f4ed80483a6f403eafb42d34a0b2fbfb18bedd8c429e505af824ae1aea4270b71ce8a7b465f79e99cb50f182ec8d52e11df3a0a479d4d6cf4acb250a0166d85a23c3166b9c9e40e71c7c1443e", 0x5c) ioctl$TCXONC(r4, 0x540a, 0x0) poll(&(0x7f0000000200)=[{r1}], 0x1, 0xe1) [ 440.041947] FAULT_INJECTION: forcing a failure. [ 440.041947] name failslab, interval 1, probability 0, space 0, times 0 [ 440.091616] CPU: 0 PID: 22036 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 440.098672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.108041] Call Trace: [ 440.110643] dump_stack+0x138/0x19c [ 440.114295] should_fail.cold+0x10f/0x159 [ 440.118484] should_failslab+0xdb/0x130 [ 440.122482] kmem_cache_alloc+0x2d9/0x780 [ 440.126762] ? __alloc_fd+0x1d4/0x4a0 [ 440.130741] __d_alloc+0x2d/0x9f0 [ 440.134197] ? lock_downgrade+0x6e0/0x6e0 [ 440.138557] d_alloc_pseudo+0x1e/0x30 [ 440.142356] __shmem_file_setup.part.0+0xd8/0x400 [ 440.147278] ? __alloc_fd+0x1d4/0x4a0 [ 440.151084] ? shmem_fill_super+0x8c0/0x8c0 [ 440.155481] SyS_memfd_create+0x1f9/0x3a0 [ 440.159622] ? shmem_fcntl+0x130/0x130 [ 440.163501] ? do_syscall_64+0x53/0x630 [ 440.167460] ? shmem_fcntl+0x130/0x130 [ 440.171333] do_syscall_64+0x1eb/0x630 [ 440.175296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.180213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 440.185426] RIP: 0033:0x458c29 13:16:31 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 440.188606] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 440.196317] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 440.204368] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 440.211728] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 440.218991] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f2d39cac6d4 [ 440.226361] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 440.299233] FAULT_INJECTION: forcing a failure. [ 440.299233] name failslab, interval 1, probability 0, space 0, times 0 [ 440.311083] CPU: 1 PID: 22056 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 440.318114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.327732] Call Trace: [ 440.330443] dump_stack+0x138/0x19c [ 440.334082] should_fail.cold+0x10f/0x159 [ 440.338247] should_failslab+0xdb/0x130 [ 440.342227] kmem_cache_alloc+0x2d9/0x780 [ 440.346509] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 440.352043] ? rcu_read_lock_sched_held+0x110/0x130 [ 440.357066] ? shmem_destroy_callback+0xa0/0xa0 [ 440.361953] shmem_alloc_inode+0x1c/0x50 [ 440.366033] alloc_inode+0x66/0x190 [ 440.369745] new_inode_pseudo+0x19/0xf0 [ 440.373799] new_inode+0x1f/0x40 [ 440.377179] shmem_get_inode+0x75/0x750 [ 440.381174] __shmem_file_setup.part.0+0x111/0x400 [ 440.386181] ? __alloc_fd+0x1d4/0x4a0 [ 440.390005] ? shmem_fill_super+0x8c0/0x8c0 [ 440.394329] SyS_memfd_create+0x1f9/0x3a0 [ 440.398480] ? shmem_fcntl+0x130/0x130 [ 440.402498] ? do_syscall_64+0x53/0x630 [ 440.406551] ? shmem_fcntl+0x130/0x130 [ 440.410517] do_syscall_64+0x1eb/0x630 [ 440.414510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.419383] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 440.424569] RIP: 0033:0x458c29 [ 440.427775] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 440.435930] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 440.443731] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 440.451193] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 440.458469] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f2d39cac6d4 [ 440.466205] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:31 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={{0x25, 0x38d5, 0x5, 0x2, 0x80, 0x80000000}, 0x6}) 13:16:31 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x1, 0xfffffffffffffffe, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(seqiv(echainiv(morus640-generic)))\x00'}, 0x80, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 440.566699] FAULT_INJECTION: forcing a failure. [ 440.566699] name failslab, interval 1, probability 0, space 0, times 0 [ 440.601787] CPU: 1 PID: 22067 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 440.609073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.619062] Call Trace: [ 440.621666] dump_stack+0x138/0x19c [ 440.625492] should_fail.cold+0x10f/0x159 [ 440.629734] should_failslab+0xdb/0x130 [ 440.633801] kmem_cache_alloc+0x2d9/0x780 [ 440.638691] ? shmem_alloc_inode+0x1c/0x50 [ 440.643012] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 440.648453] selinux_inode_alloc_security+0xb6/0x2a0 [ 440.653568] security_inode_alloc+0x9a/0xe0 [ 440.658644] inode_init_always+0x552/0xaf0 [ 440.663051] alloc_inode+0x83/0x190 [ 440.666791] new_inode_pseudo+0x19/0xf0 [ 440.670761] new_inode+0x1f/0x40 [ 440.674118] shmem_get_inode+0x75/0x750 [ 440.678097] __shmem_file_setup.part.0+0x111/0x400 [ 440.683139] ? __alloc_fd+0x1d4/0x4a0 [ 440.686943] ? shmem_fill_super+0x8c0/0x8c0 [ 440.691989] SyS_memfd_create+0x1f9/0x3a0 [ 440.696179] ? shmem_fcntl+0x130/0x130 [ 440.700238] ? do_syscall_64+0x53/0x630 [ 440.705038] ? shmem_fcntl+0x130/0x130 [ 440.709038] do_syscall_64+0x1eb/0x630 [ 440.713006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.718040] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 440.723233] RIP: 0033:0x458c29 [ 440.726753] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 440.734564] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 440.742001] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 440.749712] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 440.756986] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f2d39cac6d4 [ 440.764266] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:34 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x220800, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000002ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002f00)=0x14) sendmsg$kcm(r0, &(0x7f00000048c0)={&(0x7f0000002f40)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f0000004400)=[{&(0x7f0000002fc0)="89c07edbbef199f70b8527ab9c0a114c23a3fb6a714f3c6fdf11684ead4c08c215a1babed9bf94d1bc3cbf00931b9a194251ce041c3a4872d5c437532fc08cf0180ee0d04b9560718f8ec73347e902379001f452ea139c3b60ac487f1427d1ce0492e7addde0aa235d6438", 0x6b}, {&(0x7f0000003040)="a9083da4040a2a0be447d978c9366bb41a", 0x11}, {&(0x7f0000003080)="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", 0x1000}, {&(0x7f0000004080)="a48ae09cc60146b3e3d45caff172cadf918c78769e30a3", 0x17}, {&(0x7f00000040c0)="f3c827762d1cd46014438a18c214f75c23e28ed080461dce84ef19aeae0d5ea3e74b7ea76ecc8b451f5d99a0715613e5d3bf1c57565b8087e31b2bbe08e467998a4fc49a98f2d476ee06dbf28b97908ba34307cbaad0a9169ff2c8212357daa41f2c93dcc5c9d793dd008c8d9f8d8feb149271090b74dc6fe3bef8f8cd16836732c28808285be157749157ed610d6fe0668ea6699141032f227eb41ed4f065ab8c3b8183ca9bfb29a99f6c", 0xab}, {&(0x7f0000004180)="836de3461fea8ad5ac7a91639f032b8f392f2ca9bed91463b074af1e72441563d7996cc2846aa47bb8428fce587c8970e2d2ce8fec71eeac9f36b6cf4d6ad93bcde9e1f2b4a4e53bfbd8eeb55ba6a7e8070058cc690dab74ae70157ca737196e9fab63b5ca29a0a68fb54bd2feea4df48c1ecd4b0168f8c80627a34c567220cb602e38e6a3158c34a194df1c9ecd469c98d931ea346e109dbf4c26f7e8b9a4a75f4b7d270bc437fa653c32d5fe3fc785026293a5fd03caba03ac1b0670836a5f4ac773068b5e0cffefb73fdd453cb2d9d4b67a0e1c351ba9", 0xd8}, {&(0x7f0000004280)="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", 0xfc}, {&(0x7f0000004380)="14d87db693c6bfa775966572919b", 0xe}, {&(0x7f00000043c0)="28b91acacd86776b54d3e15fba58c5bf17a39361b22a69", 0x17}], 0x9, &(0x7f00000044c0)=[{0xe8, 0x119, 0x5, "7591aa05aca62b754b7c14e665cc568664090c594eaf8ae6d4fc4b6d63385538e0c1f59cfcb21e77ae68c63cb3c8b9f7ddb170184361e39991de94931f9d6afb98a39be05f1344db129478d2a75c6d5740f7e5b4960062b80be7443b741d08cc1608f0652eae426a6940fb69339963408401bfd3846a1915c1790aae7b46cfac3551386f8611edece897559964b97a678c364f03621501270aad378c4cc5cd892ac9c1f1300972fc123eb46afb41fafd5cb708dfce3ddf70c1a64b7ea83bb4e1ddaf72468a6e4650102cd3f2a7d5eaf1f83c17b6"}, {0x68, 0x10d, 0x400, "2b9ff092aa05760f50e756eaffe25ec22919049e77190adbc5f68b9bbd576a196315bd0ea762d5515ae29373319c95aff49ce8973663b8a51b2c8a5a592317a62b3dde17288f69599ae1d0f75d53c924425570"}, {0x18, 0xff, 0x3, "d5677e5d34"}, {0xf8, 0x0, 0x1, "1a6edc7a0a727c42fdcbe3ef6d6ca59b9fd562d1283c8acaa0657a468051af79289797ff2afb7a28c404369f4f056315bb97ae22f6db90751accd52ba07ad3271233e60c932e811766fad9c54ee0f92e398c8f0621e3c48f6fa65608a51e2a05dfaca9d0d11e5bd1ebfd03da092c386a652c8efaabd0ce7d2bbdc9ab16a508dc719d378a5fc49588d72027d55c26b33142793f4f46f9487c336ced4e5ccb499828eec4202813f0a953173988ab1b118b3f0e157d2da93cb0fa16363e7748887dac29fb8a5bdf8424abbddae17ec828502d5eb326afda45308e50ea294063d810b7de65d2b275"}, {0xc8, 0x105, 0x3, "781e97abb9c1c5cd20699becbaef00bb62668892e70793faf2f7043a1d28fa11108feee36e25101e226e7317600353d171f2253a6bde828b3a5486397692edb5e7ce617759f5c6f82c463cb39f658bb92bceb3745f920e1ef258b35eb4bf349a70920dcc89a7748e945c410d6e3d2088569c90cd87ecd679c5f128b13d4de092470eacc3b1c0374d0914566743d6735fd2cea6b090ba7f543997417f42b6c4214eac1dd289c3ce4aa675c308be2bf68b6c"}, {0x90, 0x112, 0x0, "5a769a86e9170f65b1198ee21944f91c502a773c161753853c6acc850c787a906ad8dc8af5f1c4328d06aafca169f26afbcd06b57070fe3a1f57ef3e66e1805f5b7c0f54f4099c64e27d56655d7bf3ab71ede177f8db0f3a47b0b05838ded7fc2e927855ac58267bca9e4ff6aff5cf4352e6cd915996a7c0848bcb055b"}, {0x30, 0x105, 0x17e, "6219820611f594ee680a6ef0417e0c10b6e85334cfdac13b6c9cb83391"}], 0x3e8}, 0x40000) 13:16:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) 13:16:34 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 13:16:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 443.142869] FAULT_INJECTION: forcing a failure. [ 443.142869] name failslab, interval 1, probability 0, space 0, times 0 [ 443.172403] CPU: 0 PID: 22093 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 443.179651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.189030] Call Trace: [ 443.191633] dump_stack+0x138/0x19c [ 443.195277] should_fail.cold+0x10f/0x159 [ 443.199440] should_failslab+0xdb/0x130 [ 443.203549] kmem_cache_alloc+0x2d9/0x780 [ 443.207828] ? lock_downgrade+0x6e0/0x6e0 [ 443.212110] get_empty_filp+0x8c/0x3b0 [ 443.216186] alloc_file+0x23/0x440 [ 443.219734] __shmem_file_setup.part.0+0x1b1/0x400 [ 443.224879] ? __alloc_fd+0x1d4/0x4a0 [ 443.228695] ? shmem_fill_super+0x8c0/0x8c0 [ 443.235015] SyS_memfd_create+0x1f9/0x3a0 [ 443.239161] ? shmem_fcntl+0x130/0x130 [ 443.243068] ? do_syscall_64+0x53/0x630 [ 443.247058] ? shmem_fcntl+0x130/0x130 [ 443.250969] do_syscall_64+0x1eb/0x630 [ 443.254868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.259862] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 443.265178] RIP: 0033:0x458c29 [ 443.268452] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 443.276255] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 443.283694] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 13:16:34 executing program 5: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000002}) fallocate(r0, 0x8, 0x0, 0x8000) fcntl$notify(r0, 0x402, 0x30) 13:16:34 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 443.291384] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 443.298665] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f2d39cac6d4 [ 443.305944] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:34 executing program 1 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x660001) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xb8, r1, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x1) 13:16:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:16:34 executing program 5: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20140, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r2 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x0, 0x989680}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) [ 443.538282] FAULT_INJECTION: forcing a failure. [ 443.538282] name failslab, interval 1, probability 0, space 0, times 0 [ 443.549877] CPU: 0 PID: 22132 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 443.557173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.566696] Call Trace: [ 443.569302] dump_stack+0x138/0x19c [ 443.573024] should_fail.cold+0x10f/0x159 [ 443.577179] should_failslab+0xdb/0x130 [ 443.581161] kmem_cache_alloc+0x2d9/0x780 [ 443.585314] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 443.590922] ? check_preemption_disabled+0x3c/0x250 [ 443.595965] selinux_file_alloc_security+0xb4/0x190 [ 443.601089] security_file_alloc+0x73/0xb0 [ 443.605325] get_empty_filp+0x130/0x3b0 [ 443.609307] alloc_file+0x23/0x440 [ 443.612870] __shmem_file_setup.part.0+0x1b1/0x400 [ 443.617789] ? __alloc_fd+0x1d4/0x4a0 [ 443.621674] ? shmem_fill_super+0x8c0/0x8c0 [ 443.626157] SyS_memfd_create+0x1f9/0x3a0 [ 443.630499] ? shmem_fcntl+0x130/0x130 [ 443.634410] ? do_syscall_64+0x53/0x630 [ 443.638379] ? shmem_fcntl+0x130/0x130 [ 443.642267] do_syscall_64+0x1eb/0x630 [ 443.646289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.651143] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 443.656330] RIP: 0033:0x458c29 [ 443.659512] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 443.667305] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 443.674566] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 443.681911] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 443.689271] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f2d39cac6d4 [ 443.696573] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:37 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x2000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f0000000600), 0x4) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, 0x0, &(0x7f00000005c0)) 13:16:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:16:37 executing program 1 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:37 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xf06, 0x208000) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x5, 0x80000001, 0x100000001, 0x3ff}, 0x8) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x7, [0x5, 0xffff, 0x3, 0x7, 0x2, 0x0, 0x0]}, &(0x7f0000000140)=0x12) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:37 executing program 2: lookup_dcookie(0x401, &(0x7f00000000c0)=""/192, 0xc0) 13:16:37 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 446.187876] FAULT_INJECTION: forcing a failure. [ 446.187876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 446.203961] CPU: 0 PID: 22156 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 446.211119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.220580] Call Trace: [ 446.223180] dump_stack+0x138/0x19c [ 446.226909] should_fail.cold+0x10f/0x159 [ 446.231086] ? __might_sleep+0x93/0xb0 [ 446.234990] __alloc_pages_nodemask+0x1d6/0x7a0 [ 446.239675] ? __alloc_pages_slowpath+0x2930/0x2930 [ 446.244791] ? lock_downgrade+0x6e0/0x6e0 [ 446.248961] alloc_pages_vma+0xc9/0x4c0 [ 446.253033] shmem_alloc_page+0xf6/0x1a0 [ 446.257091] ? shmem_swapin+0x1a0/0x1a0 [ 446.261070] ? cred_has_capability+0x142/0x290 [ 446.265658] ? check_preemption_disabled+0x3c/0x250 [ 446.270894] ? __this_cpu_preempt_check+0x1d/0x30 [ 446.275740] ? percpu_counter_add_batch+0x112/0x160 [ 446.280758] ? __vm_enough_memory+0x26a/0x490 [ 446.285259] shmem_alloc_and_acct_page+0x12a/0x680 [ 446.290193] shmem_getpage_gfp+0x402/0x28a0 [ 446.294619] ? _raw_spin_unlock+0x2d/0x50 [ 446.298774] ? shmem_add_to_page_cache+0x860/0x860 [ 446.303796] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 446.309141] shmem_write_begin+0xfd/0x1b0 [ 446.313285] ? trace_hardirqs_on_caller+0x400/0x590 [ 446.318300] generic_perform_write+0x1ff/0x490 [ 446.322893] ? page_endio+0x530/0x530 [ 446.326898] ? current_time+0xb0/0xb0 [ 446.330701] ? generic_file_write_iter+0x9a/0x660 [ 446.335716] __generic_file_write_iter+0x239/0x5b0 [ 446.340670] generic_file_write_iter+0x303/0x660 [ 446.345566] __vfs_write+0x4ae/0x6c0 [ 446.349274] ? selinux_file_open+0x420/0x420 [ 446.353692] ? kernel_read+0x120/0x120 [ 446.357575] ? check_preemption_disabled+0x3c/0x250 [ 446.362696] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 446.368251] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 446.373016] ? __sb_start_write+0x153/0x2f0 [ 446.377458] vfs_write+0x198/0x500 [ 446.381036] SyS_pwrite64+0x115/0x140 [ 446.384847] ? SyS_pread64+0x140/0x140 [ 446.388719] ? do_syscall_64+0x53/0x630 [ 446.392725] ? SyS_pread64+0x140/0x140 [ 446.396707] do_syscall_64+0x1eb/0x630 [ 446.400660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.407531] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 446.412800] RIP: 0033:0x412c27 [ 446.415979] RSP: 002b:00007f2d39caba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 446.423865] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 446.431135] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 13:16:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x0, 0x3, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f000088c000)={@mcast2, 0x1, 0x0, 0x2000ff, 0x41, 0x0, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x800, 0x2}, 0x185) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) 13:16:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 446.438591] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 446.445967] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 446.453329] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:37 executing program 1 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x10000000000, 0xaaaaaaaaaaaace6, &(0x7f0000000040), 0x400, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x5, 0x2000) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000200)={0x0, 0x7fffffff, 0x7, 0x29c, 0x9, 0x2}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x800000000000040, 0x8, &(0x7f0000002540)=[{&(0x7f0000003640)="841a1e4fc5de5a94e9d8ed336d09c0de2a04507754f92f7ad3a18d1d346596baa9c40673aa3aa64b8c0327b2b3e104936e2ec77df0158f00a232fa1e7c610320685f16b8ca77ae21543976aef65b9d7496f7172534183c4ae0a6f1ee27433aac90aaa3c1dcade71b4725ff779f34ceac54ae4d666940784fb2f5a064e2011f44e4281d5600a0b4a567", 0x89, 0x6}, {&(0x7f0000002600)="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", 0x11eb, 0x23}, {&(0x7f0000000100)="75fa90402f4414a8c694d0e18e817ac6dad586cce9e436b10a8ff6777aeac03d5a794b27f13f5be045a7be6cccdec4e58ad05838c8f23d1beb0a9c2e734b915853768ac53cbc6c40c6c534703120645c10e47a3209179c5949fa2710642b38fa11ad46d7c6b41b16ca0d61ef8cfbc64f00c46c0d7b3aec9a97de864e454f583b561bc1e7", 0x84, 0xff}, {&(0x7f0000001280)="a24d691a8cc820d1bd413ea5a1d07594cef49cae561e46f87208b9dfe6069fcabf8d20fd", 0x2d}, {&(0x7f00000012c0)="f268", 0x2, 0x1}, {&(0x7f0000001300)="221e2f53c5ef9ea29f63743d1009899a42f9f75081ad61a8d52b1db64e566adaf42feea05895fe2fb13330e53c9dcb04b8a2a9e880c1878d9b8d68ed451a7f00bcdaa2375f74476f7166b5ad6b4e5c699804f0eeb8a09eca95a87f99f2495cf1a6e2fec80a92cd2cf1cda55433b1f35dd9dcf663adc66b27d5d6fd84d76c3bc4e1f52b0bed6d0d19cca96718fa8864fb7cc453ea108c14ecef571973c6bc8750dac504022c93b9ae3898b287e56665339fa073c0b221658e10576eb8ebda8197591f24fb08ae996a2b9f936e3aebfb2d30720e37", 0xd4, 0x8}, {&(0x7f0000001400), 0x0, 0x3}, {&(0x7f0000001440)="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", 0x1000, 0x5}], 0x10, &(0x7f0000001400)='btrfs\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000240)={0x9, 0x7, 0x4, 0x5, [], [], [], 0xeea, 0x100000000, 0x3ff, 0x3, "b4b54ef8dfd318cf93ae963acf9bae15"}) setrlimit(0x8, &(0x7f0000000380)={0x9, 0x6}) rt_sigprocmask(0x0, &(0x7f00000003c0)={0x4800000000}, &(0x7f0000000400), 0x8) 13:16:37 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x26000, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0xfffffffffffffe01, 0x99, "26d2b6e21aa50ef492a4c19f90bfa3a08ad59a3fb6b9479b6a08ab97bd54b3c1a29b59a0235b1c531eeba06e2fa544cf89173d184fa77f48e3e077d699e264ac294d54b190d7f7556725915ab5b1c60123f672ad1f446951c2958cf096f44397fb89155805dc64d20f6f73e86c0589f222f7365a50d8a85f0bb640e37343fe6856cb1d65726786b4fdfaf2286c52fdc950c7672f4f54c50892"}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x3) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) [ 446.643704] FAULT_INJECTION: forcing a failure. [ 446.643704] name failslab, interval 1, probability 0, space 0, times 0 [ 446.655122] CPU: 1 PID: 22196 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 446.662251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.671709] Call Trace: [ 446.674480] dump_stack+0x138/0x19c [ 446.678129] should_fail.cold+0x10f/0x159 [ 446.682403] should_failslab+0xdb/0x130 [ 446.686457] kmem_cache_alloc+0x47/0x780 [ 446.690539] ? __alloc_pages_slowpath+0x2930/0x2930 [ 446.695669] ? lock_downgrade+0x6e0/0x6e0 [ 446.699827] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 446.705593] __radix_tree_create+0x337/0x4d0 [ 446.710132] __radix_tree_insert+0xab/0x570 [ 446.714533] ? __radix_tree_create+0x4d0/0x4d0 [ 446.719142] shmem_add_to_page_cache+0x5a4/0x860 [ 446.724013] ? shmem_writepage+0xbb0/0xbb0 [ 446.728271] ? __radix_tree_preload+0x1d2/0x260 [ 446.732942] shmem_getpage_gfp+0x1908/0x28a0 [ 446.737435] ? _raw_spin_unlock+0x2d/0x50 [ 446.741592] ? shmem_add_to_page_cache+0x860/0x860 [ 446.746511] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 446.751718] shmem_write_begin+0xfd/0x1b0 [ 446.755859] ? trace_hardirqs_on_caller+0x400/0x590 [ 446.760890] generic_perform_write+0x1ff/0x490 [ 446.765477] ? page_endio+0x530/0x530 [ 446.769364] ? current_time+0xb0/0xb0 [ 446.773165] ? generic_file_write_iter+0x9a/0x660 [ 446.778008] __generic_file_write_iter+0x239/0x5b0 [ 446.782954] generic_file_write_iter+0x303/0x660 [ 446.787713] __vfs_write+0x4ae/0x6c0 [ 446.791418] ? selinux_file_open+0x420/0x420 [ 446.795941] ? kernel_read+0x120/0x120 [ 446.799913] ? check_preemption_disabled+0x3c/0x250 [ 446.804923] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 446.810365] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 446.815135] ? __sb_start_write+0x153/0x2f0 [ 446.819461] vfs_write+0x198/0x500 [ 446.822993] SyS_pwrite64+0x115/0x140 [ 446.826796] ? SyS_pread64+0x140/0x140 [ 446.830697] ? do_syscall_64+0x53/0x630 [ 446.834697] ? SyS_pread64+0x140/0x140 [ 446.838591] do_syscall_64+0x1eb/0x630 [ 446.842568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.847520] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 446.852695] RIP: 0033:0x412c27 [ 446.855883] RSP: 002b:00007f2d39caba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 446.863590] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 446.871027] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 [ 446.878293] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 446.886038] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 446.893303] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:40 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:40 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) r1 = getpid() syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/mnt\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000740)={{0x7, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, [], {0x0, 0x989680}}) 13:16:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:16:40 executing program 1 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 13:16:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed00003f46fb1564000000000000004d010000000000000000aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d000000000000000000", 0x48, 0x10000}], 0x0, 0x0) 13:16:40 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x3) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x121000, 0x0) [ 449.278264] FAULT_INJECTION: forcing a failure. [ 449.278264] name failslab, interval 1, probability 0, space 0, times 0 [ 449.293807] CPU: 1 PID: 22229 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 449.300861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.310343] Call Trace: [ 449.312951] dump_stack+0x138/0x19c [ 449.316706] should_fail.cold+0x10f/0x159 [ 449.320866] should_failslab+0xdb/0x130 [ 449.324924] kmem_cache_alloc+0x2d9/0x780 [ 449.329068] ? vfs_write+0x25f/0x500 [ 449.332778] getname_flags+0xcb/0x580 [ 449.336604] ? check_preemption_disabled+0x3c/0x250 [ 449.341715] getname+0x1a/0x20 [ 449.345007] do_sys_open+0x1e7/0x430 [ 449.348833] ? filp_open+0x70/0x70 [ 449.352651] ? fput+0xd4/0x150 [ 449.355853] ? SyS_pwrite64+0xca/0x140 [ 449.360611] SyS_open+0x2d/0x40 [ 449.363888] ? do_sys_open+0x430/0x430 [ 449.367782] do_syscall_64+0x1eb/0x630 [ 449.371659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.376493] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.381988] RIP: 0033:0x412bc1 [ 449.385163] RSP: 002b:00007f2d39caba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 449.392887] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 449.400259] RDX: 00007f2d39cabb0a RSI: 0000000000000002 RDI: 00007f2d39cabb00 [ 449.407533] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 449.414808] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 13:16:40 executing program 1 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 449.430635] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000440)=[{&(0x7f0000000040)="e5d2ec42526cf7f7a90f42f0185513a9060ad94424452c27c2ac7f46cba70f040a74bf7fa980f9ed44ab1ebc06dbfdc9bc04bcdc3d43e75b2dd50cc8869c525b4f18cf34ca9cd831ca038c1fb8adb226eb99b0e65d245777b4f4a29dd172b2515f9aa80ae6c735abc266491e", 0x6c, 0x101}, {&(0x7f0000000140)="6bd21cb21c9b884582bc5b48428876e18743702305f583feee020ae9e52636fa374a22bc065161ba1a9a513044f81881e4e8942607849636f24e09fdf15b81fdbbdf1057b4c6a587ba2f5f2c729cdb06d1f85d58b773043605b57cc56254ed979a7757969a1d7cda13e1b447c3095db5cbd21b8d9e308628a35e011b9c3448924d09111e68188e9c4a7067fe056d9917038367907409c4b19636eff6e2a8ce8bfc52651c1d39a809524608215b9e7bcce44585c7278feb9f", 0xb8, 0x4}, {&(0x7f0000000940)="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", 0x1000, 0x5}, {&(0x7f0000001940)="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", 0x1000, 0x5}, {&(0x7f0000000200)="aecb2af5fc6497ecd4693a152b81ce84cf0a507a15eb5f70b44950f26a727b95cdc2ea983a18e307ff145519a01ba1f952991df1a4ab2212dcd1e553107db10ab8cf7e8d7019445b0d72a1257b365f7db261771414d5d88ad3b3ad1debddd4634557194e0e8b0b252c9af20ac31adf15802868212bcb11e6635c0f901f", 0x7d, 0x1000}, {&(0x7f00000000c0)='\x00\x00n', 0x3, 0xfffffffffffffffc}, {&(0x7f0000000280)="c74876a44453e80d397134d75b89948a33fe4e1a22a3329d8db2cbdfdc3d40c2f5cf0db922bddda93977c3aad291bfbbfb84483b49a34fbce758bcd1a3147767db7c3daabc3c5fb0ec6300d1fabb0d715293c9cc7c42f7df4b920cba2315d1beee9259ed076271600dcf04bc481da8f83930ce0cb3c1e75da8ab7cfa43598c64b2bb282a40000c3dc054952a5d4cce09fe29621eba43787b7c763f98f958a1bbe7e01bd39385052d4c3e4ba8de359bc406874b0b59d9b293f47322c5a71595667f78872408a1c6727c22b08f9c32fe51f5723b2fe93dbf1d73a131a1ec426cff", 0xe0, 0x2}, {&(0x7f0000000380)="8b54cffc795dbb211ae703b35b06854233fe91e56436c723a9508fb0ab5e75073aeb97b02c3981d4988598c36c318911b5", 0x31, 0x6}], 0x80000, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x200, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000400)=0x6) 13:16:40 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x2, {}, 0x0, 0x2}, 0xe) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') syz_open_pts(r1, 0x10000) 13:16:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10001, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000031ac0001000006000000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 13:16:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 449.573862] FAULT_INJECTION: forcing a failure. [ 449.573862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 449.586415] CPU: 0 PID: 22248 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 449.593914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.603731] Call Trace: [ 449.606862] dump_stack+0x138/0x19c [ 449.610509] should_fail.cold+0x10f/0x159 [ 449.614858] __alloc_pages_nodemask+0x1d6/0x7a0 [ 449.619641] ? fs_reclaim_acquire+0x20/0x20 [ 449.619660] ? __alloc_pages_slowpath+0x2930/0x2930 [ 449.619688] cache_grow_begin+0x80/0x410 [ 449.629499] kmem_cache_alloc+0x6a8/0x780 [ 449.629512] ? vfs_write+0x25f/0x500 [ 449.629526] getname_flags+0xcb/0x580 [ 449.629541] ? check_preemption_disabled+0x3c/0x250 [ 449.650799] getname+0x1a/0x20 [ 449.654030] do_sys_open+0x1e7/0x430 [ 449.657863] ? filp_open+0x70/0x70 [ 449.661409] ? fput+0xd4/0x150 [ 449.664691] ? SyS_pwrite64+0xca/0x140 [ 449.668604] SyS_open+0x2d/0x40 [ 449.671908] ? do_sys_open+0x430/0x430 [ 449.675804] do_syscall_64+0x1eb/0x630 [ 449.680176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.685234] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.690715] RIP: 0033:0x412bc1 [ 449.694229] RSP: 002b:00007f2d39caba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 449.702236] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 449.710209] RDX: 00007f2d39cabb0a RSI: 0000000000000002 RDI: 00007f2d39cabb00 [ 449.717612] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 449.724974] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 449.732630] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:43 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = gettid() r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8000, 0x80) sendmsg$nl_netfilter(r3, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000008}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x19c, 0x5, 0x6, 0x984d65e3e8e0dc88, 0x70bd2d, 0x25dfdbfc, {0x1}, [@typed={0xb4, 0xc, @binary="02143f11b599b7d65846b18337f9339daa3d93d55d90c729ce2ff8c2f2d4b72c3a10e80cfa9c48ff4086cec7c8438a7f3d1001529acf35b934cb3f654c56dc672a5803a4ef06b91c5f68309ed5dde39e9b65081f81fc38070324379bdc6fc7d817914e42e559ebaa88c9d64514bc410400fcb7c323f5842d9265264c26dd5c6d373ca8ce44ce2fd6ed617932d4a4b50792a0c3031081ccce8a8a7d51dbf6b53eb11c23ca2704321c89ae12d736"}, @generic="55d7071eb92ba61fb2f6fe7090dbb0e203abfed4178af4ffbac5f7ca33a5b72a5b36c27f86afd9c70858182ad77b8526dca7f51c8ff4d480d5d9782edffb3d387ef0c3ee7c7f245d5fe723fb226124ba05e247871d30591096f677f63c4df4d7489c3a12c798b45de44dd95645d68af2414bc768709c4781716999006e89920be0fcb383669abfa31c94a5b96837722fc40c9a188fb31edd397daf20dc22efbfccd68251f8a1969114b4cf562f2f9394659c88fe922e1b7c7054e7cd27cd06bc1cae8dd7573e5ec80e5ad845b9fc29478ef31faf"]}, 0x19c}, 0x1, 0x0, 0x0, 0x20008000}, 0x40010) r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)) unshare(0x400) fcntl$lock(r4, 0x7, &(0x7f0000000200)={0x1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) dup2(r0, r1) 13:16:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaac72, &(0x7f0000000400), 0x0, 0x0) 13:16:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:16:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x6, 0xfff}) 13:16:43 executing program 1 (fault-call:2 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 452.359308] FAULT_INJECTION: forcing a failure. [ 452.359308] name failslab, interval 1, probability 0, space 0, times 0 [ 452.393313] CPU: 1 PID: 22288 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 452.400581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.410556] Call Trace: [ 452.413314] dump_stack+0x138/0x19c [ 452.416948] should_fail.cold+0x10f/0x159 [ 452.421203] should_failslab+0xdb/0x130 [ 452.425169] kmem_cache_alloc+0x2d9/0x780 [ 452.429306] ? save_stack+0xa9/0xd0 [ 452.433015] get_empty_filp+0x8c/0x3b0 [ 452.437007] path_openat+0x8f/0x3f70 [ 452.440883] ? trace_hardirqs_on+0x10/0x10 [ 452.445186] ? check_preemption_disabled+0x3c/0x250 [ 452.450198] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 452.454855] ? find_held_lock+0x35/0x130 [ 452.458918] ? save_trace+0x290/0x290 [ 452.462723] ? __alloc_fd+0x1d4/0x4a0 [ 452.466696] do_filp_open+0x18e/0x250 [ 452.470487] ? may_open_dev+0xe0/0xe0 [ 452.474282] ? lock_downgrade+0x6e0/0x6e0 [ 452.478433] ? _raw_spin_unlock+0x2d/0x50 [ 452.482568] ? __alloc_fd+0x1d4/0x4a0 [ 452.486363] do_sys_open+0x2c5/0x430 [ 452.490092] ? filp_open+0x70/0x70 [ 452.493622] ? fput+0xd4/0x150 [ 452.497079] ? SyS_pwrite64+0xca/0x140 [ 452.501489] SyS_open+0x2d/0x40 [ 452.504767] ? do_sys_open+0x430/0x430 [ 452.508642] do_syscall_64+0x1eb/0x630 [ 452.512536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.517375] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 452.522559] RIP: 0033:0x412bc1 [ 452.525740] RSP: 002b:00007f2d39caba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 452.533463] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 452.540731] RDX: 00007f2d39cabb0a RSI: 0000000000000002 RDI: 00007f2d39cabb00 [ 452.547993] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:16:43 executing program 1 (fault-call:2 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 452.555481] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 452.563409] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:16:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = gettid() r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8000, 0x80) sendmsg$nl_netfilter(r3, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000008}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x19c, 0x5, 0x6, 0x984d65e3e8e0dc88, 0x70bd2d, 0x25dfdbfc, {0x1}, [@typed={0xb4, 0xc, @binary="02143f11b599b7d65846b18337f9339daa3d93d55d90c729ce2ff8c2f2d4b72c3a10e80cfa9c48ff4086cec7c8438a7f3d1001529acf35b934cb3f654c56dc672a5803a4ef06b91c5f68309ed5dde39e9b65081f81fc38070324379bdc6fc7d817914e42e559ebaa88c9d64514bc410400fcb7c323f5842d9265264c26dd5c6d373ca8ce44ce2fd6ed617932d4a4b50792a0c3031081ccce8a8a7d51dbf6b53eb11c23ca2704321c89ae12d736"}, @generic="55d7071eb92ba61fb2f6fe7090dbb0e203abfed4178af4ffbac5f7ca33a5b72a5b36c27f86afd9c70858182ad77b8526dca7f51c8ff4d480d5d9782edffb3d387ef0c3ee7c7f245d5fe723fb226124ba05e247871d30591096f677f63c4df4d7489c3a12c798b45de44dd95645d68af2414bc768709c4781716999006e89920be0fcb383669abfa31c94a5b96837722fc40c9a188fb31edd397daf20dc22efbfccd68251f8a1969114b4cf562f2f9394659c88fe922e1b7c7054e7cd27cd06bc1cae8dd7573e5ec80e5ad845b9fc29478ef31faf"]}, 0x19c}, 0x1, 0x0, 0x0, 0x20008000}, 0x40010) r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)) unshare(0x400) fcntl$lock(r4, 0x7, &(0x7f0000000200)={0x1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x14) dup2(r0, r1) 13:16:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x290002) r1 = accept(r0, &(0x7f0000000940)=@ethernet={0x0, @broadcast}, &(0x7f00000009c0)=0x80) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000a00)=0x4) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000700)="c33f0bbcbe05c6a589bb78b7227617306b4ac7f1f7f01e61a23f79672b9bcc04d256e925c361907575ebbcf47530ad", 0x2f) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000007c0)={0x0, 0x7ff, 0x9, 0x577, 0x6, 0x80a, 0x3, 0x7, {0x0, @in6={{0xa, 0x4e24, 0x7ff, @remote, 0x401}}, 0xed7, 0xfae6, 0xffff, 0x6, 0x4}}, &(0x7f00000006c0)=0xb0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000740)=r0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000880)={0xffffffffffff7ffa, 0x4, 0x5a, 0xf1, r2}, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f0000000780)='/dev/audio\x00', 0x400000, 0x0) [ 452.679835] FAULT_INJECTION: forcing a failure. [ 452.679835] name failslab, interval 1, probability 0, space 0, times 0 [ 452.722524] CPU: 0 PID: 22303 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 452.729842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.739307] Call Trace: [ 452.741929] dump_stack+0x138/0x19c [ 452.745569] should_fail.cold+0x10f/0x159 [ 452.749728] should_failslab+0xdb/0x130 [ 452.753720] kmem_cache_alloc+0x2d9/0x780 [ 452.757866] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 452.763397] ? check_preemption_disabled+0x3c/0x250 13:16:43 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x3) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) [ 452.768599] selinux_file_alloc_security+0xb4/0x190 [ 452.773879] security_file_alloc+0x73/0xb0 [ 452.778193] get_empty_filp+0x130/0x3b0 [ 452.782263] path_openat+0x8f/0x3f70 [ 452.785982] ? trace_hardirqs_on+0x10/0x10 [ 452.790552] ? check_preemption_disabled+0x3c/0x250 [ 452.795656] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 452.800492] ? find_held_lock+0x35/0x130 [ 452.804554] ? save_trace+0x290/0x290 [ 452.808369] ? __alloc_fd+0x1d4/0x4a0 [ 452.812167] do_filp_open+0x18e/0x250 [ 452.815968] ? may_open_dev+0xe0/0xe0 [ 452.819857] ? lock_downgrade+0x6e0/0x6e0 [ 452.824203] ? _raw_spin_unlock+0x2d/0x50 [ 452.828606] ? __alloc_fd+0x1d4/0x4a0 [ 452.832405] do_sys_open+0x2c5/0x430 [ 452.836125] ? filp_open+0x70/0x70 [ 452.839660] ? fput+0xd4/0x150 [ 452.842841] ? SyS_pwrite64+0xca/0x140 [ 452.846724] SyS_open+0x2d/0x40 [ 452.850012] ? do_sys_open+0x430/0x430 [ 452.853900] do_syscall_64+0x1eb/0x630 [ 452.858052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.862934] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 452.868936] RIP: 0033:0x412bc1 13:16:44 executing program 1 (fault-call:2 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 452.872191] RSP: 002b:00007f2d39caba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 452.880031] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 452.887493] RDX: 00007f2d39cabb0a RSI: 0000000000000002 RDI: 00007f2d39cabb00 [ 452.894849] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 452.902204] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 452.909693] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 453.141607] FAULT_INJECTION: forcing a failure. [ 453.141607] name failslab, interval 1, probability 0, space 0, times 0 [ 453.153377] FAT-fs (loop5): invalid media value (0x00) [ 453.165468] FAT-fs (loop5): Can't find a valid FAT filesystem [ 453.176645] CPU: 1 PID: 22327 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 453.183792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.193537] Call Trace: [ 453.196434] dump_stack+0x138/0x19c [ 453.200435] should_fail.cold+0x10f/0x159 [ 453.204869] should_failslab+0xdb/0x130 [ 453.208899] kmem_cache_alloc_trace+0x2ec/0x790 [ 453.213687] ? __lockdep_init_map+0x10c/0x570 [ 453.218204] ? loop_get_status64+0x120/0x120 [ 453.223149] __kthread_create_on_node+0xe3/0x3e0 [ 453.227933] ? kthread_park+0x140/0x140 [ 453.231928] ? _raw_spin_unlock+0x2d/0x50 [ 453.236085] ? __fget+0x210/0x370 [ 453.239562] ? loop_get_status64+0x120/0x120 [ 453.243996] kthread_create_on_node+0xa8/0xd0 [ 453.248499] ? __kthread_create_on_node+0x3e0/0x3e0 [ 453.253552] ? __lockdep_init_map+0x10c/0x570 [ 453.258091] lo_ioctl+0xce4/0x1c70 [ 453.261642] ? loop_probe+0x160/0x160 [ 453.265467] blkdev_ioctl+0x983/0x1880 [ 453.269362] ? blkpg_ioctl+0x980/0x980 [ 453.273259] ? __might_sleep+0x93/0xb0 [ 453.277152] ? __fget+0x210/0x370 [ 453.280616] block_ioctl+0xde/0x120 [ 453.284255] ? blkdev_fallocate+0x3b0/0x3b0 [ 453.288585] do_vfs_ioctl+0x7b9/0x1070 [ 453.292579] ? selinux_file_mprotect+0x5d0/0x5d0 [ 453.297340] ? lock_downgrade+0x6e0/0x6e0 [ 453.301500] ? ioctl_preallocate+0x1c0/0x1c0 [ 453.305924] ? __fget+0x237/0x370 [ 453.309392] ? security_file_ioctl+0x8f/0xc0 [ 453.313813] SyS_ioctl+0x8f/0xc0 [ 453.317188] ? do_vfs_ioctl+0x1070/0x1070 [ 453.321432] do_syscall_64+0x1eb/0x630 [ 453.325322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.330176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 453.335373] RIP: 0033:0x458a97 [ 453.338731] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.346622] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 453.354005] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 453.361367] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 453.368645] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 453.376626] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:46 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x0, 0x10000, 0x3, {0x77359400}, 0x0, 0xffff}) 13:16:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x20040, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000280)={{0x0, @name="8a0929a84bc997d503d9d066952a006d70adc7c6773e38b415480ffd716d4d7b"}, "f7b9619f377d8e064e97bb9f0851efccb6905404291fb517c0020c44ef50670e", 0x3}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101041) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8c0) 13:16:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:16:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0xebe, 0x7df, 0x1}, 0x2c) 13:16:46 executing program 1 (fault-call:2 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:46 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f00000001c0)=0xc) getpgrp(r0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000cuser_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou0_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 13:16:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 455.430735] FAULT_INJECTION: forcing a failure. [ 455.430735] name failslab, interval 1, probability 0, space 0, times 0 [ 455.446809] CPU: 1 PID: 22351 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 455.454473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.463831] Call Trace: [ 455.466438] dump_stack+0x138/0x19c [ 455.470087] should_fail.cold+0x10f/0x159 [ 455.474430] should_failslab+0xdb/0x130 [ 455.478411] kmem_cache_alloc+0x2d9/0x780 [ 455.482552] ? retint_kernel+0x2d/0x2d [ 455.486471] __kernfs_new_node+0x70/0x420 [ 455.490709] ? kernfs_new_node+0x51/0xf0 [ 455.494954] kernfs_new_node+0x80/0xf0 [ 455.498846] kernfs_create_dir_ns+0x41/0x140 [ 455.503271] internal_create_group+0xea/0x7b0 [ 455.507784] sysfs_create_group+0x20/0x30 [ 455.511936] lo_ioctl+0x1163/0x1c70 [ 455.515565] ? loop_probe+0x160/0x160 [ 455.519356] blkdev_ioctl+0x983/0x1880 [ 455.523319] ? blkpg_ioctl+0x980/0x980 [ 455.527196] ? __might_sleep+0x93/0xb0 [ 455.531114] ? __fget+0x210/0x370 [ 455.534606] block_ioctl+0xde/0x120 [ 455.538919] ? blkdev_fallocate+0x3b0/0x3b0 [ 455.543239] do_vfs_ioctl+0x7b9/0x1070 [ 455.547120] ? selinux_file_mprotect+0x5d0/0x5d0 [ 455.551862] ? lock_downgrade+0x6e0/0x6e0 [ 455.555997] ? ioctl_preallocate+0x1c0/0x1c0 [ 455.560715] ? __fget+0x237/0x370 [ 455.564165] ? security_file_ioctl+0x8f/0xc0 [ 455.568628] SyS_ioctl+0x8f/0xc0 [ 455.572001] ? do_vfs_ioctl+0x1070/0x1070 [ 455.576264] do_syscall_64+0x1eb/0x630 [ 455.580162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 455.585025] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 455.590335] RIP: 0033:0x458a97 [ 455.593536] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 455.601308] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 455.608616] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 455.616117] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 455.623676] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:16:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)={[{@commit={'commit'}}]}) [ 455.631033] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000140)) 13:16:46 executing program 1 (fault-call:2 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 455.907081] gfs2: commit mount option requires a positive numeric argument [ 455.923431] gfs2: can't parse mount arguments [ 456.047401] Unknown ioctl -2129897727 [ 456.130047] FAULT_INJECTION: forcing a failure. [ 456.130047] name failslab, interval 1, probability 0, space 0, times 0 [ 456.141830] CPU: 1 PID: 22387 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 456.148962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.158306] Call Trace: [ 456.160888] dump_stack+0x138/0x19c [ 456.164593] should_fail.cold+0x10f/0x159 [ 456.168938] should_failslab+0xdb/0x130 [ 456.172908] kmem_cache_alloc+0x2d9/0x780 [ 456.177056] ? __mutex_unlock_slowpath+0x71/0x800 [ 456.181921] ? __lock_is_held+0xb6/0x140 [ 456.185977] __kernfs_new_node+0x70/0x420 [ 456.190117] kernfs_new_node+0x80/0xf0 [ 456.193992] __kernfs_create_file+0x46/0x323 [ 456.198480] sysfs_add_file_mode_ns+0x1e4/0x450 [ 456.203152] internal_create_group+0x235/0x7b0 [ 456.207729] sysfs_create_group+0x20/0x30 [ 456.211864] lo_ioctl+0x1163/0x1c70 [ 456.215551] ? loop_probe+0x160/0x160 [ 456.219396] blkdev_ioctl+0x983/0x1880 [ 456.223380] ? blkpg_ioctl+0x980/0x980 [ 456.227286] ? __might_sleep+0x93/0xb0 [ 456.231272] ? __fget+0x210/0x370 [ 456.234724] block_ioctl+0xde/0x120 [ 456.238520] ? blkdev_fallocate+0x3b0/0x3b0 [ 456.242932] do_vfs_ioctl+0x7b9/0x1070 [ 456.246833] ? selinux_file_mprotect+0x5d0/0x5d0 [ 456.251583] ? lock_downgrade+0x6e0/0x6e0 [ 456.255818] ? ioctl_preallocate+0x1c0/0x1c0 [ 456.260216] ? __fget+0x237/0x370 [ 456.263946] ? security_file_ioctl+0x8f/0xc0 [ 456.269053] SyS_ioctl+0x8f/0xc0 [ 456.272603] ? do_vfs_ioctl+0x1070/0x1070 [ 456.276751] do_syscall_64+0x1eb/0x630 [ 456.280626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.285489] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 456.290819] RIP: 0033:0x458a97 [ 456.294087] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 456.301796] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 456.309075] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 456.316537] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 456.323896] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 456.331202] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 456.519001] Unknown ioctl -2129897727 13:16:49 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x1800000000000000, 0x2]) 13:16:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:16:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='hqgetl\x14\x00\x00\x00\t\x00\x00\x00age_ir?\x00\x00\x00es\x00p\x80#\xbe\xc4\xe5\x05\xab\xcd\x7f\xd3so2\xcb\x85o\xd5\x11\xfe.\xb6\xf9\xf2;\xd0\xbe\xa6\xe9\xb9\xa4Aa\xbe\xfb\x9c\xff\xf1', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) read(r1, &(0x7f00000005c0)=""/4096, 0x1000) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000000)) 13:16:49 executing program 1 (fault-call:2 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:49 executing program 0: shmat(0x0, &(0x7f0000953000/0x2000)=nil, 0x0) ustat(0x80000001, &(0x7f0000000000)) [ 458.459958] FAULT_INJECTION: forcing a failure. [ 458.459958] name failslab, interval 1, probability 0, space 0, times 0 [ 458.472020] print_req_error: I/O error, dev loop1, sector 128 [ 458.480298] CPU: 1 PID: 22421 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 458.487449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.496519] Unknown ioctl 1074283780 [ 458.496980] Call Trace: [ 458.497002] dump_stack+0x138/0x19c [ 458.497021] should_fail.cold+0x10f/0x159 [ 458.497038] should_failslab+0xdb/0x130 [ 458.515255] kmem_cache_alloc+0x2d9/0x780 [ 458.519417] ? wait_for_completion+0x420/0x420 [ 458.524523] __kernfs_new_node+0x70/0x420 [ 458.529101] kernfs_new_node+0x80/0xf0 [ 458.533731] __kernfs_create_file+0x46/0x323 [ 458.538161] sysfs_add_file_mode_ns+0x1e4/0x450 [ 458.542848] internal_create_group+0x235/0x7b0 [ 458.547780] sysfs_create_group+0x20/0x30 [ 458.551948] lo_ioctl+0x1163/0x1c70 [ 458.555748] ? loop_probe+0x160/0x160 [ 458.560428] blkdev_ioctl+0x983/0x1880 [ 458.564357] ? blkpg_ioctl+0x980/0x980 [ 458.568417] ? __might_sleep+0x93/0xb0 [ 458.572401] ? __fget+0x210/0x370 [ 458.576032] block_ioctl+0xde/0x120 [ 458.579720] ? blkdev_fallocate+0x3b0/0x3b0 [ 458.584043] do_vfs_ioctl+0x7b9/0x1070 [ 458.587926] ? selinux_file_mprotect+0x5d0/0x5d0 [ 458.592687] ? lock_downgrade+0x6e0/0x6e0 [ 458.596825] ? ioctl_preallocate+0x1c0/0x1c0 [ 458.601313] ? __fget+0x237/0x370 [ 458.604779] ? security_file_ioctl+0x8f/0xc0 [ 458.609207] SyS_ioctl+0x8f/0xc0 [ 458.612569] ? do_vfs_ioctl+0x1070/0x1070 [ 458.616741] do_syscall_64+0x1eb/0x630 [ 458.620841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.625794] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 458.630979] RIP: 0033:0x458a97 [ 458.634153] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 458.641940] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 458.649211] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 13:16:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x1f, 0x3}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000048000/0x2000)=nil}) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f0000000240), 0x5, &(0x7f00000002c0)=""/161, 0xa1}}, {{&(0x7f0000000380)=@alg, 0x80, &(0x7f0000004840)=[{&(0x7f0000000400)=""/195, 0xc3}, {&(0x7f0000000500)=""/156, 0x9c}], 0x2}, 0x7}, {{&(0x7f00000005c0)=@l2, 0x80, &(0x7f0000000740)=[{&(0x7f0000000640)=""/194, 0xc2}], 0x1, &(0x7f0000000780)=""/168, 0xa8}, 0x8}, {{&(0x7f0000000840)=@ipx, 0x80, &(0x7f0000000a80)=[{&(0x7f00000008c0)=""/218, 0xda}, {&(0x7f00000009c0)=""/178, 0xb2}], 0x2, &(0x7f0000000ac0)=""/225, 0xe1}, 0x3}, {{&(0x7f0000000bc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000c40)=""/4096, 0x1000}], 0x1, &(0x7f0000001c80)=""/110, 0x6e}, 0x6}, {{&(0x7f0000001d00)=@caif=@dbg, 0x80, &(0x7f0000002fc0)=[{&(0x7f00000048c0)=""/136, 0x88}, {&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/142, 0x8e}, {&(0x7f0000002f00)=""/186, 0xba}], 0x4, &(0x7f0000003000)=""/171, 0xab}, 0x8}, {{&(0x7f00000030c0)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000004280)=[{&(0x7f0000003140)=""/48, 0x30}, {&(0x7f0000003180)=""/197, 0xc5}, {&(0x7f0000003280)=""/4096, 0x1000}], 0x3, &(0x7f0000004980)=""/35, 0x23}, 0xff}, {{&(0x7f0000004300)=@hci, 0x80, &(0x7f0000004440)=[{&(0x7f0000004380)=""/156, 0x9c}], 0x1000000000000264}, 0x8}], 0x8, 0x2000, &(0x7f0000004880)={0x0, 0x1c9c380}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000046c0)={0x0, 0x5, 0x10, 0x4, 0x4}, &(0x7f0000004700)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000004780)={r3, @in={{0x2, 0x4e22, @loopback}}, 0x5, 0x48, 0x5, 0x3, 0x10}, 0x98) arch_prctl$ARCH_GET_CPUID(0x1011) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000004740)={0x1, 0x13, 0x2, 0x3d, 0x2800000000000000, 0x1000, 0x2c3a, 0x65, r3}, 0x20) 13:16:49 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x4000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xb0, "6635e9653d5f7ad81ed75120f2db5dec8ac25258c1c1a0d4730b5bca57a886557fd941b9c87f14e5883ed2d0f2d30be837eab077eed7c538065062cd3dd1f872e68e5a58e9ac6817d9a2defa40cc04bb8774a03e9f4fdc22a189437c66588f45b97e2f377a281657bc3469727cf86f44827aa6c69fff8e413451079bac6d0d7c7187a347d345cb2ef9ea4ffeeb8c9088cb535ff3a672e0120cd47130db5a23ab46474371db60f8deaa50152c955f555c"}, &(0x7f0000000140)=0xb8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000180)={r2}, 0x8) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 458.656491] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 458.664191] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 458.672000] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:16:49 executing program 1 (fault-call:2 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 458.825835] Unknown ioctl 1074283780 13:16:50 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x3d3427e) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='pipefs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000100)) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x23) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") 13:16:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000100)=0xffffffffffffffd5) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffff8}) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 458.918603] FAULT_INJECTION: forcing a failure. [ 458.918603] name failslab, interval 1, probability 0, space 0, times 0 [ 458.930972] CPU: 0 PID: 22450 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 458.938543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.948512] Call Trace: [ 458.951120] dump_stack+0x138/0x19c [ 458.954883] should_fail.cold+0x10f/0x159 [ 458.959423] should_failslab+0xdb/0x130 [ 458.963425] kmem_cache_alloc+0x2d9/0x780 [ 458.967579] ? wait_for_completion+0x420/0x420 [ 458.972156] __kernfs_new_node+0x70/0x420 [ 458.976312] kernfs_new_node+0x80/0xf0 [ 458.980200] __kernfs_create_file+0x46/0x323 [ 458.984604] sysfs_add_file_mode_ns+0x1e4/0x450 [ 458.989698] internal_create_group+0x235/0x7b0 [ 458.994277] sysfs_create_group+0x20/0x30 [ 458.998605] lo_ioctl+0x1163/0x1c70 [ 459.002235] ? loop_probe+0x160/0x160 [ 459.006056] blkdev_ioctl+0x983/0x1880 [ 459.009945] ? blkpg_ioctl+0x980/0x980 [ 459.013824] ? __might_sleep+0x93/0xb0 [ 459.017872] ? __fget+0x210/0x370 [ 459.021319] block_ioctl+0xde/0x120 [ 459.024965] ? blkdev_fallocate+0x3b0/0x3b0 [ 459.029274] do_vfs_ioctl+0x7b9/0x1070 [ 459.033253] ? selinux_file_mprotect+0x5d0/0x5d0 [ 459.037999] ? lock_downgrade+0x6e0/0x6e0 [ 459.042227] ? ioctl_preallocate+0x1c0/0x1c0 [ 459.046742] ? __fget+0x237/0x370 [ 459.050235] ? security_file_ioctl+0x8f/0xc0 [ 459.054867] SyS_ioctl+0x8f/0xc0 [ 459.058655] ? do_vfs_ioctl+0x1070/0x1070 [ 459.062799] do_syscall_64+0x1eb/0x630 [ 459.066697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.071545] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 459.076824] RIP: 0033:0x458a97 [ 459.080016] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 459.088069] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 459.095422] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 459.102789] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 459.110169] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 459.117436] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:52 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x100004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10}, 0xfffffd2a) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) shutdown(r1, 0x80000000001) 13:16:52 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x61}, {0x80000006}]}, 0x10) 13:16:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:16:52 executing program 1 (fault-call:2 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000800)=0x2, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84001) sysfs$3(0x3) getresgid(&(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)=0x0) r5 = getuid() getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000540)=""/171, &(0x7f0000000000)=0xab) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000380)=0xe8) mount$9p_xen(&(0x7f0000000080)='eth0-xsecurity$\x9b\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4, &(0x7f00000003c0)={'trans=xen,', {[{@dfltgid={'dfltgid', 0x3d, r4}}], [{@obj_role={'obj_role', 0x3d, 'ip6tnl\x00'}}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@euid_gt={'euid>', r5}}, {@uid_gt={'uid>', r6}}]}}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', r3}, 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000680), 0x4) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000640)={0x2, "a8fd31414978e82d652fb9164862c58b5c1b1e37c739aa54844653031fdc4e57", 0x1, 0x1}) lsetxattr$trusted_overlay_origin(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='trusted.overlay.origin\x00', &(0x7f00000008c0)='y\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000740)={[], 0x200, 0x5, 0x2, 0x5, 0x9, r7}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c0000001000070700"/20, @ANYRES32=0x0, @ANYBLOB="5a00000c000200080001c000000000"], 0x3c}}, 0x0) [ 461.536745] FAULT_INJECTION: forcing a failure. [ 461.536745] name failslab, interval 1, probability 0, space 0, times 0 [ 461.548486] CPU: 0 PID: 22479 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 461.555572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.565345] Call Trace: [ 461.567937] dump_stack+0x138/0x19c [ 461.571650] should_fail.cold+0x10f/0x159 [ 461.575823] should_failslab+0xdb/0x130 [ 461.579805] kmem_cache_alloc+0x2d9/0x780 [ 461.583949] ? wait_for_completion+0x420/0x420 [ 461.588575] __kernfs_new_node+0x70/0x420 [ 461.592735] kernfs_new_node+0x80/0xf0 [ 461.596649] __kernfs_create_file+0x46/0x323 [ 461.601057] sysfs_add_file_mode_ns+0x1e4/0x450 [ 461.605715] internal_create_group+0x235/0x7b0 [ 461.610289] sysfs_create_group+0x20/0x30 [ 461.614425] lo_ioctl+0x1163/0x1c70 [ 461.618043] ? loop_probe+0x160/0x160 [ 461.621870] blkdev_ioctl+0x983/0x1880 [ 461.625753] ? blkpg_ioctl+0x980/0x980 [ 461.629656] ? __might_sleep+0x93/0xb0 [ 461.633644] ? __fget+0x210/0x370 [ 461.637145] block_ioctl+0xde/0x120 [ 461.640771] ? blkdev_fallocate+0x3b0/0x3b0 [ 461.645081] do_vfs_ioctl+0x7b9/0x1070 [ 461.649052] ? selinux_file_mprotect+0x5d0/0x5d0 [ 461.653889] ? lock_downgrade+0x6e0/0x6e0 [ 461.658025] ? ioctl_preallocate+0x1c0/0x1c0 [ 461.662429] ? __fget+0x237/0x370 [ 461.665903] ? security_file_ioctl+0x8f/0xc0 [ 461.670584] SyS_ioctl+0x8f/0xc0 [ 461.673940] ? do_vfs_ioctl+0x1070/0x1070 [ 461.678596] do_syscall_64+0x1eb/0x630 [ 461.682560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.687502] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.692702] RIP: 0033:0x458a97 [ 461.695882] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.703593] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 461.710859] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 461.718141] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 461.725423] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:16:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 461.732694] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ee4ba719891942d8262617a4b1b83bbf5b09bc040000000f1339414a42735296fbd7d6a1", 0x297) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000000c0)={0x9, 0x20, [0x20, 0x1, 0x1000, 0x5, 0x604, 0x7, 0x2, 0x2]}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="a0f9e17784fcf5492bbb22113f5a0a693a17d8a8b819158a9ee39e4c6809e7afb8a8e49cf6d42f15d039f00d73af32524fbff70a22d632a9188e0e1eafcf9f0d", 0x40) 13:16:52 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x202000, 0x0) bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x0, 0x2, 0x7fff, 0x400}, 0x6) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000100)=""/12) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x402, 0x70bd2b, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7ff}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x20000801) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_default\x00', &(0x7f0000000300)=""/72, 0x48) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000380)={0xe, 0x2, 0x1, 0x7fffffff, 0x71, "b14406538d54945ee4a6668fdb6f7cc63795d8788df90fca10b81732d2057fd93bc3a6b6f363d4e57ece6956584d44c407ffba4fe2a121634c97fb07d2cfe43d3cf3cac414495e4b2908a66a78d0ce72fb1ee6fa130bbd7c0bb7dbdc48727671a9ad89c1fe93636cbca6e2c53f1fdfc853"}, 0x7d) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)=0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x1e, 0x0, @tid=r5}, &(0x7f0000000480)) r6 = epoll_create(0x2) fcntl$setpipe(r1, 0x407, 0x9) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000004c0)=0xffff, 0x8) mq_open(&(0x7f0000000500)='}#/\'^:self\x00', 0x2, 0x18, &(0x7f0000000540)={0xfffffffffffff000, 0x401, 0x8, 0xd2d3, 0x3aa, 0xc72, 0x57, 0x7fff}) r7 = fcntl$dupfd(r3, 0x406, r2) ioctl$DRM_IOCTL_GET_UNIQUE(r7, 0xc0106401, &(0x7f0000001580)={0x1000, &(0x7f0000000580)=""/4096}) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f00000015c0)) write$ppp(r0, &(0x7f0000001600)="3e9535a4413f9beebcbb59f926247a5c27e746733ef80d01b5608b74adc12495af21f745803b3aefee9ca2e3b9e8a25eb1b3132becf5ecbd4ee18fb41ef44f3e7b6111d4132b28a08005f024616803b72cce5ccb", 0x54) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000001680)={0x100, 0x1ff, [0x1a6c, 0x6, 0x101, 0x7, 0x7], 0x3}) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001700)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f00000018c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001880)={&(0x7f0000001740)={0x120, r8, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x9}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x60000}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8e580}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x4) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000001900)) prctl$PR_SET_PDEATHSIG(0x1, 0x1b) ioctl$SG_GET_ACCESS_COUNT(r7, 0x2289, &(0x7f0000001940)) kcmp(r5, r5, 0x0, r0, r6) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000002980)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000001980)="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", 0x1000, r0}, 0x68) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000002a00)) 13:16:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f00000000c0)='./file0\x00', r1, r2, 0x400) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000002880)={0x1, @win={{0x0, 0x2f}, 0x0, 0x0, 0x0, 0x0, 0x0}}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r4, 0xaea2, 0xfffffffffffffff7) 13:16:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, {{0x2, 0x0, @dev}}}, 0x90) 13:16:53 executing program 5: perf_event_open(&(0x7f000001d000)={0xfffffffffffffffe, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x80000000000003, 0x73) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x24c, 0x3f14) 13:16:55 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, 0x0, 0x20000, 0x0) clone(0x2e828903, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpgid(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:16:55 executing program 1 (fault-call:2 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:16:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netrom(r0, &(0x7f00000000c0)={{0x3, @bcast, 0x1}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x401, 0x880) ioctl$PPPIOCDISCONN(r1, 0x7439) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000080)={0x0, 0xfff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x4, 0x7d, 0x0, r1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x3c) 13:16:55 executing program 0: r0 = socket$inet6(0x10, 0x8, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f0412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154004000400d40000dc1338d54400fc9b84136ef75afb83de44110016000d0001400000060cec4faba7d4", 0x55}], 0x1}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x100, 0x1, 0x2, 0x6}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000180)=0x1f) [ 464.577025] FAULT_INJECTION: forcing a failure. [ 464.577025] name failslab, interval 1, probability 0, space 0, times 0 [ 464.595716] CPU: 1 PID: 22527 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 464.602867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.612317] Call Trace: [ 464.614935] dump_stack+0x138/0x19c [ 464.618761] should_fail.cold+0x10f/0x159 [ 464.622947] should_failslab+0xdb/0x130 13:16:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @broadcast}, 0x70, {0x2, 0x4e22, @remote}, 'team_slave_0\x00'}) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_FPEXC(0xb, &(0x7f00000000c0)) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000180)=0x5, 0x4) poll(&(0x7f0000000100)=[{r1, 0x8341}], 0xb8, 0x0) [ 464.627156] kmem_cache_alloc+0x2d9/0x780 [ 464.631318] ? wait_for_completion+0x420/0x420 [ 464.635994] __kernfs_new_node+0x70/0x420 [ 464.640568] kernfs_new_node+0x80/0xf0 [ 464.644442] __kernfs_create_file+0x46/0x323 [ 464.649336] sysfs_add_file_mode_ns+0x1e4/0x450 [ 464.654254] internal_create_group+0x235/0x7b0 [ 464.658962] sysfs_create_group+0x20/0x30 [ 464.663120] lo_ioctl+0x1163/0x1c70 [ 464.666826] ? loop_probe+0x160/0x160 [ 464.670715] blkdev_ioctl+0x983/0x1880 [ 464.674754] ? blkpg_ioctl+0x980/0x980 [ 464.678778] ? __might_sleep+0x93/0xb0 [ 464.682658] ? __fget+0x210/0x370 [ 464.686148] block_ioctl+0xde/0x120 [ 464.689987] ? blkdev_fallocate+0x3b0/0x3b0 [ 464.694398] do_vfs_ioctl+0x7b9/0x1070 [ 464.698362] ? selinux_file_mprotect+0x5d0/0x5d0 [ 464.703107] ? lock_downgrade+0x6e0/0x6e0 [ 464.707247] ? ioctl_preallocate+0x1c0/0x1c0 [ 464.711659] ? __fget+0x237/0x370 [ 464.715195] ? security_file_ioctl+0x8f/0xc0 [ 464.719608] SyS_ioctl+0x8f/0xc0 [ 464.722966] ? do_vfs_ioctl+0x1070/0x1070 [ 464.727291] do_syscall_64+0x1eb/0x630 [ 464.731279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.736231] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.741499] RIP: 0033:0x458a97 [ 464.744703] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.752500] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 464.759869] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 464.767407] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:16:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) [ 464.774663] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 464.781945] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:55 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x9b7}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r1, 0x4}, 0x8) fchdir(r0) open(&(0x7f0000000240)='./file0\x00', 0x141042, 0xfffffffffffffffc) linkat(r0, &(0x7f0000000040)='./bus\x00', r0, &(0x7f0000000080)='./file0\x00', 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 13:16:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:16:55 executing program 1 (fault-call:2 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:56 executing program 0: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2f3a66696c65302c776f726b6469723d2e2f66696ca531"]) [ 464.999991] FAULT_INJECTION: forcing a failure. [ 464.999991] name failslab, interval 1, probability 0, space 0, times 0 [ 465.016505] CPU: 1 PID: 22562 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 465.023556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.032915] Call Trace: [ 465.035504] dump_stack+0x138/0x19c [ 465.039210] should_fail.cold+0x10f/0x159 [ 465.043347] should_failslab+0xdb/0x130 [ 465.047312] kmem_cache_alloc+0x2d9/0x780 [ 465.051442] ? wait_for_completion+0x420/0x420 [ 465.056023] __kernfs_new_node+0x70/0x420 [ 465.060157] kernfs_new_node+0x80/0xf0 [ 465.064038] __kernfs_create_file+0x46/0x323 [ 465.068430] sysfs_add_file_mode_ns+0x1e4/0x450 [ 465.073089] internal_create_group+0x235/0x7b0 [ 465.077659] sysfs_create_group+0x20/0x30 [ 465.081799] lo_ioctl+0x1163/0x1c70 [ 465.085428] ? loop_probe+0x160/0x160 [ 465.089225] blkdev_ioctl+0x983/0x1880 [ 465.093098] ? blkpg_ioctl+0x980/0x980 [ 465.096974] ? __might_sleep+0x93/0xb0 [ 465.100843] ? __fget+0x210/0x370 [ 465.104281] block_ioctl+0xde/0x120 [ 465.107912] ? blkdev_fallocate+0x3b0/0x3b0 [ 465.112216] do_vfs_ioctl+0x7b9/0x1070 [ 465.116089] ? selinux_file_mprotect+0x5d0/0x5d0 [ 465.120831] ? lock_downgrade+0x6e0/0x6e0 [ 465.124990] ? ioctl_preallocate+0x1c0/0x1c0 [ 465.129474] ? __fget+0x237/0x370 [ 465.132914] ? security_file_ioctl+0x8f/0xc0 [ 465.137307] SyS_ioctl+0x8f/0xc0 [ 465.140653] ? do_vfs_ioctl+0x1070/0x1070 [ 465.144786] do_syscall_64+0x1eb/0x630 [ 465.148671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 465.153503] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 465.158685] RIP: 0033:0x458a97 [ 465.161854] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.169638] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 465.176894] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 465.184243] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 465.191513] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 465.198850] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:58 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) connect$rds(r1, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x1}, 0x10) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffffffffffffffe, @loopback}, 0x5c2d6a6b2954ee48) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x140, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0) 13:16:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:16:58 executing program 1 (fault-call:2 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000400)=0x7ff) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}], 0x1}}], 0x1, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000300)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340)={0x0, 0x1}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000003c0)={r3, 0x8}, 0x8) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000080)=""/122, &(0x7f0000000180)=0x7a) getsockname(r1, &(0x7f0000000240)=@xdp, &(0x7f00000001c0)=0x80) 13:16:58 executing program 2: syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x4, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x3, 0x8}}}}}}, 0x0) 13:16:58 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:16:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) getpeername$unix(r0, 0x0, 0x0) [ 467.626007] FAULT_INJECTION: forcing a failure. [ 467.626007] name failslab, interval 1, probability 0, space 0, times 0 [ 467.637877] CPU: 0 PID: 22583 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 467.644993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.654443] Call Trace: [ 467.657050] dump_stack+0x138/0x19c [ 467.660706] should_fail.cold+0x10f/0x159 [ 467.664875] should_failslab+0xdb/0x130 [ 467.668863] kmem_cache_alloc+0x2d9/0x780 13:16:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3a3, 0x10000000000) [ 467.673015] ? wait_for_completion+0x420/0x420 [ 467.677595] __kernfs_new_node+0x70/0x420 [ 467.681741] kernfs_new_node+0x80/0xf0 [ 467.685630] __kernfs_create_file+0x46/0x323 [ 467.690221] sysfs_add_file_mode_ns+0x1e4/0x450 [ 467.694930] internal_create_group+0x235/0x7b0 [ 467.699509] sysfs_create_group+0x20/0x30 [ 467.703676] lo_ioctl+0x1163/0x1c70 [ 467.707293] ? loop_probe+0x160/0x160 [ 467.711198] blkdev_ioctl+0x983/0x1880 [ 467.715073] ? blkpg_ioctl+0x980/0x980 [ 467.718947] ? __might_sleep+0x93/0xb0 [ 467.722836] ? __fget+0x210/0x370 [ 467.726284] block_ioctl+0xde/0x120 [ 467.730105] ? blkdev_fallocate+0x3b0/0x3b0 [ 467.734407] do_vfs_ioctl+0x7b9/0x1070 [ 467.738373] ? selinux_file_mprotect+0x5d0/0x5d0 [ 467.743114] ? lock_downgrade+0x6e0/0x6e0 [ 467.747252] ? ioctl_preallocate+0x1c0/0x1c0 [ 467.751655] ? __fget+0x237/0x370 [ 467.755097] ? security_file_ioctl+0x8f/0xc0 [ 467.759582] SyS_ioctl+0x8f/0xc0 [ 467.762936] ? do_vfs_ioctl+0x1070/0x1070 [ 467.767075] do_syscall_64+0x1eb/0x630 [ 467.770954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.775783] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 467.781057] RIP: 0033:0x458a97 [ 467.784327] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 467.792034] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 467.799382] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 467.806659] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 467.813912] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:16:58 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 467.821216] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:16:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:16:58 executing program 1 (fault-call:2 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:16:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60f0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/43, 0x2b}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(r0, &(0x7f0000000700)='cpu.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x44000) [ 467.913442] device nr0 entered promiscuous mode [ 467.973855] FAULT_INJECTION: forcing a failure. [ 467.973855] name failslab, interval 1, probability 0, space 0, times 0 [ 467.995567] CPU: 0 PID: 22613 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 468.002615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.002621] Call Trace: [ 468.002650] dump_stack+0x138/0x19c [ 468.002670] should_fail.cold+0x10f/0x159 [ 468.002687] should_failslab+0xdb/0x130 [ 468.002701] kmem_cache_alloc+0x2d9/0x780 [ 468.030781] ? wait_for_completion+0x420/0x420 [ 468.035474] __kernfs_new_node+0x70/0x420 [ 468.039619] kernfs_new_node+0x80/0xf0 [ 468.043507] __kernfs_create_file+0x46/0x323 [ 468.047911] sysfs_add_file_mode_ns+0x1e4/0x450 [ 468.052588] internal_create_group+0x235/0x7b0 [ 468.057254] sysfs_create_group+0x20/0x30 [ 468.061387] lo_ioctl+0x1163/0x1c70 [ 468.065002] ? loop_probe+0x160/0x160 [ 468.068791] blkdev_ioctl+0x983/0x1880 [ 468.072682] ? blkpg_ioctl+0x980/0x980 [ 468.076996] ? __might_sleep+0x93/0xb0 [ 468.080867] ? __fget+0x210/0x370 [ 468.084305] block_ioctl+0xde/0x120 [ 468.087912] ? blkdev_fallocate+0x3b0/0x3b0 [ 468.092214] do_vfs_ioctl+0x7b9/0x1070 [ 468.096128] ? selinux_file_mprotect+0x5d0/0x5d0 [ 468.100880] ? lock_downgrade+0x6e0/0x6e0 [ 468.105040] ? ioctl_preallocate+0x1c0/0x1c0 [ 468.109431] ? __fget+0x237/0x370 [ 468.112888] ? security_file_ioctl+0x8f/0xc0 [ 468.117290] SyS_ioctl+0x8f/0xc0 [ 468.120674] ? do_vfs_ioctl+0x1070/0x1070 [ 468.124894] do_syscall_64+0x1eb/0x630 [ 468.128765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 468.133608] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 468.138789] RIP: 0033:0x458a97 [ 468.141960] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 468.151022] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 468.158281] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 468.165649] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 468.172903] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 468.180156] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 468.199719] device nr0 entered promiscuous mode 13:16:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ce939a13bbf2d3594b1824ebba8d707a5d078e443f8d670ae32c7e6c98ce44ca70a4ddbfe8a248f6b128dda5dae278f6da9424bb945c40bb00", 0x14}, 0x60) sendmmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x48010) 13:16:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ce939ada2d0823594b1824ebba8d707a5dd682078e443f8d670ac32c7e6c98ce44ca70a4ddbfe8f748f6b128dda5dae2989444073278f6da9424bb945c40bb"}, 0x60) sendmmsg$nfc_llcp(r1, &(0x7f0000006640)=[{&(0x7f0000000140)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "31d1cfa4e447f11d1500fd253d21632f9255fe7cc37da25f8ed8879ee0e469a0636467fa272ec4700748c4897ef18e5491cbab148dd6dd3799b94f84463ccd"}, 0x60, 0x0}], 0x1, 0x48010) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000003c00)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @dev, @remote}, &(0x7f0000003d00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003d40)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003dc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000003f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000004140)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004180)={{{@in=@remote, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000004280)=0xe8) clock_gettime(0x0, &(0x7f0000005d00)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40012003, &(0x7f0000005d40)={r2, r3+10000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005e40)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000005f40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005fc0)={{{@in6=@dev, @in6=@initdev}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000060c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000061c0)={'veth1_to_bond\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006200)={{{@in6=@dev, @in6=@initdev}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x40000) 13:16:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:16:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2", 0xd1, 0x10000}], 0x0, 0x0) 13:16:59 executing program 1 (fault-call:2 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 468.430377] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 468.440670] FAULT_INJECTION: forcing a failure. [ 468.440670] name failslab, interval 1, probability 0, space 0, times 0 [ 468.447644] BTRFS error (device loop5): superblock checksum mismatch [ 468.454514] CPU: 1 PID: 22644 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 468.466233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.476674] Call Trace: [ 468.480174] dump_stack+0x138/0x19c [ 468.483806] should_fail.cold+0x10f/0x159 [ 468.487952] should_failslab+0xdb/0x130 [ 468.492001] kmem_cache_alloc_node+0x28a/0x780 [ 468.496665] __alloc_skb+0x9c/0x500 [ 468.500360] ? skb_scrub_packet+0x4b0/0x4b0 [ 468.504849] ? netlink_has_listeners+0x20a/0x330 [ 468.509602] kobject_uevent_env+0x74c/0xc41 [ 468.513918] ? internal_create_group+0x4a0/0x7b0 [ 468.518922] kobject_uevent+0x20/0x26 [ 468.522719] lo_ioctl+0x11d3/0x1c70 [ 468.526336] ? loop_probe+0x160/0x160 [ 468.530121] blkdev_ioctl+0x983/0x1880 [ 468.534005] ? blkpg_ioctl+0x980/0x980 [ 468.538372] ? __might_sleep+0x93/0xb0 [ 468.542241] ? __fget+0x210/0x370 [ 468.546054] block_ioctl+0xde/0x120 [ 468.549755] ? blkdev_fallocate+0x3b0/0x3b0 [ 468.554079] do_vfs_ioctl+0x7b9/0x1070 [ 468.557963] ? selinux_file_mprotect+0x5d0/0x5d0 [ 468.562709] ? lock_downgrade+0x6e0/0x6e0 [ 468.567026] ? ioctl_preallocate+0x1c0/0x1c0 [ 468.571523] ? __fget+0x237/0x370 [ 468.575002] ? security_file_ioctl+0x8f/0xc0 [ 468.579492] SyS_ioctl+0x8f/0xc0 [ 468.582845] ? do_vfs_ioctl+0x1070/0x1070 [ 468.586980] do_syscall_64+0x1eb/0x630 [ 468.591201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 468.596033] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 468.601209] RIP: 0033:0x458a97 [ 468.604559] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 468.612269] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 468.619697] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 468.627210] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 468.634461] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 468.641715] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 468.679495] BTRFS error (device loop5): open_ctree failed [ 468.700455] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 468.707992] BTRFS error (device loop5): superblock checksum mismatch [ 468.760618] BTRFS error (device loop5): open_ctree failed [ 470.297775] audit: type=1400 audit(1555420621.297:139): avc: denied { map } for pid=22659 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 13:17:01 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:01 executing program 0: clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000300)={0x0, @initdev, 0x4e23, 0x0, 'ovf\x00'}, 0x2c) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000240)='rxrpc_s\x00', 0x0, 0x0) 13:17:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="4acb"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:17:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:17:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2", 0xd1, 0x10000}], 0x0, 0x0) 13:17:01 executing program 1 (fault-call:2 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xe500, 0x2000000) [ 470.667891] IPVS: set_ctl: invalid protocol: 0 172.30.0.0:20003 13:17:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 470.735520] BTRFS error (device loop5): unsupported checksum algorithm 22813 [ 470.744614] FAULT_INJECTION: forcing a failure. [ 470.744614] name failslab, interval 1, probability 0, space 0, times 0 [ 470.757786] CPU: 1 PID: 22670 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 470.764828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.774289] Call Trace: [ 470.776887] dump_stack+0x138/0x19c 13:17:01 executing program 2: r0 = socket(0x1e, 0x1, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 470.777582] BTRFS error (device loop5): superblock checksum mismatch [ 470.780524] should_fail.cold+0x10f/0x159 [ 470.780543] should_failslab+0xdb/0x130 [ 470.780560] kmem_cache_alloc_node_trace+0x283/0x770 [ 470.800219] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 470.805786] __kmalloc_node_track_caller+0x3d/0x80 [ 470.810709] __kmalloc_reserve.isra.0+0x40/0xe0 [ 470.815362] __alloc_skb+0xcf/0x500 [ 470.818980] ? skb_scrub_packet+0x4b0/0x4b0 [ 470.823285] ? netlink_has_listeners+0x20a/0x330 [ 470.828030] kobject_uevent_env+0x74c/0xc41 [ 470.832335] ? internal_create_group+0x4a0/0x7b0 [ 470.837077] kobject_uevent+0x20/0x26 [ 470.840861] lo_ioctl+0x11d3/0x1c70 [ 470.844473] ? loop_probe+0x160/0x160 [ 470.848275] blkdev_ioctl+0x983/0x1880 [ 470.852146] ? blkpg_ioctl+0x980/0x980 [ 470.856036] ? __might_sleep+0x93/0xb0 [ 470.859906] ? __fget+0x210/0x370 [ 470.863342] block_ioctl+0xde/0x120 [ 470.867061] ? blkdev_fallocate+0x3b0/0x3b0 [ 470.871362] do_vfs_ioctl+0x7b9/0x1070 [ 470.875242] ? selinux_file_mprotect+0x5d0/0x5d0 [ 470.880160] ? lock_downgrade+0x6e0/0x6e0 [ 470.884291] ? ioctl_preallocate+0x1c0/0x1c0 [ 470.888681] ? __fget+0x237/0x370 [ 470.892123] ? security_file_ioctl+0x8f/0xc0 [ 470.896528] SyS_ioctl+0x8f/0xc0 [ 470.899880] ? do_vfs_ioctl+0x1070/0x1070 [ 470.904014] do_syscall_64+0x1eb/0x630 [ 470.907883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 470.912717] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 470.917983] RIP: 0033:0x458a97 [ 470.921339] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 470.929393] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 470.936864] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 470.944160] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 470.951800] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 470.959061] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e", 0xe0, 0x10000}], 0x0, 0x0) 13:17:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) [ 471.021198] BTRFS error (device loop5): open_ctree failed [ 471.033428] BTRFS error (device loop5): unsupported checksum algorithm 22813 13:17:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100), 0x0) [ 471.081139] BTRFS error (device loop5): superblock checksum mismatch [ 471.139931] BTRFS error (device loop5): open_ctree failed [ 471.211457] print_req_error: I/O error, dev loop1, sector 128 [ 471.222095] BTRFS error (device loop0): unsupported checksum algorithm 22813 [ 471.229457] BTRFS error (device loop0): superblock checksum mismatch [ 471.285359] BTRFS error (device loop0): open_ctree failed [ 471.338418] BTRFS error (device loop0): unsupported checksum algorithm 22813 [ 471.346111] BTRFS error (device loop0): superblock checksum mismatch [ 471.402203] BTRFS error (device loop0): open_ctree failed 13:17:04 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:04 executing program 2: socket$inet(0x2, 0x801, 0x7) 13:17:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x1c000) 13:17:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x15000) 13:17:04 executing program 1 (fault-call:2 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x1d000) [ 473.738627] FAULT_INJECTION: forcing a failure. [ 473.738627] name failslab, interval 1, probability 0, space 0, times 0 [ 473.756584] CPU: 1 PID: 22724 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 473.763736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.773196] Call Trace: [ 473.775805] dump_stack+0x138/0x19c [ 473.779451] should_fail.cold+0x10f/0x159 [ 473.783648] should_failslab+0xdb/0x130 [ 473.788424] kmem_cache_alloc_node+0x28a/0x780 [ 473.793031] __alloc_skb+0x9c/0x500 [ 473.796671] ? skb_scrub_packet+0x4b0/0x4b0 [ 473.801000] ? netlink_has_listeners+0x20a/0x330 [ 473.805759] kobject_uevent_env+0x74c/0xc41 [ 473.810083] ? internal_create_group+0x4a0/0x7b0 [ 473.815016] kobject_uevent+0x20/0x26 [ 473.818812] lo_ioctl+0x11d3/0x1c70 [ 473.822564] ? loop_probe+0x160/0x160 [ 473.826464] blkdev_ioctl+0x983/0x1880 [ 473.830358] ? blkpg_ioctl+0x980/0x980 [ 473.834259] ? __might_sleep+0x93/0xb0 13:17:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ce939ada2d0823594b1824ebba8d707a5dd682078e443f8d670ac32c7e6c98ce44ca70a4ddbfe8f748f6b128dda5dae2989444073278f6da9424bb945c40bb"}, 0x60) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x220400, 0x0) [ 473.838148] ? __fget+0x210/0x370 [ 473.841693] block_ioctl+0xde/0x120 [ 473.845327] ? blkdev_fallocate+0x3b0/0x3b0 [ 473.849674] do_vfs_ioctl+0x7b9/0x1070 [ 473.853581] ? selinux_file_mprotect+0x5d0/0x5d0 [ 473.858519] ? lock_downgrade+0x6e0/0x6e0 [ 473.862761] ? ioctl_preallocate+0x1c0/0x1c0 [ 473.867177] ? __fget+0x237/0x370 [ 473.871243] ? security_file_ioctl+0x8f/0xc0 [ 473.875956] SyS_ioctl+0x8f/0xc0 [ 473.879450] ? do_vfs_ioctl+0x1070/0x1070 [ 473.883824] do_syscall_64+0x1eb/0x630 [ 473.887709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 473.892785] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 473.898046] RIP: 0033:0x458a97 [ 473.901217] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 473.909036] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 473.916906] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 473.924252] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 473.932126] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:17:04 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open$dir(0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) 13:17:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x7, 0x0, &(0x7f00000004c0)) 13:17:04 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x77, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x240, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x9400}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x10000054d) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") [ 473.939499] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) 13:17:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000480), 0x0) accept4(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, &(0x7f00000000c0)=0x80, 0x80800) 13:17:07 executing program 4: 13:17:07 executing program 1 (fault-call:2 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:07 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:07 executing program 2: 13:17:07 executing program 0: 13:17:07 executing program 5: 13:17:07 executing program 4: 13:17:07 executing program 2: 13:17:07 executing program 4: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) 13:17:07 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0xb, 0x0) 13:17:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x21, &(0x7f0000004ff0)={0x0, 0x0}, 0x10) [ 476.821896] FAULT_INJECTION: forcing a failure. [ 476.821896] name failslab, interval 1, probability 0, space 0, times 0 [ 476.844009] CPU: 0 PID: 22776 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 476.851065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.860530] Call Trace: [ 476.863129] dump_stack+0x138/0x19c [ 476.866767] should_fail.cold+0x10f/0x159 [ 476.871177] should_failslab+0xdb/0x130 [ 476.875165] kmem_cache_alloc_node+0x28a/0x780 [ 476.879761] __alloc_skb+0x9c/0x500 [ 476.883388] ? skb_scrub_packet+0x4b0/0x4b0 [ 476.887706] ? netlink_has_listeners+0x20a/0x330 [ 476.892474] kobject_uevent_env+0x74c/0xc41 [ 476.896790] kobject_uevent+0x20/0x26 [ 476.900690] lo_ioctl+0x11d3/0x1c70 [ 476.904314] ? loop_probe+0x160/0x160 [ 476.908107] blkdev_ioctl+0x983/0x1880 [ 476.912063] ? blkpg_ioctl+0x980/0x980 [ 476.916026] ? __might_sleep+0x93/0xb0 [ 476.919908] ? __fget+0x210/0x370 [ 476.923359] block_ioctl+0xde/0x120 [ 476.926982] ? blkdev_fallocate+0x3b0/0x3b0 [ 476.931297] do_vfs_ioctl+0x7b9/0x1070 [ 476.935296] ? selinux_file_mprotect+0x5d0/0x5d0 [ 476.940050] ? lock_downgrade+0x6e0/0x6e0 [ 476.944217] ? ioctl_preallocate+0x1c0/0x1c0 [ 476.948676] ? __fget+0x237/0x370 [ 476.952214] ? security_file_ioctl+0x8f/0xc0 [ 476.956616] SyS_ioctl+0x8f/0xc0 [ 476.959977] ? do_vfs_ioctl+0x1070/0x1070 [ 476.964138] do_syscall_64+0x1eb/0x630 [ 476.968020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 476.973157] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 476.978339] RIP: 0033:0x458a97 [ 476.981522] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 476.989232] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 476.996511] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 477.003974] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 477.011301] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 477.018593] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:08 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) 13:17:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x3c) 13:17:08 executing program 1 (fault-call:2 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 477.195094] FAULT_INJECTION: forcing a failure. [ 477.195094] name failslab, interval 1, probability 0, space 0, times 0 [ 477.208760] CPU: 0 PID: 22807 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 477.216078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.225529] Call Trace: [ 477.228112] dump_stack+0x138/0x19c [ 477.231740] should_fail.cold+0x10f/0x159 [ 477.235880] should_failslab+0xdb/0x130 [ 477.239879] kmem_cache_alloc_node_trace+0x283/0x770 [ 477.245008] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 477.250549] __kmalloc_node_track_caller+0x3d/0x80 [ 477.255584] __kmalloc_reserve.isra.0+0x40/0xe0 [ 477.260335] __alloc_skb+0xcf/0x500 [ 477.263967] ? skb_scrub_packet+0x4b0/0x4b0 [ 477.268636] ? netlink_has_listeners+0x20a/0x330 [ 477.273470] kobject_uevent_env+0x74c/0xc41 [ 477.277782] kobject_uevent+0x20/0x26 [ 477.281579] lo_ioctl+0x11d3/0x1c70 [ 477.285201] ? loop_probe+0x160/0x160 [ 477.288986] blkdev_ioctl+0x983/0x1880 [ 477.292872] ? blkpg_ioctl+0x980/0x980 [ 477.296941] ? __might_sleep+0x93/0xb0 [ 477.300849] ? __fget+0x210/0x370 [ 477.304313] block_ioctl+0xde/0x120 [ 477.307937] ? blkdev_fallocate+0x3b0/0x3b0 [ 477.312244] do_vfs_ioctl+0x7b9/0x1070 [ 477.316118] ? selinux_file_mprotect+0x5d0/0x5d0 [ 477.320888] ? lock_downgrade+0x6e0/0x6e0 [ 477.325044] ? ioctl_preallocate+0x1c0/0x1c0 [ 477.329447] ? __fget+0x237/0x370 [ 477.332898] ? security_file_ioctl+0x8f/0xc0 [ 477.337735] SyS_ioctl+0x8f/0xc0 [ 477.341098] ? do_vfs_ioctl+0x1070/0x1070 [ 477.345241] do_syscall_64+0x1eb/0x630 [ 477.349117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.353960] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.359137] RIP: 0033:0x458a97 [ 477.362317] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 477.370125] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 477.377388] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 477.384652] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 477.391938] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 477.399254] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:10 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:10 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000300)="ed", 0x1, 0x8000, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2f2}, 0x0) sendto$inet(r1, &(0x7f0000000140)="dd", 0x1, 0x0, 0x0, 0x0) ioperm(0x3, 0x100, 0x7f) 13:17:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x24, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="41000000000000000000000000000000000000000000000000000000000000000000b9aed0e79d8cdb29e8533d63000000000000000000005e422901ebe897871bfb3f117e3b9fbbbb98a4d67d35665fb9b739428f4c057f45ec74a73614d4be9bddfb99cdcacfbf4092853025f5c9f01c92f8040a984d46ed0a3084dd30d552c565fd456c10f1b3534f6dee5f2dc4e85e02ab6143dc000000"]}) 13:17:10 executing program 4: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x0, 0x989680}, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) getgid() 13:17:10 executing program 1 (fault-call:2 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0xfffffffe, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0xc9ee, 0x1}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f0000000180)="8e", 0x1, 0x8000, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000380)='*', 0x1, 0x0, 0x0, 0x0) [ 479.851408] FAULT_INJECTION: forcing a failure. [ 479.851408] name failslab, interval 1, probability 0, space 0, times 0 [ 479.870623] FAULT_INJECTION: forcing a failure. [ 479.870623] name failslab, interval 1, probability 0, space 0, times 0 [ 479.879601] CPU: 1 PID: 22821 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 479.888868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.898555] Call Trace: [ 479.901154] dump_stack+0x138/0x19c [ 479.904798] should_fail.cold+0x10f/0x159 [ 479.908948] should_failslab+0xdb/0x130 [ 479.912918] __kmalloc+0x2f3/0x7a0 [ 479.916452] ? __sb_end_write+0xc1/0x100 [ 479.920621] ? strnlen_user+0x120/0x1a0 [ 479.924586] ? SyS_memfd_create+0xba/0x3a0 [ 479.928856] SyS_memfd_create+0xba/0x3a0 [ 479.932914] ? shmem_fcntl+0x130/0x130 [ 479.936793] ? do_syscall_64+0x53/0x630 [ 479.940761] ? shmem_fcntl+0x130/0x130 [ 479.944647] do_syscall_64+0x1eb/0x630 [ 479.948526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 479.953367] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.958548] RIP: 0033:0x458c29 [ 479.961727] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 479.969430] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 479.976694] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 479.984041] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 479.991419] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9d45dd26d4 13:17:10 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x40002017}) r3 = dup(r1) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000140)) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000003c0)={0x10000005}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x6a4) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000080), 0x0, 0x0) [ 479.998690] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 480.005973] CPU: 0 PID: 22822 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 480.012991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.022549] Call Trace: [ 480.025135] dump_stack+0x138/0x19c [ 480.029700] should_fail.cold+0x10f/0x159 [ 480.033866] should_failslab+0xdb/0x130 [ 480.038050] kmem_cache_alloc_node+0x28a/0x780 [ 480.042840] __alloc_skb+0x9c/0x500 [ 480.046467] ? skb_scrub_packet+0x4b0/0x4b0 [ 480.050948] ? netlink_has_listeners+0x20a/0x330 [ 480.055700] kobject_uevent_env+0x74c/0xc41 [ 480.060179] kobject_uevent+0x20/0x26 [ 480.063974] lo_ioctl+0x11d3/0x1c70 [ 480.067599] ? loop_probe+0x160/0x160 [ 480.071518] blkdev_ioctl+0x983/0x1880 [ 480.075569] ? blkpg_ioctl+0x980/0x980 [ 480.079612] ? __might_sleep+0x93/0xb0 [ 480.083605] ? __fget+0x210/0x370 [ 480.087196] block_ioctl+0xde/0x120 [ 480.090825] ? blkdev_fallocate+0x3b0/0x3b0 [ 480.095238] do_vfs_ioctl+0x7b9/0x1070 [ 480.099121] ? selinux_file_mprotect+0x5d0/0x5d0 [ 480.104050] ? lock_downgrade+0x6e0/0x6e0 [ 480.108211] ? ioctl_preallocate+0x1c0/0x1c0 [ 480.113058] ? __fget+0x237/0x370 [ 480.116522] ? security_file_ioctl+0x8f/0xc0 [ 480.121125] SyS_ioctl+0x8f/0xc0 [ 480.124493] ? do_vfs_ioctl+0x1070/0x1070 [ 480.128695] do_syscall_64+0x1eb/0x630 [ 480.132873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.137734] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.143069] RIP: 0033:0x458a97 13:17:11 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:11 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x300) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1000000000000008) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x7) [ 480.146428] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 480.154638] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 480.162050] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 480.169315] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 480.177099] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 480.184637] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:11 executing program 2: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x80000000, 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x4, 0x0, 0x6}}, 0x2) [ 480.250747] FAULT_INJECTION: forcing a failure. [ 480.250747] name failslab, interval 1, probability 0, space 0, times 0 [ 480.278162] sp0: Synchronizing with TNC [ 480.280543] CPU: 1 PID: 22843 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 480.289206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.298554] Call Trace: [ 480.301147] dump_stack+0x138/0x19c [ 480.304787] should_fail.cold+0x10f/0x159 [ 480.308922] should_failslab+0xdb/0x130 [ 480.312887] kmem_cache_alloc+0x2d9/0x780 [ 480.317023] ? __alloc_fd+0x1d4/0x4a0 [ 480.320810] __d_alloc+0x2d/0x9f0 [ 480.324245] ? lock_downgrade+0x6e0/0x6e0 [ 480.328408] d_alloc_pseudo+0x1e/0x30 [ 480.332220] __shmem_file_setup.part.0+0xd8/0x400 [ 480.337048] ? __alloc_fd+0x1d4/0x4a0 [ 480.340830] ? shmem_fill_super+0x8c0/0x8c0 [ 480.345150] SyS_memfd_create+0x1f9/0x3a0 [ 480.349284] ? shmem_fcntl+0x130/0x130 [ 480.353161] ? do_syscall_64+0x53/0x630 [ 480.357117] ? shmem_fcntl+0x130/0x130 [ 480.360995] do_syscall_64+0x1eb/0x630 [ 480.364863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.369869] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.375041] RIP: 0033:0x458c29 [ 480.378215] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 480.386081] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 480.393332] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 13:17:11 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 480.400586] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 480.407840] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9d45dd26d4 [ 480.415172] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 480.503825] FAULT_INJECTION: forcing a failure. [ 480.503825] name failslab, interval 1, probability 0, space 0, times 0 [ 480.529458] CPU: 0 PID: 22856 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 480.536729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.546239] Call Trace: [ 480.548842] dump_stack+0x138/0x19c [ 480.553168] should_fail.cold+0x10f/0x159 [ 480.557318] should_failslab+0xdb/0x130 [ 480.561293] kmem_cache_alloc+0x2d9/0x780 [ 480.565606] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 480.571325] ? rcu_read_lock_sched_held+0x110/0x130 [ 480.576349] ? shmem_destroy_callback+0xa0/0xa0 [ 480.581027] shmem_alloc_inode+0x1c/0x50 [ 480.585101] alloc_inode+0x66/0x190 [ 480.588731] new_inode_pseudo+0x19/0xf0 [ 480.592727] new_inode+0x1f/0x40 [ 480.596349] shmem_get_inode+0x75/0x750 [ 480.600326] __shmem_file_setup.part.0+0x111/0x400 [ 480.605255] ? __alloc_fd+0x1d4/0x4a0 [ 480.609052] ? shmem_fill_super+0x8c0/0x8c0 [ 480.613381] SyS_memfd_create+0x1f9/0x3a0 [ 480.617524] ? shmem_fcntl+0x130/0x130 [ 480.621423] ? do_syscall_64+0x53/0x630 [ 480.625399] ? shmem_fcntl+0x130/0x130 [ 480.629372] do_syscall_64+0x1eb/0x630 [ 480.633262] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.638125] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.643310] RIP: 0033:0x458c29 [ 480.646500] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 480.654303] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 480.661666] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 480.669195] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 480.676631] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9d45dd26d4 [ 480.685027] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 480.717224] sp0: Synchronizing with TNC 13:17:13 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:13 executing program 1 (fault-call:2 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x10, &(0x7f0000000040)={0x0, 0x98e}, 0xeb) 13:17:13 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x800, 0x0) ioctl$IMADDTIMER(r0, 0x80044941, &(0x7f0000000000)) 13:17:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="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") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x20200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x1, {0x3, 0x2, "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", 0xe0, 0x6, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1}, r2}}, 0x128) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000580)=[&(0x7f0000000400)='/dev/ubi_ctrl\x00', &(0x7f0000000440)='/dev/ubi_ctrl\x00', &(0x7f0000000480)='nfs=nostale_ro', &(0x7f00000004c0)='selinux%+\x00', &(0x7f0000000500)='}A\x00', &(0x7f0000000540)='lo\x8d:ppp1):GPLuser\x00'], &(0x7f0000000640)=[&(0x7f00000005c0)='msdos\x00', &(0x7f0000000600)='procppp1\x00'], 0x100) 13:17:13 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x24, 0x8000100fff) write$evdev(r1, &(0x7f0000000000)=[{{}, 0x1, 0x1c, 0x2}], 0x1c3) [ 482.894184] FAULT_INJECTION: forcing a failure. [ 482.894184] name failslab, interval 1, probability 0, space 0, times 0 [ 482.910595] FAULT_INJECTION: forcing a failure. [ 482.910595] name failslab, interval 1, probability 0, space 0, times 0 [ 482.923959] CPU: 1 PID: 22889 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 482.931000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.940633] Call Trace: [ 482.943245] dump_stack+0x138/0x19c [ 482.946893] should_fail.cold+0x10f/0x159 [ 482.951058] should_failslab+0xdb/0x130 [ 482.955055] kmem_cache_alloc+0x2d9/0x780 [ 482.959312] ? shmem_alloc_inode+0x1c/0x50 [ 482.963568] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 482.969117] selinux_inode_alloc_security+0xb6/0x2a0 [ 482.974235] security_inode_alloc+0x9a/0xe0 [ 482.978570] inode_init_always+0x552/0xaf0 [ 482.982810] alloc_inode+0x83/0x190 [ 482.986447] new_inode_pseudo+0x19/0xf0 [ 482.990673] new_inode+0x1f/0x40 [ 482.994045] shmem_get_inode+0x75/0x750 [ 482.998031] __shmem_file_setup.part.0+0x111/0x400 [ 483.002966] ? __alloc_fd+0x1d4/0x4a0 [ 483.006777] ? shmem_fill_super+0x8c0/0x8c0 [ 483.026509] SyS_memfd_create+0x1f9/0x3a0 [ 483.030663] ? shmem_fcntl+0x130/0x130 [ 483.034541] ? do_syscall_64+0x53/0x630 [ 483.038594] ? shmem_fcntl+0x130/0x130 [ 483.042479] do_syscall_64+0x1eb/0x630 [ 483.046362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.051211] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.056414] RIP: 0033:0x458c29 [ 483.059598] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 483.067300] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 483.074647] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 483.082083] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 13:17:14 executing program 0: r0 = epoll_create1(0x80003) flock(r0, 0x1) r1 = epoll_create(0x8) flock(r1, 0x6) socketpair(0x9, 0x1, 0x3, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x7, 0x6}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000240)={r3, 0x77, "0ae44a50d6ce40c0f8a6677857da09a72b9f22606bc43026c31f655434aeb9dfceb5bb69eed8dace2d90c72e06c96e029d9f51d027e428949ba073e577b4a5c40b3fc2ddb0a853fc3be7d79d0caa7a1adbb1a68e558e3d7f6e68f56b44a4463ac4d01d5ee7226bb7307e97898fed7d51874b44e8bf5fc3"}, &(0x7f00000002c0)=0x7f) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xc3800000000, 0x20000) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x8, 0x0, 0x7ff, 0x9, 0x0, 0x405d, 0x7, 0x0, 0x7, 0x76bb077e, 0x8, 0x5, 0xf2, 0x9, 0xecf, 0x0, 0x1ff, 0x8, 0x400, 0x3f, 0x0, 0x0, 0xe1f, 0xfffffffffffffffe, 0x6, 0x7fff, 0x400, 0xc340, 0x2b, 0xffff, 0x0, 0x6fa3]}) 13:17:14 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 483.089361] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9d45dd26d4 [ 483.096715] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 483.104028] CPU: 0 PID: 22888 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 483.111676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.121137] Call Trace: [ 483.123846] dump_stack+0x138/0x19c [ 483.127499] should_fail.cold+0x10f/0x159 [ 483.131658] should_failslab+0xdb/0x130 [ 483.135631] kmem_cache_alloc_node+0x28a/0x780 [ 483.140211] __alloc_skb+0x9c/0x500 [ 483.143825] ? skb_scrub_packet+0x4b0/0x4b0 [ 483.148158] ? netlink_has_listeners+0x20a/0x330 [ 483.153015] kobject_uevent_env+0x74c/0xc41 [ 483.157420] kobject_uevent+0x20/0x26 [ 483.161299] lo_ioctl+0x11d3/0x1c70 [ 483.164917] ? loop_probe+0x160/0x160 [ 483.168713] blkdev_ioctl+0x983/0x1880 [ 483.172692] ? blkpg_ioctl+0x980/0x980 [ 483.176583] ? __might_sleep+0x93/0xb0 [ 483.180462] ? __fget+0x210/0x370 [ 483.183994] block_ioctl+0xde/0x120 [ 483.187840] ? blkdev_fallocate+0x3b0/0x3b0 [ 483.192379] do_vfs_ioctl+0x7b9/0x1070 [ 483.196414] ? selinux_file_mprotect+0x5d0/0x5d0 [ 483.202652] ? lock_downgrade+0x6e0/0x6e0 [ 483.206884] ? ioctl_preallocate+0x1c0/0x1c0 [ 483.211469] ? __fget+0x237/0x370 [ 483.214932] ? security_file_ioctl+0x8f/0xc0 [ 483.220199] SyS_ioctl+0x8f/0xc0 [ 483.223586] ? do_vfs_ioctl+0x1070/0x1070 [ 483.227733] do_syscall_64+0x1eb/0x630 [ 483.231616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.236460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.241653] RIP: 0033:0x458a97 13:17:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={0x0, 0xfffffffffffff000, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x5}]}]}, 0x20}}, 0x0) [ 483.244916] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.252793] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 483.260177] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 483.267530] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 483.275263] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 483.282570] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:14 executing program 2: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) syslog(0x3, &(0x7f0000000100)=""/62, 0xfffffffffffffff0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0x8001}}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x4}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={r2, 0xdc, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e24, 0x5, @local, 0x8001}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0x7f, @mcast1, 0x9}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x4}, @in6={0xa, 0x4e21, 0x7fffffff, @ipv4={[], [], @rand_addr=0x3598}, 0x8}, @in6={0xa, 0x4e20, 0x4, @rand_addr="177cc00b24a0aef4eab3c89d530eef71", 0x3}]}, &(0x7f0000000400)=0x10) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000540)={0x4, 0x0, [], {0x0, @reserved}}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000440)={0x0, @vbi={0xffffffff, 0x4, 0x0, 0x0, [0x8000], [0x4], 0x109}}) 13:17:14 executing program 1 (fault-call:2 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 483.368480] FAULT_INJECTION: forcing a failure. [ 483.368480] name failslab, interval 1, probability 0, space 0, times 0 [ 483.411925] CPU: 0 PID: 22913 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 483.419009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.434976] Call Trace: [ 483.438200] dump_stack+0x138/0x19c [ 483.441845] should_fail.cold+0x10f/0x159 [ 483.446009] should_failslab+0xdb/0x130 [ 483.450092] kmem_cache_alloc+0x2d9/0x780 [ 483.454242] ? lock_downgrade+0x6e0/0x6e0 [ 483.454256] get_empty_filp+0x8c/0x3b0 [ 483.454266] alloc_file+0x23/0x440 [ 483.454280] __shmem_file_setup.part.0+0x1b1/0x400 [ 483.454291] ? __alloc_fd+0x1d4/0x4a0 [ 483.454309] ? shmem_fill_super+0x8c0/0x8c0 [ 483.454324] SyS_memfd_create+0x1f9/0x3a0 [ 483.454334] ? shmem_fcntl+0x130/0x130 [ 483.454343] ? do_syscall_64+0x53/0x630 [ 483.454352] ? shmem_fcntl+0x130/0x130 [ 483.454363] do_syscall_64+0x1eb/0x630 [ 483.454370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.454386] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.462479] RIP: 0033:0x458c29 [ 483.462485] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 483.462497] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 483.462503] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 483.462508] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 483.462513] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9d45dd26d4 [ 483.462517] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 483.563533] FAULT_INJECTION: forcing a failure. [ 483.563533] name failslab, interval 1, probability 0, space 0, times 0 [ 483.574988] CPU: 0 PID: 22923 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 483.582000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.591383] Call Trace: [ 483.593981] dump_stack+0x138/0x19c [ 483.597607] should_fail.cold+0x10f/0x159 [ 483.601748] should_failslab+0xdb/0x130 [ 483.605943] kmem_cache_alloc_node_trace+0x283/0x770 [ 483.611166] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 483.616893] __kmalloc_node_track_caller+0x3d/0x80 [ 483.621829] __kmalloc_reserve.isra.0+0x40/0xe0 [ 483.626504] __alloc_skb+0xcf/0x500 [ 483.630399] ? skb_scrub_packet+0x4b0/0x4b0 [ 483.634718] ? netlink_has_listeners+0x20a/0x330 [ 483.639713] kobject_uevent_env+0x74c/0xc41 [ 483.644056] kobject_uevent+0x20/0x26 [ 483.647858] lo_ioctl+0x11d3/0x1c70 [ 483.651474] ? loop_probe+0x160/0x160 [ 483.655309] blkdev_ioctl+0x983/0x1880 [ 483.659309] ? blkpg_ioctl+0x980/0x980 [ 483.663934] ? __might_sleep+0x93/0xb0 [ 483.667818] ? __fget+0x210/0x370 [ 483.671263] block_ioctl+0xde/0x120 [ 483.675069] ? blkdev_fallocate+0x3b0/0x3b0 [ 483.679510] do_vfs_ioctl+0x7b9/0x1070 [ 483.683486] ? selinux_file_mprotect+0x5d0/0x5d0 [ 483.688498] ? lock_downgrade+0x6e0/0x6e0 [ 483.692686] ? ioctl_preallocate+0x1c0/0x1c0 [ 483.697116] ? __fget+0x237/0x370 [ 483.700587] ? security_file_ioctl+0x8f/0xc0 [ 483.705007] SyS_ioctl+0x8f/0xc0 [ 483.708466] ? do_vfs_ioctl+0x1070/0x1070 [ 483.712716] do_syscall_64+0x1eb/0x630 [ 483.716686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.721702] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.726898] RIP: 0033:0x458a97 [ 483.730103] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.737810] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 483.745082] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 483.752526] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 483.759784] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 483.767150] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:16 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:16 executing program 4: r0 = memfd_create(&(0x7f00000005c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x004\xdd\x0e\xad\xb4\x83\x0f?Y\x94q\xbe\v=\\\xe9[n\xa3\xc6b\x8a\x92,\xddz\xe8\xd0\x88O\xd4\\\xd2\x9c\x90\x84\x9fP)|\xde\xb3E1\xf7\xbc\xbe~G{$\xad\xf7\xc8\xd4\x80\xce\x94\xd3\xbe\xae\xf7\xbb\xc2\x1d\xf0\xafZ\x99\x7f\xb8^z=\x83\xb5\xe5y1.c++\x9aW\xb2\x94\x89-j\xa1\'\x1f\x19k\xb3Q\xa6\x18\x8d\xe4\rR\a\x1b)\xc0s\xa9u\xb1x\xf5c\xd3\a\xeb\x7f\xb1&a\xfa\xdcZ\xfc\x80D\r\xac\r\xcbVfYT`\x8c\xeauW\xd6\x93\x02M\xd8\xbea\xe4\xa1\xdb\xbf7^\x1ch\xa2\xc9Ux*\x03\xbd7\xebFi\xa3\xc0\x81\xe2\x85~\xefP\x12\x90\xce+q\x9a\x86\x8c\xf3{\xd6\xed\x9a\xf3\xc9\xe8\xf1\xda\x1a\xbb\x95\xaaR\x11\xb6\xfa\xa9\x1d\x12\xa3\xc3\xe7B\x14\xa6`\xdd\x83\xde\xb6\xabB\xb9\xed\xd6U\xa5#-\xe1@\xf7\xf7\x8et\xd6H\x9bF\\oF\xba\xcb\x0erJD\xf9\xd6\xd2\xd0vG\xfe\xb6\xae\xc8\x9f\x89 \xff\x9c\x04\xf5\x86\xfbM\xfd\xcc:\vQ\xdd\x1f0:\x06\xf5\xda\xfb\xc9\x86p\xd4\xb7\f\xb7\xaa]\x05N0\xb9o\'^\x117d<\xbd\x1f\xac\xf4\xc8\x15%\x1f\x9c\xd1\xb9B\x84\xa1;\x85\"\xd4\x92\xa3\x1f\x87Z\x9a', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20000057d) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000440)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r2 = dup2(r1, r0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0xca37, 0x2100) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000003c0)=r4) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") fstat(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r5) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0}, 0x78) write$P9_RLINK(r2, &(0x7f0000000040)={0x7}, 0x3ed) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0xa2, @time}) 13:17:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01}, 0x14}}, 0x0) 13:17:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000036c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003680)=""/41, 0x29}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0xa0000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001200)={{{@in=@dev, @in6=@empty}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) bind$alg(r0, &(0x7f0000001300)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-avx\x00'}, 0xdd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b0", 0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) socket$kcm(0x29, 0x7, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1}, 0x0) 13:17:16 executing program 5 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:16 executing program 1 (fault-call:2 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:16 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = inotify_init1(0x80000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x610, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x6a12cc73f33f349}, 0x80) read(r2, &(0x7f0000000000)=""/230, 0xe6) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) dup2(r0, r2) utimes(&(0x7f0000000340)='./file0\x00', 0x0) [ 485.958649] FAULT_INJECTION: forcing a failure. [ 485.958649] name failslab, interval 1, probability 0, space 0, times 0 [ 485.985131] FAULT_INJECTION: forcing a failure. [ 485.985131] name failslab, interval 1, probability 0, space 0, times 0 [ 485.998350] CPU: 0 PID: 22936 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 486.005397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.014847] Call Trace: [ 486.017477] dump_stack+0x138/0x19c [ 486.021124] should_fail.cold+0x10f/0x159 [ 486.025367] should_failslab+0xdb/0x130 [ 486.029342] kmem_cache_alloc_node_trace+0x283/0x770 [ 486.034452] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 486.039907] __kmalloc_node_track_caller+0x3d/0x80 [ 486.044923] __kmalloc_reserve.isra.0+0x40/0xe0 [ 486.049604] __alloc_skb+0xcf/0x500 [ 486.053509] ? skb_scrub_packet+0x4b0/0x4b0 [ 486.058350] ? netlink_has_listeners+0x20a/0x330 [ 486.063107] kobject_uevent_env+0x74c/0xc41 [ 486.067518] kobject_uevent+0x20/0x26 [ 486.071328] lo_ioctl+0x11d3/0x1c70 [ 486.074954] ? loop_probe+0x160/0x160 [ 486.078753] blkdev_ioctl+0x983/0x1880 [ 486.082632] ? blkpg_ioctl+0x980/0x980 [ 486.086518] ? __might_sleep+0x93/0xb0 [ 486.090399] ? __fget+0x210/0x370 [ 486.093849] block_ioctl+0xde/0x120 [ 486.097493] ? blkdev_fallocate+0x3b0/0x3b0 [ 486.101829] do_vfs_ioctl+0x7b9/0x1070 [ 486.105799] ? selinux_file_mprotect+0x5d0/0x5d0 [ 486.110631] ? lock_downgrade+0x6e0/0x6e0 [ 486.114783] ? ioctl_preallocate+0x1c0/0x1c0 [ 486.119295] ? __fget+0x237/0x370 [ 486.122748] ? security_file_ioctl+0x8f/0xc0 [ 486.127152] SyS_ioctl+0x8f/0xc0 [ 486.130521] ? do_vfs_ioctl+0x1070/0x1070 [ 486.134669] do_syscall_64+0x1eb/0x630 [ 486.138550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.143478] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 486.148751] RIP: 0033:0x458a97 [ 486.151941] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 486.159662] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 486.166935] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 486.174197] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 486.181550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 486.188811] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 486.197001] CPU: 1 PID: 22939 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 486.204129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.213737] Call Trace: [ 486.213755] dump_stack+0x138/0x19c [ 486.213772] should_fail.cold+0x10f/0x159 [ 486.213787] should_failslab+0xdb/0x130 [ 486.213799] kmem_cache_alloc+0x2d9/0x780 [ 486.213810] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 486.213823] ? check_preemption_disabled+0x3c/0x250 [ 486.228315] selinux_file_alloc_security+0xb4/0x190 [ 486.228329] security_file_alloc+0x73/0xb0 [ 486.228344] get_empty_filp+0x130/0x3b0 [ 486.228355] alloc_file+0x23/0x440 13:17:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000040)=0x23, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x240001, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0), 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) bind$rose(r1, &(0x7f0000000140)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @bcast}, 0x1c) syz_emit_ethernet(0xba, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) setsockopt$llc_int(r1, 0x10c, 0x0, &(0x7f0000000100)=0x45, 0x4) 13:17:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000012c0)={0x4}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/4096) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000011c0)={0x0, @pix_mp={0x8, 0x7, 0x7b574f7f, 0x1, 0x0, [{0x6, 0x3f}, {0x5, 0x8}, {0x4, 0x2}, {0x2, 0x6}, {0x7fff, 0xe0}, {0x7fff, 0x5}, {0x401, 0x3ff}, {0x8000, 0x2}], 0x7, 0x1000, 0x1, 0x0, 0x6}}) [ 486.228371] __shmem_file_setup.part.0+0x1b1/0x400 [ 486.237952] ? __alloc_fd+0x1d4/0x4a0 [ 486.252183] ? shmem_fill_super+0x8c0/0x8c0 [ 486.252202] SyS_memfd_create+0x1f9/0x3a0 [ 486.252213] ? shmem_fcntl+0x130/0x130 [ 486.252225] ? do_syscall_64+0x53/0x630 [ 486.252236] ? shmem_fcntl+0x130/0x130 [ 486.288737] do_syscall_64+0x1eb/0x630 [ 486.292809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.297670] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 486.302856] RIP: 0033:0x458c29 13:17:17 executing program 4: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000fb8000)=@generic={0x20000000001e, "01030000000000ff00000000ff03000009bf79df21d60c7bc8790405c7bad62e0a53a632ed4938f50006fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151314a8ef1f183bea5bdb9c8ead2000077aeb81c90001d6d5e980ee590c8b9f70dc136cb184a"}, 0x80) sendmsg(r0, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x6, 0x2, 0x3f, "86a8ba0d6e56a907be9495c5250c4ef0eb5f07a88bb0f11028c4b20360d626db2aedfe819f8b45bcb57a867688af43647fd5ff32a539aa3c2b1d8970bc70b2", 0x2a}, 0x60) 13:17:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ioprio_set$pid(0x2, r2, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000140)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000088470a830000100100fd2847"], 0xe) 13:17:17 executing program 5 (fault-call:2 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 486.306033] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 486.306043] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 486.306048] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 486.306053] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 486.306065] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9d45dd26d4 [ 486.306070] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 486.404353] FAULT_INJECTION: forcing a failure. [ 486.404353] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.422535] CPU: 1 PID: 22965 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 486.429729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.429735] Call Trace: [ 486.429752] dump_stack+0x138/0x19c [ 486.429770] should_fail.cold+0x10f/0x159 [ 486.449566] ? __might_sleep+0x93/0xb0 [ 486.453450] __alloc_pages_nodemask+0x1d6/0x7a0 [ 486.458140] ? __alloc_pages_slowpath+0x2930/0x2930 [ 486.458150] ? lock_downgrade+0x6e0/0x6e0 [ 486.458168] alloc_pages_vma+0xc9/0x4c0 [ 486.471384] shmem_alloc_page+0xf6/0x1a0 [ 486.475462] ? shmem_swapin+0x1a0/0x1a0 [ 486.479558] ? cred_has_capability+0x142/0x290 [ 486.484145] ? check_preemption_disabled+0x3c/0x250 [ 486.489168] ? __this_cpu_preempt_check+0x1d/0x30 [ 486.494022] ? percpu_counter_add_batch+0x112/0x160 [ 486.499073] ? __vm_enough_memory+0x26a/0x490 [ 486.503593] shmem_alloc_and_acct_page+0x12a/0x680 [ 486.508707] shmem_getpage_gfp+0x402/0x28a0 [ 486.513719] ? _raw_spin_unlock+0x2d/0x50 [ 486.517946] ? shmem_add_to_page_cache+0x860/0x860 [ 486.522863] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 486.528147] shmem_write_begin+0xfd/0x1b0 [ 486.532366] ? trace_hardirqs_on_caller+0x400/0x590 [ 486.541490] generic_perform_write+0x1ff/0x490 [ 486.546159] ? page_endio+0x530/0x530 [ 486.549947] ? current_time+0xb0/0xb0 [ 486.553733] ? generic_file_write_iter+0x9a/0x660 [ 486.558560] __generic_file_write_iter+0x239/0x5b0 [ 486.563495] generic_file_write_iter+0x303/0x660 [ 486.568857] __vfs_write+0x4ae/0x6c0 [ 486.572726] ? selinux_file_open+0x420/0x420 [ 486.577205] ? kernel_read+0x120/0x120 [ 486.581077] ? check_preemption_disabled+0x3c/0x250 [ 486.586080] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 486.591517] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 486.596269] ? __sb_start_write+0x153/0x2f0 [ 486.600583] vfs_write+0x198/0x500 [ 486.604107] SyS_pwrite64+0x115/0x140 [ 486.607899] ? SyS_pread64+0x140/0x140 [ 486.611769] ? do_syscall_64+0x53/0x630 [ 486.615858] ? SyS_pread64+0x140/0x140 [ 486.619743] do_syscall_64+0x1eb/0x630 [ 486.623625] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.628554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 486.633725] RIP: 0033:0x412c27 [ 486.636898] RSP: 002b:00007f9d45dd1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 486.644768] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 486.652291] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 [ 486.659549] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 486.666815] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 486.674074] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:19 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:19 executing program 4: clone(0x10074000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 13:17:19 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x217, &(0x7f00000000c0)=0x5cf6f755, 0x4) 13:17:19 executing program 1 (fault-call:2 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:19 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000008, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xd) ptrace$cont(0x18, r0, 0x7, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x34}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x23, r0, 0x0, 0x0) 13:17:19 executing program 5 (fault-call:2 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 489.006529] FAULT_INJECTION: forcing a failure. [ 489.006529] name failslab, interval 1, probability 0, space 0, times 0 [ 489.017781] CPU: 0 PID: 22984 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 489.017789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.017793] Call Trace: [ 489.017814] dump_stack+0x138/0x19c [ 489.017842] should_fail.cold+0x10f/0x159 [ 489.034484] should_failslab+0xdb/0x130 [ 489.034501] kmem_cache_alloc+0x47/0x780 13:17:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000004c0)=""/246) write$UHID_CREATE(r0, &(0x7f0000000380)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000002c0)=""/191, 0xbf, 0x10000, 0xf7, 0x6, 0xeb, 0x40}, 0x120) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000280)) close(r0) [ 489.034514] ? __alloc_pages_slowpath+0x2930/0x2930 [ 489.034524] ? lock_downgrade+0x6e0/0x6e0 [ 489.034540] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 489.034554] __radix_tree_create+0x337/0x4d0 [ 489.034570] __radix_tree_insert+0xab/0x570 [ 489.034583] ? __radix_tree_create+0x4d0/0x4d0 [ 489.034599] shmem_add_to_page_cache+0x5a4/0x860 [ 489.049747] FAULT_INJECTION: forcing a failure. [ 489.049747] name failslab, interval 1, probability 0, space 0, times 0 [ 489.053102] ? shmem_writepage+0xbb0/0xbb0 [ 489.053116] ? __radix_tree_preload+0x1d2/0x260 [ 489.053133] shmem_getpage_gfp+0x1908/0x28a0 [ 489.053143] ? _raw_spin_unlock+0x2d/0x50 [ 489.053160] ? shmem_add_to_page_cache+0x860/0x860 [ 489.119654] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 489.124848] shmem_write_begin+0xfd/0x1b0 [ 489.129018] ? trace_hardirqs_on_caller+0x400/0x590 [ 489.134049] generic_perform_write+0x1ff/0x490 [ 489.138629] ? page_endio+0x530/0x530 [ 489.142443] ? current_time+0xb0/0xb0 [ 489.146242] ? generic_file_write_iter+0x9a/0x660 [ 489.151082] __generic_file_write_iter+0x239/0x5b0 [ 489.156094] generic_file_write_iter+0x303/0x660 [ 489.160849] __vfs_write+0x4ae/0x6c0 [ 489.164565] ? selinux_file_open+0x420/0x420 [ 489.168967] ? kernel_read+0x120/0x120 [ 489.172951] ? check_preemption_disabled+0x3c/0x250 [ 489.177963] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 489.183419] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 489.188197] ? __sb_start_write+0x153/0x2f0 [ 489.192529] vfs_write+0x198/0x500 [ 489.196068] SyS_pwrite64+0x115/0x140 [ 489.199861] ? SyS_pread64+0x140/0x140 [ 489.203743] ? do_syscall_64+0x53/0x630 [ 489.207709] ? SyS_pread64+0x140/0x140 [ 489.211596] do_syscall_64+0x1eb/0x630 [ 489.215475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 489.220328] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.225511] RIP: 0033:0x412c27 [ 489.228693] RSP: 002b:00007f9d45dd1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 489.236396] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 489.243668] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000005 13:17:20 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x7f, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x10000009, 0x33, 0x1, r0}) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000080)) [ 489.250934] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 489.258194] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 489.265808] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 489.273089] CPU: 1 PID: 22985 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 489.280110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.289634] Call Trace: [ 489.292224] dump_stack+0x138/0x19c [ 489.295862] should_fail.cold+0x10f/0x159 [ 489.300148] should_failslab+0xdb/0x130 [ 489.304114] kmem_cache_alloc_node_trace+0x283/0x770 [ 489.309630] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 489.315659] __kmalloc_node_track_caller+0x3d/0x80 [ 489.320579] __kmalloc_reserve.isra.0+0x40/0xe0 [ 489.325229] __alloc_skb+0xcf/0x500 [ 489.328903] ? skb_scrub_packet+0x4b0/0x4b0 [ 489.333447] ? netlink_has_listeners+0x20a/0x330 [ 489.338196] kobject_uevent_env+0x74c/0xc41 [ 489.342726] kobject_uevent+0x20/0x26 [ 489.346517] lo_ioctl+0x11d3/0x1c70 [ 489.350141] ? loop_probe+0x160/0x160 [ 489.354050] blkdev_ioctl+0x983/0x1880 [ 489.358030] ? blkpg_ioctl+0x980/0x980 [ 489.361910] ? __might_sleep+0x93/0xb0 [ 489.365783] ? __fget+0x210/0x370 [ 489.369229] block_ioctl+0xde/0x120 [ 489.372844] ? blkdev_fallocate+0x3b0/0x3b0 [ 489.377159] do_vfs_ioctl+0x7b9/0x1070 [ 489.381075] ? selinux_file_mprotect+0x5d0/0x5d0 [ 489.385826] ? lock_downgrade+0x6e0/0x6e0 [ 489.390022] ? ioctl_preallocate+0x1c0/0x1c0 [ 489.394427] ? __fget+0x237/0x370 [ 489.398220] ? security_file_ioctl+0x8f/0xc0 [ 489.402612] SyS_ioctl+0x8f/0xc0 [ 489.405968] ? do_vfs_ioctl+0x1070/0x1070 [ 489.410106] do_syscall_64+0x1eb/0x630 [ 489.420001] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 489.440539] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.445720] RIP: 0033:0x458a97 [ 489.448898] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 489.456594] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 489.463853] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 489.471121] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 489.478388] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 489.485735] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x101040) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r2 = dup3(r1, r1, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x67c) shutdown(r0, 0x0) 13:17:20 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x100000020000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x100000141042, 0x0) ftruncate(r0, 0x4000010199b7) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x1fffff9d, &(0x7f0000000040)=[{0xffffffff, 0x5, 0x5, 0x7}, {0x1, 0x7, 0x6, 0xb6}, {0x8, 0x1f, 0x100000000000, 0x101}, {0x1, 0x0, 0x4, 0x7fff}]}, 0x180) sendfile(r0, r2, 0x0, 0x8000fffffffe) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 489.535609] Unknown ioctl -1072150272 [ 489.540039] Unknown ioctl -2126991741 [ 489.549402] Unknown ioctl -1072150272 [ 489.549976] Unknown ioctl -2126991741 13:17:20 executing program 5 (fault-call:2 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000), 0xe) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000100)="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", 0xfffffffffffffd53) ioctl$TIOCSCTTY(r1, 0x540e, 0x80000000) [ 489.656905] FAULT_INJECTION: forcing a failure. [ 489.656905] name failslab, interval 1, probability 0, space 0, times 0 [ 489.679114] CPU: 1 PID: 23014 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 489.686186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.695553] Call Trace: [ 489.698154] dump_stack+0x138/0x19c [ 489.701815] should_fail.cold+0x10f/0x159 [ 489.705993] should_failslab+0xdb/0x130 [ 489.710150] kmem_cache_alloc+0x2d9/0x780 [ 489.714300] ? vfs_write+0x25f/0x500 [ 489.718032] getname_flags+0xcb/0x580 [ 489.721931] ? check_preemption_disabled+0x3c/0x250 [ 489.727164] getname+0x1a/0x20 [ 489.730381] do_sys_open+0x1e7/0x430 [ 489.734105] ? filp_open+0x70/0x70 [ 489.737655] ? fput+0xd4/0x150 [ 489.740868] ? SyS_pwrite64+0xca/0x140 [ 489.740880] SyS_open+0x2d/0x40 [ 489.740887] ? do_sys_open+0x430/0x430 [ 489.740900] do_syscall_64+0x1eb/0x630 [ 489.748055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 489.760794] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.766018] RIP: 0033:0x412bc1 [ 489.769206] RSP: 002b:00007f9d45dd1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 489.777068] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 489.784331] RDX: 00007f9d45dd1b0a RSI: 0000000000000002 RDI: 00007f9d45dd1b00 [ 489.791707] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 489.798978] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 489.806513] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:22 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:22 executing program 1 (fault-call:2 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:22 executing program 4: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = dup2(r0, r0) sendmsg$tipc(r1, &(0x7f0000000540)={&(0x7f0000000180)=@id={0x1e, 0x3, 0x2, {0x4e23, 0x1}}, 0x10, &(0x7f0000000480)=[{&(0x7f00000001c0)="5812aefa3c6fd8b366ab408c4a13bb38057427c0cf44bd68aa244faef43dddee7935bde29fda3e80037fc9afd86fe803472f72b9d1d1314adae74e5e04a63928cf1c44caf350d842778b348b696d47423cba5a05cf2aa7e853b7db2126a705aaf973078f42c32df5ffa5eeff86ed64708c679872f3b67264e5ff231d52d2a20d7623f7df", 0x84}, {&(0x7f0000000280)="c9aa169198728490fdbdda9462d9f0c5f1520d3bf857fe8843ce67e14a15a2484ed0eae1bac11336daf91192b1cf", 0x2e}, {&(0x7f00000002c0)="362b2bc0ca37bec5515da067ac5219ff445bc4", 0x13}, {&(0x7f0000000300)="5f2c8b65cbf6586e4ebede5986714c68becba6d2c593dfa2bd600bca79453cc9073a1e26ab5155e9fc1636538d92c979bca8c64c3e95a7e76f2928021925e367c42cb575e816ad1667690c8384a00ae5750c3f3279bed40639187315d7b1a353467a4c4e7b20a77f5f0ef2687aafd728752b26688d3e96eed095414eef6ec8fafd8b89a7c41d47e756095a9311dca5399c4d4d62ce0d5675d41faf", 0x9b}, {&(0x7f00000003c0)="a44d4a591605b034a822c207f65598f3631fdbe55b10de1c25e5542348f1e99a480f4a2d7eec9c58b1e383356d6b8bb803733a229b4667bc2a4fa3a94107ab4fecb215fead67e65994c9bff77f2dd11db890f2344060579806b3099d0865201bb3fe9690218102e5e905c6d4a63b351d8cd56b8d7a831f3da5e11747851c8760c16b96d4b03190b2bdd2453be259a1808157d959ad91156c0f2b67753d6a4ea3d39dfd4f6bb969680a712641c8", 0xad}], 0x5, &(0x7f0000000500)="494419e26fb603dd83188e4505a4389a3887cfc84796ef8dd0e45d3ec4c7e427501244cc870e743a85c612df3da681942b1a", 0x32, 0x4000}, 0x4000004) sendto$rxrpc(r1, &(0x7f0000000080)="ee81ea847684b2f19db1e40ce9762bbc778b70767861d167b307a4c175266a00b6929e888c27c876b3e44fb49d14f45b16756a997e7749b41daf315ce63cfdcfdefe6667460554e469adf42ff4eff3335ed25b30a545815973baa7f6da587aaccf2d4ef8ba72af89a9f8c63e2dd9501e2d16e48abeed2af2a37e824dd6063c1b0f527372efc1bed57e782633fa1540d48493c3f21d2a75c93f", 0x99, 0x20000011, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x5, @mcast1, 0x5}}, 0x24) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:17:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x800, 0x200400) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{0xc}], 0xc}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x4e24, @loopback}}) 13:17:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = gettid() getpriority(0x1, r1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000040)) 13:17:22 executing program 5 (fault-call:2 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 492.056772] FAULT_INJECTION: forcing a failure. [ 492.056772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 492.068734] CPU: 1 PID: 23033 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 492.075753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.085233] Call Trace: [ 492.087851] dump_stack+0x138/0x19c [ 492.091496] should_fail.cold+0x10f/0x159 [ 492.095753] __alloc_pages_nodemask+0x1d6/0x7a0 [ 492.100444] ? fs_reclaim_acquire+0x20/0x20 13:17:22 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x941040, 0x104) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000180)={0x7ff, 0x3, 0x0, [{0x7f, 0x0, 0x3, 0x1, 0x10001, 0x6, 0xf4b5}, {0x3, 0x401, 0x5, 0x470, 0x0, 0x16, 0x5}, {0xe0000000000000, 0x7, 0x4, 0x79, 0x9, 0x6, 0x37}]}) ftruncate(0xffffffffffffffff, 0x0) stat(&(0x7f0000000080)='./bus\x00', &(0x7f0000001940)) 13:17:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$sock_buf(0xffffffffffffff9c, 0x1, 0x37, &(0x7f00000000c0)=""/213, &(0x7f00000001c0)=0xd5) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) [ 492.104797] ? __alloc_pages_slowpath+0x2930/0x2930 [ 492.109841] cache_grow_begin+0x80/0x410 [ 492.113917] kmem_cache_alloc+0x6a8/0x780 [ 492.118089] ? vfs_write+0x25f/0x500 [ 492.121828] getname_flags+0xcb/0x580 [ 492.125651] ? check_preemption_disabled+0x3c/0x250 [ 492.130671] getname+0x1a/0x20 [ 492.130681] do_sys_open+0x1e7/0x430 [ 492.130693] ? filp_open+0x70/0x70 [ 492.130701] ? fput+0xd4/0x150 [ 492.130712] ? SyS_pwrite64+0xca/0x140 [ 492.130725] SyS_open+0x2d/0x40 [ 492.130734] ? do_sys_open+0x430/0x430 [ 492.137973] do_syscall_64+0x1eb/0x630 [ 492.137983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 492.138002] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.138009] RIP: 0033:0x412bc1 [ 492.138016] RSP: 002b:00007f9d45dd1a80 EFLAGS: 00000293 [ 492.160376] ORIG_RAX: 0000000000000002 [ 492.160384] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 492.160391] RDX: 00007f9d45dd1b0a RSI: 0000000000000002 RDI: 00007f9d45dd1b00 [ 492.160396] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:17:22 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) listen(r2, 0x80000001) close(r2) close(r1) [ 492.160402] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 492.160408] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 492.225993] FAULT_INJECTION: forcing a failure. [ 492.225993] name failslab, interval 1, probability 0, space 0, times 0 [ 492.239153] CPU: 1 PID: 23028 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 492.246440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.246445] Call Trace: [ 492.246463] dump_stack+0x138/0x19c [ 492.246480] should_fail.cold+0x10f/0x159 [ 492.246495] should_failslab+0xdb/0x130 [ 492.246507] kmem_cache_alloc_node_trace+0x283/0x770 [ 492.246519] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 492.246532] __kmalloc_node_track_caller+0x3d/0x80 [ 492.246555] __kmalloc_reserve.isra.0+0x40/0xe0 [ 492.246566] __alloc_skb+0xcf/0x500 [ 492.246576] ? skb_scrub_packet+0x4b0/0x4b0 [ 492.246588] ? netlink_has_listeners+0x20a/0x330 [ 492.246600] kobject_uevent_env+0x74c/0xc41 [ 492.246618] kobject_uevent+0x20/0x26 [ 492.246629] lo_ioctl+0x11d3/0x1c70 [ 492.246642] ? loop_probe+0x160/0x160 [ 492.246656] blkdev_ioctl+0x983/0x1880 [ 492.246666] ? blkpg_ioctl+0x980/0x980 [ 492.246684] ? __might_sleep+0x93/0xb0 [ 492.246692] ? __fget+0x210/0x370 [ 492.246703] block_ioctl+0xde/0x120 [ 492.341177] ? blkdev_fallocate+0x3b0/0x3b0 [ 492.345492] do_vfs_ioctl+0x7b9/0x1070 [ 492.349475] ? selinux_file_mprotect+0x5d0/0x5d0 [ 492.354228] ? lock_downgrade+0x6e0/0x6e0 [ 492.358366] ? ioctl_preallocate+0x1c0/0x1c0 [ 492.362849] ? __fget+0x237/0x370 [ 492.366303] ? security_file_ioctl+0x8f/0xc0 [ 492.374394] SyS_ioctl+0x8f/0xc0 [ 492.377839] ? do_vfs_ioctl+0x1070/0x1070 [ 492.381991] do_syscall_64+0x1eb/0x630 [ 492.385884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 492.390761] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.395976] RIP: 0033:0x458a97 [ 492.399163] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:17:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f00000000c0)={0x40, 0x0, 0x0, 0x0, 0x6a3e, 0x40, 0x6, 0x3, 0x1, 0xa0000000000, 0x5, 0x0, 0x0, 0x4, 0x534, 0x1, 0x4, 0x5, 0x40}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000180)={{0x2, 0x0, 0x5, 0x1, 0x100000000}, 0x7, 0x6, 0x432}) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="1606e7ff01b58e03cafa3a00f3ffff0977831578c1b6b24144a6b500bd642f811ed08dbdcdcf337f0066e74332dd30a3674a57cb134e652e8c"], 0x39) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = eventfd2(0x4, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000040)={0x0, @aes256}) [ 492.406964] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 492.414224] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 492.421483] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 492.428748] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 492.436014] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000002c0)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) 13:17:23 executing program 1 (fault-call:2 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 492.560744] Unknown ioctl 4726 [ 492.609950] Unknown ioctl 4726 [ 492.618302] FAULT_INJECTION: forcing a failure. [ 492.618302] name failslab, interval 1, probability 0, space 0, times 0 [ 492.634336] CPU: 1 PID: 23073 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 492.641478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.651021] Call Trace: [ 492.653802] dump_stack+0x138/0x19c [ 492.657446] should_fail.cold+0x10f/0x159 [ 492.661605] should_failslab+0xdb/0x130 [ 492.666092] kmem_cache_alloc_node_trace+0x283/0x770 [ 492.671617] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 492.677072] __kmalloc_node_track_caller+0x3d/0x80 [ 492.682103] __kmalloc_reserve.isra.0+0x40/0xe0 [ 492.686756] __alloc_skb+0xcf/0x500 [ 492.690554] ? skb_scrub_packet+0x4b0/0x4b0 [ 492.695010] ? netlink_has_listeners+0x20a/0x330 [ 492.699935] kobject_uevent_env+0x74c/0xc41 [ 492.704339] kobject_uevent+0x20/0x26 [ 492.708123] lo_ioctl+0x11d3/0x1c70 [ 492.712261] ? loop_probe+0x160/0x160 [ 492.716046] blkdev_ioctl+0x983/0x1880 [ 492.720009] ? blkpg_ioctl+0x980/0x980 [ 492.723888] ? __might_sleep+0x93/0xb0 [ 492.727759] ? __fget+0x210/0x370 [ 492.731200] block_ioctl+0xde/0x120 [ 492.734821] ? blkdev_fallocate+0x3b0/0x3b0 [ 492.739125] do_vfs_ioctl+0x7b9/0x1070 [ 492.743010] ? selinux_file_mprotect+0x5d0/0x5d0 [ 492.747763] ? lock_downgrade+0x6e0/0x6e0 [ 492.751980] ? ioctl_preallocate+0x1c0/0x1c0 [ 492.756736] ? __fget+0x237/0x370 [ 492.760534] ? security_file_ioctl+0x8f/0xc0 [ 492.764945] SyS_ioctl+0x8f/0xc0 [ 492.768294] ? do_vfs_ioctl+0x1070/0x1070 [ 492.772430] do_syscall_64+0x1eb/0x630 [ 492.776297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 492.781241] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.786521] RIP: 0033:0x458a97 [ 492.789693] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 492.797471] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 492.804724] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 492.811974] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 492.819224] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 492.826485] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:25 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000200)={0x8, 0xffffffffffffed1f}) r1 = gettid() sched_getparam(r1, &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r3, 0x60000000000}}, 0x10) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x4, 0x0, 0x0, 0x44f0, 0x80007e}) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 13:17:25 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:25 executing program 5 (fault-call:2 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="310fabf2ff32a5042d08b2") r1 = socket$can_raw(0x1d, 0x3, 0x1) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00fb7000005537eb3ed81ec4f37737b6cc20c54608b2af5088fa4a83aface165e6261da7737dfd0a3b6e308c915f0adf1ba3672af84a309ccb350c469103cccb40279be13e77132614c64b7bbdbda0123f7162ebbc785d8c275e485dba36a9226450150de212aa07346f2e1bf09cc3c3"], 0x70, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000140)={0x6, 0x3}) setsockopt(r0, 0x4000000000000065, 0x1, &(0x7f0000000300)="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", 0x116) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000040)={0x0, @speck128, 0x2, "7a1c57205d169786"}) bind$can_raw(r1, &(0x7f00000002c0), 0x10) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000001c0)={{&(0x7f0000fec000/0x13000)=nil, 0x13000}, 0x1}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) sched_yield() 13:17:25 executing program 1 (fault-call:2 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 495.121874] FAULT_INJECTION: forcing a failure. [ 495.121874] name failslab, interval 1, probability 0, space 0, times 0 [ 495.133583] CPU: 0 PID: 23087 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 495.140641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.140646] Call Trace: [ 495.140671] dump_stack+0x138/0x19c [ 495.140689] should_fail.cold+0x10f/0x159 [ 495.140706] should_failslab+0xdb/0x130 [ 495.140722] kmem_cache_alloc+0x2d9/0x780 [ 495.140733] ? save_stack+0xa9/0xd0 [ 495.140748] get_empty_filp+0x8c/0x3b0 [ 495.140758] path_openat+0x8f/0x3f70 [ 495.140770] ? trace_hardirqs_on+0x10/0x10 [ 495.140782] ? check_preemption_disabled+0x3c/0x250 [ 495.140796] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 495.156419] ? find_held_lock+0x35/0x130 [ 495.156431] ? save_trace+0x290/0x290 [ 495.156446] ? __alloc_fd+0x1d4/0x4a0 [ 495.156460] do_filp_open+0x18e/0x250 [ 495.166641] FAULT_INJECTION: forcing a failure. [ 495.166641] name failslab, interval 1, probability 0, space 0, times 0 [ 495.168823] ? may_open_dev+0xe0/0xe0 [ 495.168841] ? lock_downgrade+0x6e0/0x6e0 [ 495.168857] ? _raw_spin_unlock+0x2d/0x50 [ 495.168870] ? __alloc_fd+0x1d4/0x4a0 [ 495.236757] do_sys_open+0x2c5/0x430 [ 495.240465] ? filp_open+0x70/0x70 [ 495.243996] ? fput+0xd4/0x150 [ 495.247183] ? SyS_pwrite64+0xca/0x140 [ 495.251069] SyS_open+0x2d/0x40 [ 495.254429] ? do_sys_open+0x430/0x430 [ 495.258401] do_syscall_64+0x1eb/0x630 [ 495.262306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 495.267148] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 495.272332] RIP: 0033:0x412bc1 [ 495.275513] RSP: 002b:00007f9d45dd1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 495.283319] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 495.290594] RDX: 00007f9d45dd1b0a RSI: 0000000000000002 RDI: 00007f9d45dd1b00 [ 495.297866] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 495.305144] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 495.312494] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 495.319789] CPU: 1 PID: 23090 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 495.326817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.336308] Call Trace: [ 495.338895] dump_stack+0x138/0x19c [ 495.342694] should_fail.cold+0x10f/0x159 [ 495.346933] should_failslab+0xdb/0x130 [ 495.350899] kmem_cache_alloc_node_trace+0x283/0x770 [ 495.355991] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 495.361430] __kmalloc_node_track_caller+0x3d/0x80 [ 495.366937] __kmalloc_reserve.isra.0+0x40/0xe0 [ 495.371686] __alloc_skb+0xcf/0x500 [ 495.375335] ? skb_scrub_packet+0x4b0/0x4b0 [ 495.379637] ? netlink_has_listeners+0x20a/0x330 [ 495.384380] kobject_uevent_env+0x74c/0xc41 [ 495.388712] kobject_uevent+0x20/0x26 [ 495.392512] lo_ioctl+0x11d3/0x1c70 [ 495.396227] ? loop_probe+0x160/0x160 [ 495.400037] blkdev_ioctl+0x983/0x1880 [ 495.403919] ? blkpg_ioctl+0x980/0x980 [ 495.407813] ? __might_sleep+0x93/0xb0 [ 495.411687] ? __fget+0x210/0x370 [ 495.415127] block_ioctl+0xde/0x120 [ 495.418739] ? blkdev_fallocate+0x3b0/0x3b0 [ 495.423063] do_vfs_ioctl+0x7b9/0x1070 [ 495.426944] ? selinux_file_mprotect+0x5d0/0x5d0 [ 495.431688] ? lock_downgrade+0x6e0/0x6e0 [ 495.435830] ? ioctl_preallocate+0x1c0/0x1c0 [ 495.440228] ? __fget+0x237/0x370 [ 495.443673] ? security_file_ioctl+0x8f/0xc0 [ 495.448093] SyS_ioctl+0x8f/0xc0 [ 495.451467] ? do_vfs_ioctl+0x1070/0x1070 [ 495.455619] do_syscall_64+0x1eb/0x630 [ 495.459494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 495.464328] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 495.469677] RIP: 0033:0x458a97 13:17:26 executing program 5 (fault-call:2 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={@remote={[], 0x2}, 0xa, 'bridge0\x00'}) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 495.472865] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.480668] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 495.487950] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 495.495222] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 495.502684] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 495.510184] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:26 executing program 4: setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 495.606897] FAULT_INJECTION: forcing a failure. [ 495.606897] name failslab, interval 1, probability 0, space 0, times 0 [ 495.624961] CPU: 0 PID: 23100 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 495.632157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.641504] Call Trace: [ 495.644119] dump_stack+0x138/0x19c [ 495.647751] should_fail.cold+0x10f/0x159 [ 495.651908] should_failslab+0xdb/0x130 [ 495.655878] kmem_cache_alloc_trace+0x2ec/0x790 [ 495.660530] ? __lockdep_init_map+0x10c/0x570 [ 495.665026] ? loop_get_status64+0x120/0x120 [ 495.669515] __kthread_create_on_node+0xe3/0x3e0 [ 495.674277] ? kthread_park+0x140/0x140 [ 495.678351] ? _raw_spin_unlock+0x2d/0x50 [ 495.682498] ? __fget+0x210/0x370 [ 495.686040] ? loop_get_status64+0x120/0x120 [ 495.690439] kthread_create_on_node+0xa8/0xd0 [ 495.694921] ? __kthread_create_on_node+0x3e0/0x3e0 [ 495.699949] ? __lockdep_init_map+0x10c/0x570 [ 495.704447] lo_ioctl+0xce4/0x1c70 [ 495.707976] ? loop_probe+0x160/0x160 [ 495.711803] blkdev_ioctl+0x983/0x1880 [ 495.715700] ? blkpg_ioctl+0x980/0x980 [ 495.719608] ? __might_sleep+0x93/0xb0 [ 495.723510] ? __fget+0x210/0x370 [ 495.726965] block_ioctl+0xde/0x120 [ 495.730589] ? blkdev_fallocate+0x3b0/0x3b0 [ 495.734894] do_vfs_ioctl+0x7b9/0x1070 [ 495.738767] ? selinux_file_mprotect+0x5d0/0x5d0 [ 495.743590] ? lock_downgrade+0x6e0/0x6e0 [ 495.747737] ? ioctl_preallocate+0x1c0/0x1c0 [ 495.752133] ? __fget+0x237/0x370 [ 495.755661] ? security_file_ioctl+0x8f/0xc0 [ 495.760074] SyS_ioctl+0x8f/0xc0 [ 495.763438] ? do_vfs_ioctl+0x1070/0x1070 [ 495.767578] do_syscall_64+0x1eb/0x630 [ 495.771475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 495.776332] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 495.781509] RIP: 0033:0x458a97 [ 495.784688] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.792387] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 495.799644] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 13:17:26 executing program 1 (fault-call:2 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 495.806902] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 495.814168] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 495.821420] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:26 executing program 5 (fault-call:2 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 495.874936] protocol 88fb is buggy, dev hsr_slave_0 [ 495.880097] protocol 88fb is buggy, dev hsr_slave_1 [ 495.886975] FAULT_INJECTION: forcing a failure. [ 495.886975] name failslab, interval 1, probability 0, space 0, times 0 [ 495.899142] CPU: 0 PID: 23113 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 495.906275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.915638] Call Trace: [ 495.918248] dump_stack+0x138/0x19c [ 495.921895] should_fail.cold+0x10f/0x159 [ 495.926054] should_failslab+0xdb/0x130 [ 495.930041] kmem_cache_alloc_node+0x28a/0x780 [ 495.934637] __alloc_skb+0x9c/0x500 [ 495.938271] ? skb_scrub_packet+0x4b0/0x4b0 [ 495.942603] ? netlink_has_listeners+0x20a/0x330 [ 495.947365] kobject_uevent_env+0x74c/0xc41 [ 495.951737] kobject_uevent+0x20/0x26 [ 495.955536] lo_ioctl+0x11d3/0x1c70 [ 495.959609] ? loop_probe+0x160/0x160 [ 495.963416] blkdev_ioctl+0x983/0x1880 [ 495.967305] ? blkpg_ioctl+0x980/0x980 [ 495.971196] ? __might_sleep+0x93/0xb0 [ 495.975097] ? __fget+0x210/0x370 [ 495.978562] block_ioctl+0xde/0x120 [ 495.982194] ? blkdev_fallocate+0x3b0/0x3b0 [ 495.986550] do_vfs_ioctl+0x7b9/0x1070 [ 495.990438] ? selinux_file_mprotect+0x5d0/0x5d0 [ 495.995203] ? lock_downgrade+0x6e0/0x6e0 [ 495.999360] ? ioctl_preallocate+0x1c0/0x1c0 [ 496.003772] ? __fget+0x237/0x370 [ 496.007243] ? security_file_ioctl+0x8f/0xc0 [ 496.011656] SyS_ioctl+0x8f/0xc0 [ 496.015022] ? do_vfs_ioctl+0x1070/0x1070 [ 496.019296] do_syscall_64+0x1eb/0x630 [ 496.023180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 496.028029] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 496.033215] RIP: 0033:0x458a97 [ 496.036412] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 496.044120] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 496.051375] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 496.058645] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 496.065904] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 496.073166] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 496.095992] FAULT_INJECTION: forcing a failure. [ 496.095992] name failslab, interval 1, probability 0, space 0, times 0 [ 496.107664] CPU: 1 PID: 23116 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 496.115029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.124374] Call Trace: [ 496.126957] dump_stack+0x138/0x19c [ 496.130729] should_fail.cold+0x10f/0x159 [ 496.134877] should_failslab+0xdb/0x130 [ 496.138834] kmem_cache_alloc_trace+0x2ec/0x790 [ 496.143765] ? __lockdep_init_map+0x10c/0x570 [ 496.148337] ? loop_get_status64+0x120/0x120 [ 496.152742] __kthread_create_on_node+0xe3/0x3e0 [ 496.157490] ? kthread_park+0x140/0x140 [ 496.161447] ? __fget+0x210/0x370 [ 496.164890] ? loop_get_status64+0x120/0x120 [ 496.169284] kthread_create_on_node+0xa8/0xd0 [ 496.173775] ? __kthread_create_on_node+0x3e0/0x3e0 [ 496.178782] ? __lockdep_init_map+0x10c/0x570 [ 496.183264] lo_ioctl+0xce4/0x1c70 [ 496.186790] ? loop_probe+0x160/0x160 [ 496.190578] blkdev_ioctl+0x983/0x1880 [ 496.194455] ? blkpg_ioctl+0x980/0x980 [ 496.198331] ? __might_sleep+0x93/0xb0 [ 496.202202] ? __fget+0x210/0x370 [ 496.205740] block_ioctl+0xde/0x120 [ 496.209361] ? blkdev_fallocate+0x3b0/0x3b0 [ 496.213769] do_vfs_ioctl+0x7b9/0x1070 [ 496.217645] ? selinux_file_mprotect+0x5d0/0x5d0 [ 496.222385] ? lock_downgrade+0x6e0/0x6e0 [ 496.226515] ? ioctl_preallocate+0x1c0/0x1c0 [ 496.230903] ? __fget+0x237/0x370 [ 496.234367] ? security_file_ioctl+0x8f/0xc0 [ 496.238852] SyS_ioctl+0x8f/0xc0 [ 496.242234] ? do_vfs_ioctl+0x1070/0x1070 [ 496.246394] do_syscall_64+0x1eb/0x630 [ 496.250273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 496.255108] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 496.260284] RIP: 0033:0x458a97 [ 496.263994] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:17:27 executing program 5 (fault-call:2 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 496.271963] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 496.279255] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 496.286531] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 496.293807] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 496.301074] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 496.358991] protocol 88fb is buggy, dev hsr_slave_0 [ 496.364189] protocol 88fb is buggy, dev hsr_slave_1 [ 496.383833] FAULT_INJECTION: forcing a failure. [ 496.383833] name failslab, interval 1, probability 0, space 0, times 0 [ 496.398217] CPU: 0 PID: 23121 Comm: syz-executor.5 Not tainted 4.14.111 #1 13:17:27 executing program 1 (fault-call:2 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 496.405268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.414622] Call Trace: [ 496.417212] dump_stack+0x138/0x19c [ 496.420848] should_fail.cold+0x10f/0x159 [ 496.424997] should_failslab+0xdb/0x130 [ 496.428958] kmem_cache_alloc+0x2d9/0x780 [ 496.433180] ? save_trace+0x290/0x290 [ 496.436975] __kernfs_new_node+0x70/0x420 [ 496.441108] kernfs_new_node+0x80/0xf0 [ 496.444992] kernfs_create_dir_ns+0x41/0x140 [ 496.449391] internal_create_group+0xea/0x7b0 [ 496.453889] sysfs_create_group+0x20/0x30 [ 496.458033] lo_ioctl+0x1163/0x1c70 [ 496.461646] ? loop_probe+0x160/0x160 [ 496.465436] blkdev_ioctl+0x983/0x1880 [ 496.469304] ? blkpg_ioctl+0x980/0x980 [ 496.473177] ? __might_sleep+0x93/0xb0 [ 496.477052] ? __fget+0x210/0x370 [ 496.480502] block_ioctl+0xde/0x120 [ 496.484126] ? blkdev_fallocate+0x3b0/0x3b0 [ 496.488445] do_vfs_ioctl+0x7b9/0x1070 [ 496.492319] ? selinux_file_mprotect+0x5d0/0x5d0 [ 496.497058] ? lock_downgrade+0x6e0/0x6e0 [ 496.501209] ? ioctl_preallocate+0x1c0/0x1c0 [ 496.505709] ? __fget+0x237/0x370 [ 496.509250] ? security_file_ioctl+0x8f/0xc0 [ 496.513644] SyS_ioctl+0x8f/0xc0 [ 496.516998] ? do_vfs_ioctl+0x1070/0x1070 [ 496.521139] do_syscall_64+0x1eb/0x630 [ 496.525020] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 496.529922] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 496.535103] RIP: 0033:0x458a97 [ 496.538281] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 496.546166] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 496.553430] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 496.560689] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 496.568121] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 496.575385] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 496.601422] FAULT_INJECTION: forcing a failure. [ 496.601422] name failslab, interval 1, probability 0, space 0, times 0 [ 496.613652] CPU: 0 PID: 23128 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 496.620703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.630190] Call Trace: [ 496.633003] dump_stack+0x138/0x19c [ 496.636645] should_fail.cold+0x10f/0x159 [ 496.640805] should_failslab+0xdb/0x130 [ 496.644778] kmem_cache_alloc_node_trace+0x283/0x770 [ 496.649895] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 496.655338] __kmalloc_node_track_caller+0x3d/0x80 [ 496.660257] __kmalloc_reserve.isra.0+0x40/0xe0 [ 496.665014] __alloc_skb+0xcf/0x500 [ 496.668648] ? skb_scrub_packet+0x4b0/0x4b0 [ 496.672967] ? netlink_has_listeners+0x20a/0x330 [ 496.677719] kobject_uevent_env+0x74c/0xc41 [ 496.682569] kobject_uevent+0x20/0x26 [ 496.686389] lo_ioctl+0x11d3/0x1c70 [ 496.690000] ? loop_probe+0x160/0x160 [ 496.693801] blkdev_ioctl+0x983/0x1880 [ 496.697701] ? blkpg_ioctl+0x980/0x980 [ 496.701610] ? __might_sleep+0x93/0xb0 [ 496.705488] ? __fget+0x210/0x370 [ 496.708928] block_ioctl+0xde/0x120 [ 496.712548] ? blkdev_fallocate+0x3b0/0x3b0 [ 496.716883] do_vfs_ioctl+0x7b9/0x1070 [ 496.720775] ? selinux_file_mprotect+0x5d0/0x5d0 [ 496.725599] ? lock_downgrade+0x6e0/0x6e0 [ 496.729739] ? ioctl_preallocate+0x1c0/0x1c0 [ 496.734142] ? __fget+0x237/0x370 [ 496.737597] ? security_file_ioctl+0x8f/0xc0 [ 496.741989] SyS_ioctl+0x8f/0xc0 [ 496.745357] ? do_vfs_ioctl+0x1070/0x1070 [ 496.749506] do_syscall_64+0x1eb/0x630 [ 496.753399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 496.758353] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 496.763623] RIP: 0033:0x458a97 [ 496.766819] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 496.774521] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 496.781817] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 496.789092] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 496.796621] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 496.803885] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'nlmon0\x00', @ifru_addrs=@isdn={0x22, 0x3, 0x100, 0x8000, 0x6}}}) r1 = eventfd(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r1, r2, 0x0, 0x1) r3 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r3, 0x0, 0xffffffffffffff7e, 0xc0, 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000000), 0x4) 13:17:28 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000640)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10003, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) r3 = syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x3ff, 0x80) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000500)) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000007c0)=ANY=[@ANYBLOB="3039fa1abae74933"]) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$sock_int(r3, 0x1, 0xc, &(0x7f0000000100), &(0x7f0000000080)=0x4) 13:17:28 executing program 5 (fault-call:2 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:28 executing program 1 (fault-call:2 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:28 executing program 0: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) unshare(0x40600) r0 = open(&(0x7f0000a94ff4)='./file0/bus\x00', 0x0, 0x0) getgroups(0x5, &(0x7f00000004c0)=[0xee01, 0x0, 0xee01, 0x0, 0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x370e, 0x5, &(0x7f0000000440)=[{&(0x7f0000000080)="bbf81b3d2754cf3ea9dd064787b333e2205f665fb1bf859c871c02cc17311398c65ca51f406327920e84b8e784095f94e2510ba8a17a284be3e07f8acca53460e046e2531ae314728d1410387db6a8", 0x4f, 0xfffffffffffffff7}, {&(0x7f0000000100)="b58d", 0x2, 0x7}, {&(0x7f0000000140)="f99afa6460c19aafea79c82f5f48226f4d2adfd2bf5699b8b790903909dfcb257f4a89acff4b4c366f2568d0e5f278302fdd80cf6fa19b52260da1e4111224d78b76341a2642b34a348a6178354cc57391d551775f04621a6b0fc6ef68b54602e11a3dc1f1831e4dce9d6b7846ab05411ce950a6a06c0dca3aece3cbb7579aa68186c9dd32a122dad94d3e4ce50e317629ebb4c479bf4ad3e53671311c737cf24f26295a9133c4815a2eb145ef05579ba23c67f18ae772bc3b3872ed112ba4cef976002a", 0xc4, 0x4}, {&(0x7f0000000240)="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", 0xfe, 0x2}, {&(0x7f0000000340)="6b4df5e4d3b5bdde82a877cea8569244ecdada646875377010712b1aa76f751fcfa3b2d65d2eeaaa2aad64e6be27843b6b9f6a01fd097d8e09d9b53f3c3564ba04ebe9d1ee24546202ef4f3ba1a0cd0fb74ac546f11d92be06c3f2c08478222e465166e21792385ff84e9ac4964be79c26283da83feab4ddf4e894a10c08b1b02a70bb81f12db491ec7a2a07257d0c5f02f409814c641e95c2e54afe9e21a830e4e572320236d74451a05bb33b0bfd12639404dda5bd711d2afb4c219774390972861fa18f694d6dab5a78e19b1b9229a9f8c6848d176b7bfdb3ecdedf059c8f05f019b0538f0d167e835367b5a882b0c72af0ec967816272b8e", 0xfa, 0x1}], 0x8000, &(0x7f0000000700)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r1, @ANYBLOB="2c756d61736b3d30303030303030303030303030303030303030303335312c6673757569643d77393900323734002d773531622d367775612d363f72002d627737003f6576352c7365636c6162656c2c61707072616973655f747970653d696d617369672c61756469742c736d61636b66737472616e736d7574653d232c736d618c0a0000000000003d73656375726974795d2570726f63292c7569643ca68104c75ccf4ef4400c590c63afd39728abff9101f43bdd966e733f299f6659be3f78409ddb6fab26e9e9520010c532d2ce661f581521", @ANYRESDEC=r2, @ANYBLOB=',defcontext=staff_u,smackfsroot=\\cpuset,smackfshat=security:^!lo,\x00']) readahead(r0, 0x5, 0x3) [ 498.175332] FAULT_INJECTION: forcing a failure. [ 498.175332] name failslab, interval 1, probability 0, space 0, times 0 [ 498.190247] CPU: 1 PID: 23145 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 498.197298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.206646] Call Trace: [ 498.209232] dump_stack+0x138/0x19c [ 498.212853] should_fail.cold+0x10f/0x159 [ 498.216991] should_failslab+0xdb/0x130 [ 498.220951] kmem_cache_alloc_node_trace+0x283/0x770 [ 498.226130] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 498.231571] __kmalloc_node_track_caller+0x3d/0x80 [ 498.236484] __kmalloc_reserve.isra.0+0x40/0xe0 [ 498.241134] __alloc_skb+0xcf/0x500 [ 498.244746] ? skb_scrub_packet+0x4b0/0x4b0 [ 498.249056] ? netlink_has_listeners+0x20a/0x330 [ 498.253996] kobject_uevent_env+0x74c/0xc41 [ 498.258319] kobject_uevent+0x20/0x26 [ 498.262101] lo_ioctl+0x11d3/0x1c70 [ 498.265729] ? loop_probe+0x160/0x160 [ 498.269529] blkdev_ioctl+0x983/0x1880 [ 498.273398] ? blkpg_ioctl+0x980/0x980 [ 498.277274] ? __might_sleep+0x93/0xb0 [ 498.281145] ? __fget+0x210/0x370 [ 498.284667] block_ioctl+0xde/0x120 [ 498.288276] ? blkdev_fallocate+0x3b0/0x3b0 [ 498.292614] do_vfs_ioctl+0x7b9/0x1070 [ 498.296487] ? selinux_file_mprotect+0x5d0/0x5d0 [ 498.301223] ? lock_downgrade+0x6e0/0x6e0 [ 498.305362] ? ioctl_preallocate+0x1c0/0x1c0 [ 498.309841] ? __fget+0x237/0x370 [ 498.313283] ? security_file_ioctl+0x8f/0xc0 [ 498.317681] SyS_ioctl+0x8f/0xc0 [ 498.321040] ? do_vfs_ioctl+0x1070/0x1070 [ 498.325183] do_syscall_64+0x1eb/0x630 [ 498.329066] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 498.333903] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 498.339092] RIP: 0033:0x458a97 [ 498.342264] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 498.349957] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 498.357207] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 498.364456] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 498.371709] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 498.378978] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 498.398677] audit: type=1804 audit(1555420649.164:140): pid=23152 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir042744487/syzkaller.EC7J2X/608/file0/bus" dev="sda1" ino=16770 res=1 [ 498.401604] FAULT_INJECTION: forcing a failure. [ 498.401604] name failslab, interval 1, probability 0, space 0, times 0 [ 498.438368] CPU: 1 PID: 23150 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 498.445410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.454760] Call Trace: [ 498.457342] dump_stack+0x138/0x19c [ 498.460957] should_fail.cold+0x10f/0x159 [ 498.465089] should_failslab+0xdb/0x130 [ 498.469066] kmem_cache_alloc+0x2d9/0x780 [ 498.473207] ? __mutex_unlock_slowpath+0x71/0x800 [ 498.478034] ? __lock_is_held+0xb6/0x140 [ 498.482087] __kernfs_new_node+0x70/0x420 [ 498.486217] kernfs_new_node+0x80/0xf0 [ 498.490089] __kernfs_create_file+0x46/0x323 [ 498.494485] sysfs_add_file_mode_ns+0x1e4/0x450 [ 498.499148] internal_create_group+0x235/0x7b0 [ 498.504150] sysfs_create_group+0x20/0x30 [ 498.508385] lo_ioctl+0x1163/0x1c70 [ 498.512003] ? loop_probe+0x160/0x160 [ 498.515843] blkdev_ioctl+0x983/0x1880 [ 498.519713] ? blkpg_ioctl+0x980/0x980 [ 498.523758] ? __might_sleep+0x93/0xb0 [ 498.527629] ? __fget+0x210/0x370 [ 498.531134] block_ioctl+0xde/0x120 [ 498.535270] ? blkdev_fallocate+0x3b0/0x3b0 [ 498.539583] do_vfs_ioctl+0x7b9/0x1070 [ 498.543539] ? selinux_file_mprotect+0x5d0/0x5d0 [ 498.548363] ? lock_downgrade+0x6e0/0x6e0 [ 498.552495] ? ioctl_preallocate+0x1c0/0x1c0 [ 498.556890] ? __fget+0x237/0x370 [ 498.560337] ? security_file_ioctl+0x8f/0xc0 [ 498.564727] SyS_ioctl+0x8f/0xc0 [ 498.568088] ? do_vfs_ioctl+0x1070/0x1070 [ 498.572229] do_syscall_64+0x1eb/0x630 [ 498.576123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 498.580953] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 498.586126] RIP: 0033:0x458a97 [ 498.589483] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 498.597176] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 498.604515] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 498.611870] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 498.619125] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:17:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x2, @in, 0x0, 0x4}}, 0xe8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x4) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 13:17:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {}, {}, {}, {}, {0x0, 0x105000}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)={0x6, 0x0, [{0xb, 0xff, 0x3, 0xf09a, 0x8001}, {0xc0000007, 0x3, 0x2a2, 0x8, 0x4}, {0x0, 0x9, 0x1c41, 0x2, 0x8}, {0xb, 0x101, 0x40, 0x7f, 0x5}, {0x2, 0x8, 0x7f, 0x7, 0x4}, {0x80000001, 0x89, 0x13, 0x9, 0x8}]}) [ 498.626671] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:29 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @empty, [], {@canfd={0xd, {{0x0, 0x6700, 0xfffffffffffffffa, 0x5}, 0x37, 0x3, 0x0, 0x0, "a0c344f96a8cc16b9d09000581203508328bf805e1d129369d3d11289cb7a015419694ead61f6ce5c5904e4dac8f1b8f67bb86e46ad7d5f35b0a218d1aed2a2b"}}}}, 0x0) 13:17:29 executing program 1 (fault-call:2 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:29 executing program 5 (fault-call:2 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() r3 = getpgrp(0xffffffffffffffff) kcmp(r2, r3, 0x1, r1, r1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'dunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000000)=0x1) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000001c0)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0xaaaaaaaaaaaac5c, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendfile(r1, r1, &(0x7f00000000c0), 0x4) 13:17:29 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x7ff}}, 0x10) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, 0x0, 0x0) [ 498.846625] FAULT_INJECTION: forcing a failure. [ 498.846625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 498.858568] CPU: 0 PID: 23175 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 498.865760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.875194] FAULT_INJECTION: forcing a failure. [ 498.875194] name failslab, interval 1, probability 0, space 0, times 0 [ 498.875471] Call Trace: [ 498.889594] dump_stack+0x138/0x19c [ 498.893240] should_fail.cold+0x10f/0x159 [ 498.897405] __alloc_pages_nodemask+0x1d6/0x7a0 [ 498.902123] ? fs_reclaim_acquire+0x20/0x20 [ 498.906463] ? __alloc_pages_slowpath+0x2930/0x2930 [ 498.911493] cache_grow_begin+0x80/0x410 [ 498.915654] kmem_cache_alloc+0x6a8/0x780 [ 498.919813] ? selinux_file_mprotect+0x5d0/0x5d0 [ 498.924567] ? lock_downgrade+0x6e0/0x6e0 [ 498.928728] getname_flags+0xcb/0x580 [ 498.932516] SyS_mkdir+0x7e/0x200 [ 498.935952] ? SyS_mkdirat+0x210/0x210 [ 498.939837] ? do_syscall_64+0x53/0x630 [ 498.944055] ? SyS_mkdirat+0x210/0x210 [ 498.947926] do_syscall_64+0x1eb/0x630 [ 498.952058] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 498.956986] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 498.962157] RIP: 0033:0x458047 [ 498.965329] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 498.973121] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 498.980390] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 498.987654] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 498.994907] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 499.002160] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 499.011440] CPU: 1 PID: 23178 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 499.018480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.028090] Call Trace: [ 499.030927] dump_stack+0x138/0x19c [ 499.034544] should_fail.cold+0x10f/0x159 [ 499.038680] should_failslab+0xdb/0x130 [ 499.042727] kmem_cache_alloc+0x2d9/0x780 [ 499.046871] ? wait_for_completion+0x420/0x420 [ 499.051753] __kernfs_new_node+0x70/0x420 [ 499.055887] kernfs_new_node+0x80/0xf0 [ 499.059778] __kernfs_create_file+0x46/0x323 [ 499.064172] sysfs_add_file_mode_ns+0x1e4/0x450 [ 499.068843] internal_create_group+0x235/0x7b0 [ 499.073500] sysfs_create_group+0x20/0x30 [ 499.077807] lo_ioctl+0x1163/0x1c70 [ 499.081532] ? loop_probe+0x160/0x160 [ 499.085406] blkdev_ioctl+0x983/0x1880 [ 499.089375] ? blkpg_ioctl+0x980/0x980 [ 499.093252] ? __might_sleep+0x93/0xb0 [ 499.097121] ? __fget+0x210/0x370 [ 499.100646] block_ioctl+0xde/0x120 [ 499.104256] ? blkdev_fallocate+0x3b0/0x3b0 [ 499.108561] do_vfs_ioctl+0x7b9/0x1070 [ 499.112438] ? selinux_file_mprotect+0x5d0/0x5d0 [ 499.117270] ? lock_downgrade+0x6e0/0x6e0 [ 499.121600] ? ioctl_preallocate+0x1c0/0x1c0 [ 499.126343] ? __fget+0x237/0x370 [ 499.129799] ? security_file_ioctl+0x8f/0xc0 [ 499.134223] SyS_ioctl+0x8f/0xc0 [ 499.137575] ? do_vfs_ioctl+0x1070/0x1070 [ 499.141730] do_syscall_64+0x1eb/0x630 [ 499.145600] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 499.150431] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 499.155694] RIP: 0033:0x458a97 [ 499.158961] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 499.166658] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 499.174231] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 499.181600] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 499.189045] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 499.196906] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:31 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:31 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f0000000000)={0x7, 0x3, 0x8, 0x100000000, 0x8, 0x10000, 0x9, 0x401}, &(0x7f0000000040)={0x54c, 0x2, 0x3, 0x9, 0x4, 0x6, 0xfffffffffffffffc, 0x20}, &(0x7f0000000080)={0x1ff, 0x10000, 0x6, 0x40, 0x6, 0xef2, 0x7, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000280)={&(0x7f0000000240)={0xbba3}, 0x8}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 13:17:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x1, 'team_slave_0\x00'}, 0x18) 13:17:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x127a, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2934d520, 0x3, 0x0, 0x2, 0xf, 0x98ba48d6d766f83c, "388a5a868838c281e3e88ec5add966b410a20df8a13f9a4006cb01b55012d3f46b1961cc23daa382892cd33082cfade472d664c93536f86b2bc0c889e96a165b", "c875c910217e2e159780d5d3d5830407b462d874744aab8185ed0233b11b4be36694abf963106c1f13bb491caf2f6ffd9f645c78fc4a55b58a3a36e7b531b54f", "46fb73f787eea6507519a7c5dd9909182b5a2ae54e61d1a8f73075084dba52cf", [0xf3, 0x10001]}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000180)) 13:17:31 executing program 1 (fault-call:2 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:31 executing program 5 (fault-call:2 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @remote}, 0x1c) timer_create(0x6, 0x0, 0x0) timer_gettime(0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x8004e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000400)=0xfffffffffffffff7, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1c}, 0x1c}}, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c85ec9d164711dab06cd268bc410b6a0cf51e5b362cb21b0c782e77cd06a6f18607413947441863587226c137a4b66e7b6ae07cc1d6a7448c91ac82ce16e2a0813749cf495fcc715337cd3673549705d079c64709c9ef45fc026878d8332a7584c0418eb723089cf51c3349012bae277e780bad5a07574dc1fdc4c3a93e73830b7efd0fbb4929d0dafb7b32247c30a2e63c73a040e7d2c08d1b16d0e0159c4a679531b4735e26a675bda88b08834389e5848332454be7c5ed6713ddb7bf527462e8add630e1026de34dee4f5433a018b3fb67e5e0422093569359c42cf08e04ef20018fa9ab7ff897522624ffe29d9a57ed728cbc7704dd"], 0x1}}, 0x40001) read(r0, &(0x7f0000000180)=""/139, 0x8b) sendto$inet6(r0, &(0x7f00000000c0)='w', 0x1, 0x4000008081, 0x0, 0x0) [ 501.213562] FAULT_INJECTION: forcing a failure. [ 501.213562] name failslab, interval 1, probability 0, space 0, times 0 [ 501.230334] CPU: 1 PID: 23200 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 501.237560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.247215] Call Trace: [ 501.249834] dump_stack+0x138/0x19c [ 501.253701] should_fail.cold+0x10f/0x159 [ 501.257914] should_failslab+0xdb/0x130 [ 501.262736] kmem_cache_alloc+0x2d9/0x780 [ 501.262749] ? wait_for_completion+0x420/0x420 [ 501.262765] __kernfs_new_node+0x70/0x420 [ 501.262786] kernfs_new_node+0x80/0xf0 [ 501.262800] __kernfs_create_file+0x46/0x323 [ 501.284039] sysfs_add_file_mode_ns+0x1e4/0x450 [ 501.288722] internal_create_group+0x235/0x7b0 [ 501.293300] sysfs_create_group+0x20/0x30 [ 501.297435] lo_ioctl+0x1163/0x1c70 [ 501.301080] ? loop_probe+0x160/0x160 [ 501.304877] blkdev_ioctl+0x983/0x1880 [ 501.308760] ? blkpg_ioctl+0x980/0x980 [ 501.312684] ? __might_sleep+0x93/0xb0 [ 501.316736] ? __fget+0x210/0x370 [ 501.320192] block_ioctl+0xde/0x120 [ 501.323943] ? blkdev_fallocate+0x3b0/0x3b0 [ 501.328257] do_vfs_ioctl+0x7b9/0x1070 [ 501.332146] ? selinux_file_mprotect+0x5d0/0x5d0 [ 501.336895] ? lock_downgrade+0x6e0/0x6e0 [ 501.341145] ? ioctl_preallocate+0x1c0/0x1c0 [ 501.345673] ? __fget+0x237/0x370 [ 501.349198] ? security_file_ioctl+0x8f/0xc0 [ 501.353614] SyS_ioctl+0x8f/0xc0 [ 501.357002] ? do_vfs_ioctl+0x1070/0x1070 [ 501.361142] do_syscall_64+0x1eb/0x630 [ 501.365034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 501.369874] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 501.375050] RIP: 0033:0x458a97 [ 501.378253] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 501.385979] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 501.393567] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 501.400838] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 501.408405] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 501.415670] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 501.423223] protocol 88fb is buggy, dev hsr_slave_0 [ 501.428309] protocol 88fb is buggy, dev hsr_slave_1 [ 501.433606] protocol 88fb is buggy, dev hsr_slave_0 [ 501.438746] protocol 88fb is buggy, dev hsr_slave_1 [ 501.443917] protocol 88fb is buggy, dev hsr_slave_0 [ 501.449094] protocol 88fb is buggy, dev hsr_slave_1 13:17:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7e31, 0x20000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0xcc71, 0x20, 0x4, 0x5}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xc67, 0x49, 0x200000000000, 0x0, 0x85}, &(0x7f0000000200)=0x98) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x40050) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="48000000151e0702000000000000000002ff00060000000000000000", @ANYRES32], 0x24c}}, 0x0) [ 501.460089] FAULT_INJECTION: forcing a failure. [ 501.460089] name failslab, interval 1, probability 0, space 0, times 0 [ 501.507305] CPU: 0 PID: 23204 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 501.515060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.524511] Call Trace: [ 501.527103] dump_stack+0x138/0x19c [ 501.530726] should_fail.cold+0x10f/0x159 [ 501.534873] should_failslab+0xdb/0x130 [ 501.538834] kmem_cache_alloc+0x2d9/0x780 [ 501.543069] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 501.548594] ? ext4_sync_fs+0x810/0x810 [ 501.552569] ext4_alloc_inode+0x1d/0x610 [ 501.556704] alloc_inode+0x66/0x190 [ 501.560319] new_inode_pseudo+0x19/0xf0 [ 501.564274] new_inode+0x1f/0x40 [ 501.567805] __ext4_new_inode+0x32c/0x4870 [ 501.572131] ? avc_has_perm+0x2df/0x4b0 [ 501.576094] ? ext4_free_inode+0x1210/0x1210 [ 501.580590] ? dquot_get_next_dqblk+0x160/0x160 [ 501.585247] ext4_mkdir+0x331/0xc20 [ 501.588878] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 501.593531] ? security_inode_mkdir+0xd6/0x110 [ 501.598118] vfs_mkdir+0x3cf/0x610 [ 501.601643] SyS_mkdir+0x1b7/0x200 [ 501.605165] ? SyS_mkdirat+0x210/0x210 [ 501.609041] ? do_syscall_64+0x53/0x630 [ 501.613083] ? SyS_mkdirat+0x210/0x210 [ 501.616962] do_syscall_64+0x1eb/0x630 [ 501.620833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 501.625662] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 501.630850] RIP: 0033:0x458047 [ 501.634032] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 501.641889] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 501.649247] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 501.656501] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 501.663758] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 501.671021] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40, 0x0) sync_file_range(r0, 0x3, 0x401, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80800, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x8735}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)={r3, 0xc1, "bd447bdcfceff1a3a47f60ed71a063ecf14e94fe4a70cf34d19312e3cce98e53b5506a3cfa81bf325c821e969865e1a228d7cdddfabac1e808425ac6c8a1fbbef96f4bddb33ba77ef7b17d782dbb7c3b1b5cb2a69566c9777fc48720f78f209661372b658655d557f6f27b947e58187b435694e22aec3e9d1cc006f112f3f5492010961e5e34c7e21d58b2bad3abf7cf712a710d18f2fd1ef5633bd6f8a0ce9577544e500669a093b9bd3cf835ee51b53fe2e0178f2abe47e485ca2a4a60be416e"}, &(0x7f00000003c0)=0xc9) ioctl$EVIOCGMASK(r2, 0x80104592, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000200)={0x5, 0x0, [{0xb6c, 0x0, 0x3}, {0xbbe, 0x0, 0x8350}, {0x90a, 0x0, 0x46}, {0xb75, 0x0, 0x7}, {0xbec, 0x0, 0xfff}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) 13:17:32 executing program 5 (fault-call:2 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:32 executing program 1 (fault-call:2 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 501.792186] FAULT_INJECTION: forcing a failure. [ 501.792186] name failslab, interval 1, probability 0, space 0, times 0 [ 501.806769] CPU: 1 PID: 23230 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 501.813909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.823370] Call Trace: [ 501.825968] dump_stack+0x138/0x19c [ 501.829621] should_fail.cold+0x10f/0x159 [ 501.833787] should_failslab+0xdb/0x130 [ 501.837775] kmem_cache_alloc+0x2d9/0x780 [ 501.841937] ? wait_for_completion+0x420/0x420 [ 501.846533] __kernfs_new_node+0x70/0x420 [ 501.850680] kernfs_new_node+0x80/0xf0 [ 501.854562] __kernfs_create_file+0x46/0x323 [ 501.858977] sysfs_add_file_mode_ns+0x1e4/0x450 [ 501.863992] internal_create_group+0x235/0x7b0 [ 501.868578] sysfs_create_group+0x20/0x30 [ 501.872746] lo_ioctl+0x1163/0x1c70 [ 501.876393] ? loop_probe+0x160/0x160 [ 501.880195] blkdev_ioctl+0x983/0x1880 [ 501.884080] ? blkpg_ioctl+0x980/0x980 [ 501.887993] ? __might_sleep+0x93/0xb0 13:17:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xc080, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000140)=""/65) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-avx\x00'}, 0x44) accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000006080)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d}, 0xffffffffffffffff}], 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x2c, 0x24000000000000, {"e5c23b52b7aab9ad75290d4591e26f27cd"}}, {0x0, "549527be01da56cb4adfeb8ad964c9992adfffcb68678b34eb49aa9e082fa3b92c1f522fff8bb65150ff0584156711c66fe45b57f418fd3ec67142e788c8bf49"}}, &(0x7f0000000240)=""/132, 0x6e, 0x84, 0x1}, 0x20) [ 501.891877] ? __fget+0x210/0x370 [ 501.895423] block_ioctl+0xde/0x120 [ 501.899059] ? blkdev_fallocate+0x3b0/0x3b0 [ 501.903382] do_vfs_ioctl+0x7b9/0x1070 [ 501.907361] ? selinux_file_mprotect+0x5d0/0x5d0 [ 501.912124] ? lock_downgrade+0x6e0/0x6e0 [ 501.916282] ? ioctl_preallocate+0x1c0/0x1c0 [ 501.920792] ? __fget+0x237/0x370 [ 501.924250] ? security_file_ioctl+0x8f/0xc0 [ 501.928829] SyS_ioctl+0x8f/0xc0 [ 501.932859] ? do_vfs_ioctl+0x1070/0x1070 [ 501.937095] do_syscall_64+0x1eb/0x630 [ 501.941153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 501.946096] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 501.964244] RIP: 0033:0x458a97 [ 501.967610] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 501.975321] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 501.982632] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 501.990001] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 501.997280] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 502.004551] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 502.019355] FAULT_INJECTION: forcing a failure. [ 502.019355] name failslab, interval 1, probability 0, space 0, times 0 [ 502.040992] CPU: 1 PID: 23233 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 502.048055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.057410] Call Trace: [ 502.060006] dump_stack+0x138/0x19c [ 502.063644] should_fail.cold+0x10f/0x159 [ 502.067822] should_failslab+0xdb/0x130 [ 502.067856] kmem_cache_alloc+0x2d9/0x780 [ 502.067869] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 502.067881] ? ext4_sync_fs+0x810/0x810 [ 502.067909] ext4_alloc_inode+0x1d/0x610 [ 502.076011] alloc_inode+0x66/0x190 [ 502.076022] new_inode_pseudo+0x19/0xf0 [ 502.076033] new_inode+0x1f/0x40 [ 502.076046] __ext4_new_inode+0x32c/0x4870 [ 502.076067] ? avc_has_perm+0x2df/0x4b0 [ 502.100557] ? ext4_free_inode+0x1210/0x1210 [ 502.109190] ? dquot_get_next_dqblk+0x160/0x160 [ 502.109209] ext4_mkdir+0x331/0xc20 [ 502.109232] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 502.109247] ? security_inode_mkdir+0xd6/0x110 [ 502.109260] vfs_mkdir+0x3cf/0x610 [ 502.109272] SyS_mkdir+0x1b7/0x200 [ 502.109281] ? SyS_mkdirat+0x210/0x210 [ 502.143824] ? do_syscall_64+0x53/0x630 [ 502.147837] ? SyS_mkdirat+0x210/0x210 [ 502.151749] do_syscall_64+0x1eb/0x630 [ 502.155747] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 502.160610] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 502.165996] RIP: 0033:0x458047 [ 502.169189] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 502.176991] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 502.184279] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 502.191567] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 502.198849] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 502.206128] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:34 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) connect$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendto$inet(r1, &(0x7f0000000f40)="03f4a2c970de1d9c3776a9481255ced5dbc57fe63cd931916a02bae17f7850aea473b1c2395dcc0f572febcadeb7fa0f2ee9dc78ccc69169ccfc0bf46dbaba25f3f5a75b77654c0cb9989ea026da080991348232bc2541328a29ec7e06942980144d2ae1b8811ef7af", 0x69, 0x0, 0x0, 0x0) write(r1, &(0x7f0000001140)="14e45d517edc8955f9a92ec6d11196538cc140efd1980537ffc7f5acb38ff49f24b9bf03bca03f86d106f5f90d7cb8f57d0400e144f984bac4fd3306a9e8145cf1ce883b121644d1050cfe762c1f81994616013a11b67ff4db6341879b2547e56c7d93bd7a78dca1816f8c5a7f2c8f3956e025eb90e0d71f65e4a6d3c578d5f18df2f636b1f3e1edc49e6b8f3a3beedd4b9fe13d84ecb8ab72e6f301ba58f88ad1e4e3aaf5832a990d6ddff53ed7c43fe065d95fe513f45bfac5e0eaa0122a04b262c3744d31b9861865c481389bdc50d4", 0xd1) 13:17:34 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:34 executing program 2: write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x4, 0x4}], 0x18) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x8, &(0x7f00000000c0)="f2748ba79354d36f"}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000180)={0x69, "908bca56a3e92bc590b63351d1c99cff51a8ad45e58f54e81b88c1d219fafab433305d07ab110db0624fca4bf51d95fca9e62f7a3318827db51b1b978079f7aae14ca529b352ead1b1a134ca656b85e7ba1443408bc81800c0ca325f04328fb8e6d505cb724a2a4f5f0e63d7f49e0b834ed5ff484d40aa8486ca07297006198e"}) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 13:17:34 executing program 1 (fault-call:2 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:34 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x401, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000005, 0x32, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x11, &(0x7f00000000c0)={0x2259, &(0x7f0000000040)}, 0x4) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x5, @local, 0x7}, @in={0x2, 0x4e21, @loopback}], 0x2c) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0585604, &(0x7f0000000000)) 13:17:34 executing program 5 (fault-call:2 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 504.271836] FAULT_INJECTION: forcing a failure. [ 504.271836] name failslab, interval 1, probability 0, space 0, times 0 [ 504.272536] FAULT_INJECTION: forcing a failure. [ 504.272536] name failslab, interval 1, probability 0, space 0, times 0 [ 504.296258] CPU: 1 PID: 23256 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 504.303306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.312770] Call Trace: [ 504.315370] dump_stack+0x138/0x19c 13:17:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgid(r1) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000651000)=""/240, &(0x7f0000000040)=0xc7) [ 504.319089] should_fail.cold+0x10f/0x159 [ 504.323227] should_failslab+0xdb/0x130 [ 504.327205] kmem_cache_alloc+0x2d9/0x780 [ 504.331351] ? wait_for_completion+0x420/0x420 [ 504.335939] __kernfs_new_node+0x70/0x420 [ 504.340100] kernfs_new_node+0x80/0xf0 [ 504.344098] __kernfs_create_file+0x46/0x323 [ 504.348596] sysfs_add_file_mode_ns+0x1e4/0x450 [ 504.353275] internal_create_group+0x235/0x7b0 [ 504.357861] sysfs_create_group+0x20/0x30 [ 504.362017] lo_ioctl+0x1163/0x1c70 [ 504.365649] ? loop_probe+0x160/0x160 [ 504.369455] blkdev_ioctl+0x983/0x1880 [ 504.373341] ? blkpg_ioctl+0x980/0x980 [ 504.377259] ? __might_sleep+0x93/0xb0 [ 504.381142] ? __fget+0x210/0x370 [ 504.384590] block_ioctl+0xde/0x120 [ 504.388213] ? blkdev_fallocate+0x3b0/0x3b0 [ 504.392888] do_vfs_ioctl+0x7b9/0x1070 [ 504.396882] ? selinux_file_mprotect+0x5d0/0x5d0 [ 504.401636] ? lock_downgrade+0x6e0/0x6e0 [ 504.405887] ? ioctl_preallocate+0x1c0/0x1c0 [ 504.410292] ? __fget+0x237/0x370 [ 504.413755] ? security_file_ioctl+0x8f/0xc0 [ 504.418167] SyS_ioctl+0x8f/0xc0 [ 504.421629] ? do_vfs_ioctl+0x1070/0x1070 [ 504.425773] do_syscall_64+0x1eb/0x630 [ 504.429652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.434527] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 504.439822] RIP: 0033:0x458a97 [ 504.443010] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 504.450714] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 504.458064] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 504.465328] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 504.472592] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 504.479854] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 504.487138] CPU: 0 PID: 23254 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 504.494174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.494178] Call Trace: [ 504.494196] dump_stack+0x138/0x19c [ 504.494213] should_fail.cold+0x10f/0x159 [ 504.494229] should_failslab+0xdb/0x130 [ 504.506302] kmem_cache_alloc+0x2d9/0x780 [ 504.506314] ? __debug_object_init+0x171/0x8e0 [ 504.506326] ? ext4_alloc_inode+0x1d/0x610 [ 504.506343] selinux_inode_alloc_security+0xb6/0x2a0 [ 504.506354] security_inode_alloc+0x9a/0xe0 [ 504.541205] inode_init_always+0x552/0xaf0 [ 504.545518] alloc_inode+0x83/0x190 [ 504.549127] new_inode_pseudo+0x19/0xf0 [ 504.553170] new_inode+0x1f/0x40 [ 504.556608] __ext4_new_inode+0x32c/0x4870 [ 504.560833] ? avc_has_perm+0x2df/0x4b0 [ 504.564884] ? ext4_free_inode+0x1210/0x1210 [ 504.569279] ? dquot_get_next_dqblk+0x160/0x160 [ 504.573936] ext4_mkdir+0x331/0xc20 [ 504.577551] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 504.582209] ? security_inode_mkdir+0xd6/0x110 [ 504.586779] vfs_mkdir+0x3cf/0x610 [ 504.590501] SyS_mkdir+0x1b7/0x200 [ 504.594024] ? SyS_mkdirat+0x210/0x210 [ 504.597895] ? do_syscall_64+0x53/0x630 [ 504.601857] ? SyS_mkdirat+0x210/0x210 [ 504.605748] do_syscall_64+0x1eb/0x630 [ 504.609713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.614644] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 504.619816] RIP: 0033:0x458047 13:17:35 executing program 0: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x5011, r0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7ff, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0e000000060000000804d000874b5ce4b44a6a71ad7c51b2920b28823615c0779819f562e7bb7658d2daaad2f03176699f4b8691a49892150b2fe506fabf202953729a66136e063024cac07ba1889c55e3c6027647e42fda78f6e386c82a02e0b221d7a97fef39d1a2ed21fb81406af978c138a89deb8fad42ab77f34d16e9e45552026fa35583871a6392fe9b0b8b4130aa691428abc19d46ed8bec9e4b39319619a64b4e31afa3860688da92fb21be2765ee4af57020ca616635d9d09e555200f71080284f3875a1a7d2f76c21d79d320b4b870000000000000000"], 0xdc) ppoll(0x0, 0x0, 0x0, &(0x7f000016a000), 0x8) [ 504.622986] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 504.630767] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 504.638020] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 504.645358] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 504.652612] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 504.659881] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x1f, 0x800) r1 = open(&(0x7f0000000240)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0xb3d4) sendfile(r0, r1, 0x0, 0x2008004fffffffe) 13:17:35 executing program 1 (fault-call:2 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:35 executing program 5 (fault-call:2 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@broute={'broute\x00', 0x20, 0x1, 0x1b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x2, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/432]}, 0x228) 13:17:35 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x14000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000080)={0x1f, 0x80, 0x7, 0x100000001}) bind$bt_sco(r0, &(0x7f0000000100), 0x8) [ 504.806719] FAULT_INJECTION: forcing a failure. [ 504.806719] name failslab, interval 1, probability 0, space 0, times 0 [ 504.819036] CPU: 0 PID: 23277 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 504.826153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.835595] Call Trace: [ 504.838282] dump_stack+0x138/0x19c [ 504.841925] should_fail.cold+0x10f/0x159 [ 504.846093] should_failslab+0xdb/0x130 [ 504.850183] __kmalloc+0x71/0x7a0 [ 504.853656] ? mls_compute_context_len+0x3f6/0x5e0 [ 504.855638] FAULT_INJECTION: forcing a failure. [ 504.855638] name failslab, interval 1, probability 0, space 0, times 0 [ 504.858593] ? context_struct_to_string+0x33a/0x630 [ 504.858626] context_struct_to_string+0x33a/0x630 [ 504.858636] ? dump_masked_av_helper+0x90/0x90 [ 504.858653] security_sid_to_context_core+0x18a/0x200 [ 504.889640] security_sid_to_context_force+0x2b/0x40 [ 504.894771] selinux_inode_init_security+0x493/0x700 [ 504.900008] ? selinux_inode_create+0x30/0x30 [ 504.904510] ? kfree+0x20d/0x270 [ 504.907885] security_inode_init_security+0x193/0x370 [ 504.913072] ? ext4_init_acl+0x1f0/0x1f0 [ 504.917127] ? security_kernel_post_read_file+0xe0/0xe0 [ 504.922489] ? posix_acl_create+0xf5/0x3a0 [ 504.926745] ? ext4_set_acl+0x400/0x400 [ 504.930710] ? lock_downgrade+0x6e0/0x6e0 [ 504.935028] ext4_init_security+0x34/0x40 [ 504.939175] __ext4_new_inode+0x3387/0x4870 [ 504.943529] ? ext4_free_inode+0x1210/0x1210 [ 504.948203] ? dquot_get_next_dqblk+0x160/0x160 [ 504.952962] ext4_mkdir+0x331/0xc20 [ 504.956780] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 504.961447] ? security_inode_mkdir+0xd6/0x110 [ 504.966053] vfs_mkdir+0x3cf/0x610 [ 504.969590] SyS_mkdir+0x1b7/0x200 [ 504.973209] ? SyS_mkdirat+0x210/0x210 [ 504.977883] ? do_syscall_64+0x53/0x630 [ 504.981865] ? SyS_mkdirat+0x210/0x210 [ 504.985839] do_syscall_64+0x1eb/0x630 [ 504.989817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.995108] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.000577] RIP: 0033:0x458047 [ 505.004029] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 505.011911] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 505.019185] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 505.027667] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 505.034930] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 505.042279] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 505.049592] CPU: 1 PID: 23290 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 505.056697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.056702] Call Trace: [ 505.056718] dump_stack+0x138/0x19c [ 505.056734] should_fail.cold+0x10f/0x159 [ 505.086604] should_failslab+0xdb/0x130 [ 505.086617] kmem_cache_alloc+0x2d9/0x780 [ 505.086628] ? wait_for_completion+0x420/0x420 [ 505.086644] __kernfs_new_node+0x70/0x420 [ 505.086655] kernfs_new_node+0x80/0xf0 [ 505.086666] __kernfs_create_file+0x46/0x323 [ 505.086678] sysfs_add_file_mode_ns+0x1e4/0x450 [ 505.120880] internal_create_group+0x235/0x7b0 [ 505.125621] sysfs_create_group+0x20/0x30 [ 505.129758] lo_ioctl+0x1163/0x1c70 [ 505.133374] ? loop_probe+0x160/0x160 [ 505.137161] blkdev_ioctl+0x983/0x1880 [ 505.141030] ? blkpg_ioctl+0x980/0x980 [ 505.144906] ? __might_sleep+0x93/0xb0 [ 505.148771] ? __fget+0x210/0x370 [ 505.152410] block_ioctl+0xde/0x120 [ 505.156037] ? blkdev_fallocate+0x3b0/0x3b0 [ 505.160348] do_vfs_ioctl+0x7b9/0x1070 [ 505.164223] ? selinux_file_mprotect+0x5d0/0x5d0 [ 505.169058] ? lock_downgrade+0x6e0/0x6e0 [ 505.173197] ? ioctl_preallocate+0x1c0/0x1c0 [ 505.177592] ? __fget+0x237/0x370 [ 505.181033] ? security_file_ioctl+0x8f/0xc0 [ 505.185429] SyS_ioctl+0x8f/0xc0 [ 505.188803] ? do_vfs_ioctl+0x1070/0x1070 [ 505.193024] do_syscall_64+0x1eb/0x630 [ 505.196904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.201764] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.206945] RIP: 0033:0x458a97 [ 505.210118] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 505.217814] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 505.225246] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 505.232589] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 505.239856] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 505.247131] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:36 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)='o', 0x1}], 0x1}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0xff36, &(0x7f0000001180)=[{&(0x7f0000000200)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0xdc2b8f0bd4226815}, 0x5}], 0x40002ab, 0x0, &(0x7f0000001380)={r3, r4+30000000}) 13:17:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x61fe, 0x7ff) 13:17:36 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000000)=""/253) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000100)={'bridge0\x00', {0x2, 0x4, @dev={0xac, 0x14, 0x14, 0x24}}}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000300)={0xa0, 0x0, 0x6, {{0x4, 0x2, 0x5, 0x7f, 0x2, 0x80, {0x5, 0xfffffffffffffff7, 0x8000, 0x3, 0x8, 0x1, 0x10000, 0x1, 0x1, 0x6, 0xdea5f660000000, r1, r3, 0x500000, 0x8}}, {0x0, 0x7}}}, 0xa0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000400)={0x0, 0x7}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000480)={r4, 0x6}, &(0x7f00000004c0)=0x8) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x2010, r0, 0x3) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)=0x0) r7 = perf_event_open(&(0x7f0000000500)={0xa2c2e16eb64861c1, 0x70, 0x1, 0x1, 0x3, 0x56b, 0x0, 0x7, 0x2, 0xa, 0xc60, 0x3, 0x80000001, 0x7, 0x255, 0x3, 0x5, 0x7, 0xc1, 0x0, 0x200, 0x200, 0x6, 0x6, 0x8000, 0x8, 0x7fffffff, 0x5, 0x4, 0x7, 0x7, 0x7, 0x1f, 0x1ff, 0x24e6, 0x4, 0x2a, 0x3, 0x0, 0xfffffffffffffffd, 0x4, @perf_config_ext={0x7, 0x20}, 0x40, 0x200, 0x36b, 0x0, 0xe3, 0x200, 0x81}, r6, 0xe, r0, 0x1) setreuid(r2, r2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000005c0)=""/191, &(0x7f0000000680)=0xbf) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000006c0)={r4, 0x80000000}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r7, 0x84, 0x6c, &(0x7f0000000740)={r8, 0x62, "987bc598e74761c17deb6b4e8a586602638956bfa5d2148f485171357e936c4e87cdba88044b940b1bfab7b71adc3b74d5adb26676f3b843b56a85bc7d18560ae2daeab8d8a6dd7eca06ba09e070e1e6ae7464c674d6e2d68ba2e36e113435249a5f"}, &(0x7f00000007c0)=0x6a) sendfile(r7, r0, &(0x7f0000000800), 0x7) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000840)=0x1f, 0x4) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000880)={0x3f, "40e93fb02ce11f4e30c928387f2cbfd1029b439549a7d9bff0ae87c189bc2a68", 0x2, 0x1}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000008c0)={r5, 0x2}, &(0x7f0000000900)=0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000940)={{0xffff, 0x3}, 'port1\x00', 0x48, 0x50, 0x2, 0x0, 0x1, 0x8, 0x1, 0x0, 0x4, 0x873}) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000c80)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000c40)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000cc0)={0x13, 0x10, 0xfa00, {&(0x7f0000000a40), r10, 0x1}}, 0x18) setsockopt$kcm_KCM_RECV_DISABLE(r9, 0x119, 0x1, &(0x7f0000000d00)=0xffffffff, 0x4) r11 = syz_open_procfs(r6, &(0x7f0000000d40)='net/udplite6\x00') bind$rxrpc(r11, &(0x7f0000000d80)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e21, @empty}}, 0x24) accept4$ax25(r11, 0x0, &(0x7f0000000dc0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000e40)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000e00), 0x117, 0x6}}, 0x20) perf_event_open(&(0x7f0000000ec0)={0x3, 0x70, 0x3, 0x200, 0x3, 0x2, 0x0, 0xb9, 0x82b01, 0x4, 0x7, 0x6, 0x100, 0xffffffff, 0x9, 0x4, 0xea9, 0xace5, 0xfffffffffffffff8, 0x0, 0x100000001, 0x8001, 0xbf1, 0x3, 0x8, 0x800, 0x5, 0x81, 0x4, 0x1f, 0x3, 0x7907, 0x0, 0x6, 0x6f5, 0x3, 0x20, 0x8, 0x0, 0x2, 0x6, @perf_bp={&(0x7f0000000e80), 0x5}, 0x0, 0x1ff, 0x61f, 0x8, 0xd192, 0x5, 0x5e8}, r6, 0x1, r9, 0x8) 13:17:36 executing program 1 (fault-call:2 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:36 executing program 5 (fault-call:2 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:36 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80002, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1, 0x0, 0x8, 0x5, 0x74}) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'ip6tnl0\x00', 0x80}) 13:17:36 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\f\x00\x00\x00'], 0x14}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x7fffff, 0x2000000000000) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c83115ab7, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x40000) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0x4, 0x5, 0x0, 0x1, 0x1, 0x8, 0x5, 0x7, 0x7, 0x180, 0x401, 0x7, 0x6, 0x8, 0x2, 0x4}}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000001c0)={0x1, 0x0, 0x103, 0x6, {0x2c43, 0x0, 0x0, 0x8b8}}) 13:17:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000000)={'gre0\x00', &(0x7f00000000c0)=ANY=[]}) [ 505.350091] FAULT_INJECTION: forcing a failure. [ 505.350091] name failslab, interval 1, probability 0, space 0, times 0 [ 505.373265] CPU: 0 PID: 23310 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 505.380328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.389685] Call Trace: [ 505.392289] dump_stack+0x138/0x19c [ 505.395926] should_fail.cold+0x10f/0x159 [ 505.400315] should_failslab+0xdb/0x130 [ 505.404325] __kmalloc+0x2f3/0x7a0 [ 505.408012] ? ext4_find_extent+0x709/0x960 [ 505.412374] ext4_find_extent+0x709/0x960 [ 505.416661] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 505.422104] ext4_ext_map_blocks+0x1a3/0x4fb0 [ 505.426698] ? save_trace+0x290/0x290 [ 505.430488] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 505.435493] ? __lock_is_held+0xb6/0x140 [ 505.439548] ? lock_acquire+0x16f/0x430 [ 505.443517] ? ext4_map_blocks+0x354/0x16e0 [ 505.447942] ext4_map_blocks+0xc8a/0x16e0 [ 505.452084] ? __lock_is_held+0xb6/0x140 [ 505.456134] ? check_preemption_disabled+0x3c/0x250 [ 505.461144] ? ext4_issue_zeroout+0x160/0x160 [ 505.465737] ? __brelse+0x50/0x60 [ 505.469176] ext4_getblk+0xac/0x450 [ 505.472793] ? ext4_iomap_begin+0x8a0/0x8a0 [ 505.477104] ? ext4_free_inode+0x1210/0x1210 [ 505.481509] ext4_bread+0x6e/0x1a0 [ 505.485040] ? ext4_getblk+0x450/0x450 [ 505.488921] ext4_append+0x14b/0x360 [ 505.492768] ext4_mkdir+0x531/0xc20 [ 505.496391] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 505.501055] ? security_inode_mkdir+0xd6/0x110 [ 505.505646] vfs_mkdir+0x3cf/0x610 [ 505.509187] SyS_mkdir+0x1b7/0x200 [ 505.512718] ? SyS_mkdirat+0x210/0x210 [ 505.516606] ? do_syscall_64+0x53/0x630 [ 505.520665] ? SyS_mkdirat+0x210/0x210 [ 505.524546] do_syscall_64+0x1eb/0x630 [ 505.528439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.533280] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.538456] RIP: 0033:0x458047 [ 505.541638] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 505.549356] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 505.556619] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 505.563980] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 505.571270] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 505.578537] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 505.619060] FAULT_INJECTION: forcing a failure. [ 505.619060] name failslab, interval 1, probability 0, space 0, times 0 [ 505.657226] CPU: 1 PID: 23315 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 505.664496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.673865] Call Trace: [ 505.676473] dump_stack+0x138/0x19c [ 505.680114] should_fail.cold+0x10f/0x159 [ 505.684272] should_failslab+0xdb/0x130 [ 505.688252] kmem_cache_alloc_trace+0x2ec/0x790 [ 505.693086] ? kernfs_put+0x35e/0x490 [ 505.697028] ? sysfs_add_file_mode_ns+0x1e4/0x450 [ 505.702162] ? devm_device_remove_groups+0x50/0x50 [ 505.707220] kobject_uevent_env+0x2fa/0xc41 [ 505.711666] ? internal_create_group+0x4a0/0x7b0 [ 505.716464] kobject_uevent+0x20/0x26 [ 505.720255] lo_ioctl+0x11d3/0x1c70 [ 505.724017] ? loop_probe+0x160/0x160 [ 505.727820] blkdev_ioctl+0x983/0x1880 [ 505.731730] ? blkpg_ioctl+0x980/0x980 [ 505.735629] ? __might_sleep+0x93/0xb0 [ 505.739531] ? __fget+0x210/0x370 [ 505.742983] block_ioctl+0xde/0x120 [ 505.746621] ? blkdev_fallocate+0x3b0/0x3b0 [ 505.750996] do_vfs_ioctl+0x7b9/0x1070 [ 505.754873] ? selinux_file_mprotect+0x5d0/0x5d0 [ 505.759615] ? lock_downgrade+0x6e0/0x6e0 [ 505.763750] ? ioctl_preallocate+0x1c0/0x1c0 [ 505.768244] ? __fget+0x237/0x370 [ 505.771697] ? security_file_ioctl+0x8f/0xc0 [ 505.776214] SyS_ioctl+0x8f/0xc0 [ 505.779567] ? do_vfs_ioctl+0x1070/0x1070 [ 505.783698] do_syscall_64+0x1eb/0x630 [ 505.787577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.792430] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.797618] RIP: 0033:0x458a97 [ 505.800806] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 505.808504] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 13:17:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'wp256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') getsockopt$netlink(r1, 0x10e, 0xf, &(0x7f0000000140)=""/174, &(0x7f0000000040)=0xae) sendfile(r1, r2, 0x0, 0x1000007ffff000) 13:17:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) pread64(r0, &(0x7f00000002c0)=""/4096, 0x1000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)={0x0, 0x0, @ioapic}) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x1) getsockname$netrom(r2, &(0x7f0000000200)={{0x3, @rose}, [@remote, @bcast, @null, @netrom, @remote, @netrom, @null, @bcast]}, &(0x7f0000000280)=0x48) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200880, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000080)={0x0, 0x0, {0x1e, 0x28, 0x10, 0x6, 0x8, 0xa70, 0x0, 0x8, 0x1}}) 13:17:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r0, r1, 0x0, 0x50000000000443) write$binfmt_misc(r0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) [ 505.815783] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 505.823050] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 505.830406] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 505.837813] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:39 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:39 executing program 1 (fault-call:2 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000140)=0x1, 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000180)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0063690100"], 0xfdef) 13:17:39 executing program 0: r0 = socket(0xa, 0x2400000001, 0x0) socket$rxrpc(0x21, 0x2, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0xfffffffffffffffd, @mcast2}}}, 0x88) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 13:17:39 executing program 5 (fault-call:2 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:39 executing program 2: clone(0x100080000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7fffffff, 0x80) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x0, 0x4}, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x4a}}], 0x400000000000083, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r1, &(0x7f00000017c0), 0x3cc, 0x1f000000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002e40)={'bond_slave_1\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000002f40)={&(0x7f0000002e80)={0x1d, r2}, 0x10, &(0x7f0000002f00)={&(0x7f0000002ec0)=@can={{0x4, 0x8, 0x0, 0xb605}, 0x1, 0x3, 0x0, 0x0, "89e8a0635d22ebbe"}, 0x10}, 0x1, 0x0, 0x0, 0x40001}, 0xc001) preadv(r1, &(0x7f0000000200), 0x0, 0x0) [ 508.377194] device nr0 entered promiscuous mode [ 508.390307] FAULT_INJECTION: forcing a failure. [ 508.390307] name failslab, interval 1, probability 0, space 0, times 0 [ 508.412658] FAULT_INJECTION: forcing a failure. [ 508.412658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 508.424535] CPU: 0 PID: 23358 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 508.431563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.441015] Call Trace: [ 508.443623] dump_stack+0x138/0x19c [ 508.447447] should_fail.cold+0x10f/0x159 [ 508.451792] __alloc_pages_nodemask+0x1d6/0x7a0 [ 508.456492] ? __alloc_pages_slowpath+0x2930/0x2930 [ 508.461552] cache_grow_begin+0x80/0x410 [ 508.465644] kmem_cache_alloc_trace+0x6b5/0x790 [ 508.470377] ? kernfs_put+0x35e/0x490 [ 508.474274] ? devm_device_remove_groups+0x50/0x50 [ 508.479325] kobject_uevent_env+0x2fa/0xc41 [ 508.483836] ? internal_create_group+0x4a0/0x7b0 [ 508.488701] kobject_uevent+0x20/0x26 [ 508.492515] lo_ioctl+0x11d3/0x1c70 [ 508.496164] ? loop_probe+0x160/0x160 [ 508.500418] blkdev_ioctl+0x983/0x1880 [ 508.504402] ? blkpg_ioctl+0x980/0x980 [ 508.508303] ? __might_sleep+0x93/0xb0 [ 508.512292] ? __fget+0x210/0x370 [ 508.515759] block_ioctl+0xde/0x120 [ 508.519476] ? blkdev_fallocate+0x3b0/0x3b0 [ 508.523829] do_vfs_ioctl+0x7b9/0x1070 [ 508.527858] ? selinux_file_mprotect+0x5d0/0x5d0 [ 508.532628] ? lock_downgrade+0x6e0/0x6e0 [ 508.536787] ? ioctl_preallocate+0x1c0/0x1c0 [ 508.541203] ? __fget+0x237/0x370 [ 508.544666] ? security_file_ioctl+0x8f/0xc0 [ 508.549083] SyS_ioctl+0x8f/0xc0 [ 508.552457] ? do_vfs_ioctl+0x1070/0x1070 [ 508.556798] do_syscall_64+0x1eb/0x630 [ 508.560690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 508.565554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 508.570746] RIP: 0033:0x458a97 [ 508.573932] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 508.581734] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 508.589007] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 508.596467] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 508.603750] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 508.611371] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 508.618777] CPU: 1 PID: 23359 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 508.626772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.636223] Call Trace: [ 508.638855] dump_stack+0x138/0x19c [ 508.642501] should_fail.cold+0x10f/0x159 [ 508.646659] should_failslab+0xdb/0x130 [ 508.650635] __kmalloc+0x2f3/0x7a0 [ 508.654177] ? check_preemption_disabled+0x3c/0x250 [ 508.659378] ? ext4_find_extent+0x709/0x960 [ 508.663690] ext4_find_extent+0x709/0x960 [ 508.667879] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 508.673403] ext4_ext_map_blocks+0x1a3/0x4fb0 [ 508.677897] ? save_trace+0x290/0x290 [ 508.681792] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 508.686791] ? __lock_is_held+0xb6/0x140 [ 508.690935] ? lock_acquire+0x16f/0x430 [ 508.694894] ? ext4_map_blocks+0x77b/0x16e0 [ 508.699204] ext4_map_blocks+0x7d3/0x16e0 [ 508.703341] ? ext4_issue_zeroout+0x160/0x160 [ 508.707821] ? __brelse+0x50/0x60 [ 508.711315] ext4_getblk+0xac/0x450 [ 508.714945] ? ext4_iomap_begin+0x8a0/0x8a0 [ 508.719259] ? ext4_free_inode+0x1210/0x1210 [ 508.723654] ext4_bread+0x6e/0x1a0 [ 508.727263] ? ext4_getblk+0x450/0x450 [ 508.731154] ext4_append+0x14b/0x360 [ 508.734853] ext4_mkdir+0x531/0xc20 [ 508.738468] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 508.743210] ? security_inode_mkdir+0xd6/0x110 [ 508.747780] vfs_mkdir+0x3cf/0x610 [ 508.751307] SyS_mkdir+0x1b7/0x200 [ 508.754830] ? SyS_mkdirat+0x210/0x210 [ 508.758700] ? do_syscall_64+0x53/0x630 [ 508.762658] ? SyS_mkdirat+0x210/0x210 [ 508.766528] do_syscall_64+0x1eb/0x630 [ 508.770410] ? trace_hardirqs_off_thunk+0x1a/0x1c 13:17:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x103000, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000100)=0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = creat(&(0x7f0000000680)='./bus\x00', 0x20) fcntl$setstatus(r2, 0x4, 0x6100) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x8200) r4 = open(&(0x7f0000000040)='./bus\x00', 0x410141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) sendfile(r2, r5, 0x0, 0x8000fffffffe) [ 508.775242] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 508.780415] RIP: 0033:0x458047 [ 508.783645] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 508.791434] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 508.798690] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 508.805945] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 508.813251] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 508.820591] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 508.855463] audit: type=1400 audit(1555420659.537:141): avc: denied { map } for pid=23369 comm="syz-executor.0" path="/root/syzkaller-testdir042744487/syzkaller.EC7J2X/620/bus" dev="sda1" ino=17009 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 13:17:39 executing program 1 (fault-call:2 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:39 executing program 5 (fault-call:2 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/nfsfs\x00') getdents(r1, &(0x7f0000000040)=""/47, 0x2f) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2000002000, 0x0) msgget(0x1, 0x214) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1d3, 0x0, 0x7}) [ 508.908990] device nr0 entered promiscuous mode [ 508.928343] audit: type=1804 audit(1555420659.537:142): pid=23371 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir042744487/syzkaller.EC7J2X/620/bus" dev="sda1" ino=17009 res=1 [ 509.013869] FAULT_INJECTION: forcing a failure. [ 509.013869] name failslab, interval 1, probability 0, space 0, times 0 [ 509.043843] FAULT_INJECTION: forcing a failure. [ 509.043843] name failslab, interval 1, probability 0, space 0, times 0 13:17:39 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141046, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000180)={0x0, 0x4}, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x20000004, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f00000002c0)={0x3f, 0x10, [0xb2b4, 0x0, 0x1, 0x2]}) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x110, r1, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x514a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x69}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x400000000000000}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x65973650}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x800}, 0x8040) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4094) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) [ 509.062038] CPU: 0 PID: 23387 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 509.069422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.079051] Call Trace: [ 509.081665] dump_stack+0x138/0x19c [ 509.085320] should_fail.cold+0x10f/0x159 [ 509.089492] should_failslab+0xdb/0x130 [ 509.093489] kmem_cache_alloc_node_trace+0x283/0x770 [ 509.098699] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 509.104213] __kmalloc_node_track_caller+0x3d/0x80 [ 509.109189] __kmalloc_reserve.isra.0+0x40/0xe0 [ 509.114149] __alloc_skb+0xcf/0x500 [ 509.117794] ? skb_scrub_packet+0x4b0/0x4b0 [ 509.122209] ? netlink_has_listeners+0x20a/0x330 [ 509.127064] kobject_uevent_env+0x74c/0xc41 [ 509.131579] ? internal_create_group+0x4a0/0x7b0 [ 509.136350] kobject_uevent+0x20/0x26 [ 509.140176] lo_ioctl+0x11d3/0x1c70 [ 509.143836] ? loop_probe+0x160/0x160 [ 509.147646] blkdev_ioctl+0x983/0x1880 [ 509.151534] ? blkpg_ioctl+0x980/0x980 [ 509.155435] ? __might_sleep+0x93/0xb0 [ 509.159866] ? __fget+0x210/0x370 [ 509.163342] block_ioctl+0xde/0x120 [ 509.166974] ? blkdev_fallocate+0x3b0/0x3b0 [ 509.171302] do_vfs_ioctl+0x7b9/0x1070 [ 509.175248] ? selinux_file_mprotect+0x5d0/0x5d0 [ 509.180011] ? lock_downgrade+0x6e0/0x6e0 [ 509.184170] ? ioctl_preallocate+0x1c0/0x1c0 [ 509.188587] ? __fget+0x237/0x370 [ 509.192053] ? security_file_ioctl+0x8f/0xc0 [ 509.196483] SyS_ioctl+0x8f/0xc0 [ 509.199943] ? do_vfs_ioctl+0x1070/0x1070 [ 509.204109] do_syscall_64+0x1eb/0x630 [ 509.208108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 509.213056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 509.221070] RIP: 0033:0x458a97 [ 509.224262] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 509.232072] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 509.239350] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 509.246622] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 509.253898] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:17:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0xc) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010407051dfffd946fa283000a200a0009000600041d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000100)) [ 509.261173] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 509.270592] CPU: 1 PID: 23381 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 509.277647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.287020] Call Trace: [ 509.289693] dump_stack+0x138/0x19c [ 509.293321] should_fail.cold+0x10f/0x159 [ 509.297468] should_failslab+0xdb/0x130 [ 509.301430] __kmalloc+0x2f3/0x7a0 [ 509.305044] ? ext4_find_extent+0x709/0x960 [ 509.309366] ext4_find_extent+0x709/0x960 [ 509.313498] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 509.319109] ext4_ext_map_blocks+0x1a3/0x4fb0 [ 509.323587] ? save_trace+0x290/0x290 [ 509.327551] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 509.332559] ? __lock_is_held+0xb6/0x140 [ 509.336704] ? lock_acquire+0x16f/0x430 [ 509.340771] ? ext4_map_blocks+0x77b/0x16e0 [ 509.345090] ext4_map_blocks+0x7d3/0x16e0 [ 509.349246] ? ext4_issue_zeroout+0x160/0x160 [ 509.353728] ? __brelse+0x50/0x60 [ 509.357181] ext4_getblk+0xac/0x450 [ 509.360987] ? ext4_iomap_begin+0x8a0/0x8a0 [ 509.365304] ? ext4_free_inode+0x1210/0x1210 [ 509.369711] ext4_bread+0x6e/0x1a0 [ 509.373253] ? ext4_getblk+0x450/0x450 [ 509.377211] ext4_append+0x14b/0x360 [ 509.380911] ext4_mkdir+0x531/0xc20 [ 509.384529] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 509.389229] ? security_inode_mkdir+0xd6/0x110 [ 509.393796] vfs_mkdir+0x3cf/0x610 [ 509.397323] SyS_mkdir+0x1b7/0x200 [ 509.400846] ? SyS_mkdirat+0x210/0x210 [ 509.404803] ? do_syscall_64+0x53/0x630 [ 509.408761] ? SyS_mkdirat+0x210/0x210 [ 509.412652] do_syscall_64+0x1eb/0x630 [ 509.416542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 509.421374] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 509.426557] RIP: 0033:0x458047 [ 509.429729] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 509.437425] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 509.444681] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 509.451933] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 509.459192] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 509.466458] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 509.535105] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 13:17:42 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x40801) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000804) r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000100)=@llc={0x1a, 0xffffa888, 0x3, 0x0, 0x0, 0x0, @random="16b29a32c339"}, 0x80, 0x0}, 0x0) 13:17:42 executing program 5 (fault-call:2 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:42 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='lp\x00', 0x3) bind$isdn(r0, &(0x7f0000000240)={0x22, 0x0, 0x5, 0x29b9, 0x4}, 0x6) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="a61506233c123f319bc070") sendfile(r2, r0, &(0x7f0000000280), 0x10001) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000007345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d245858000000000000000000005bfc9ae2cc0ac7f99d"], 0x51) 13:17:42 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0xa000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000440), &(0x7f0000000480)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x80044d76, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = mmap$binder(&(0x7f0000c8f000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000100)={r3}) r5 = mmap$binder(&(0x7f0000755000/0x2000)=nil, 0x2000, 0x0, 0x50, r2, 0x0) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f00000004c0)={0x0, "1fbfdea9dbd85e72f7151295c0419158581cfbbd0a91f650d2264d7480e48828", 0x7, 0x0, 0x80000000, 0x6, 0x4, 0x6, 0x1, 0x2}) fsetxattr$security_capability(r0, &(0x7f0000000540)='security.capability\x00', &(0x7f0000000580)=@v1={0x1000000, [{0x9, 0x80}]}, 0xc, 0x1) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f00000005c0)={@remote, @local}, 0xfffffffffffffe6d) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000380)={0x1, @local}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000340)={0x98, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="06630440030000000b6300000e630c4003000000030000000000000008631040", @ANYRES64=r4, @ANYBLOB="01000000000000000b6300000c63000012634840040000000000000000000000000000000000000010000000000000000000000018000000000000001800000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r2, @ANYBLOB="000000000200000000000000"], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="300000000000000078210000020058001000000060b80000a38886018715cc130a4df3531184f5f2e7c2843adffb1b41904417c80a5f4a2208807ab0f1e28974263587fad55baa64776ba126d618ae2d2b91724c21130b89731a351d31f72d73961d5ce1264b9b1cc8d6195f23862de8131401000000000000002d8f0000"], @ANYBLOB="018000000000000003630840", @ANYRES64=r5, @ANYBLOB="0763044004000000"], 0x49, 0x0, &(0x7f00000002c0)="86ee4edc7ac774f94cf3bc3bf3b4a8912f3a5e583cb89fc54ff5f62b607ce246b970991293a048a5282485ef6d7548131bb1f3ff1dba20e2b8d972df87f72b8ccd7e8e3dce9d07f12d"}) 13:17:42 executing program 1 (fault-call:2 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 511.406926] FAULT_INJECTION: forcing a failure. [ 511.406926] name failslab, interval 1, probability 0, space 0, times 0 [ 511.421422] CPU: 1 PID: 23417 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 511.428664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.435872] SELinux: policydb string sE Linux does not match my string SE Linux [ 511.438119] Call Trace: [ 511.438141] dump_stack+0x138/0x19c [ 511.438160] should_fail.cold+0x10f/0x159 13:17:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x17}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r0, 0x0, 0x0, 0x315, 0x0, 0x0}, 0x28) [ 511.438176] should_failslab+0xdb/0x130 [ 511.438191] kmem_cache_alloc_node+0x28a/0x780 [ 511.446165] SELinux: failed to load policy [ 511.448343] __alloc_skb+0x9c/0x500 [ 511.448355] ? skb_scrub_packet+0x4b0/0x4b0 [ 511.448369] ? netlink_has_listeners+0x20a/0x330 [ 511.448382] kobject_uevent_env+0x74c/0xc41 [ 511.448396] ? internal_create_group+0x4a0/0x7b0 [ 511.492283] kobject_uevent+0x20/0x26 [ 511.496255] lo_ioctl+0x11d3/0x1c70 [ 511.499891] ? loop_probe+0x160/0x160 [ 511.503834] blkdev_ioctl+0x983/0x1880 [ 511.507720] ? blkpg_ioctl+0x980/0x980 [ 511.511611] ? __might_sleep+0x93/0xb0 [ 511.515658] ? __fget+0x210/0x370 [ 511.519098] block_ioctl+0xde/0x120 [ 511.522711] ? blkdev_fallocate+0x3b0/0x3b0 [ 511.527105] do_vfs_ioctl+0x7b9/0x1070 [ 511.531007] ? selinux_file_mprotect+0x5d0/0x5d0 [ 511.535806] ? lock_downgrade+0x6e0/0x6e0 [ 511.539953] ? ioctl_preallocate+0x1c0/0x1c0 [ 511.544354] ? __fget+0x237/0x370 [ 511.547814] ? security_file_ioctl+0x8f/0xc0 [ 511.552228] SyS_ioctl+0x8f/0xc0 [ 511.555599] ? do_vfs_ioctl+0x1070/0x1070 [ 511.559747] do_syscall_64+0x1eb/0x630 [ 511.563628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 511.568487] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 511.573661] RIP: 0033:0x458a97 [ 511.576833] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 511.584539] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 511.591813] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 511.599080] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:17:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000200)=@req={0x0, 0x7, 0x7, 0x8001}, 0x10) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000000c0)=0x8) syz_emit_ethernet(0xfc5d, &(0x7f00000002c0)=ANY=[@ANYBLOB="aa65eaba5dab66aaaaaaaaaaaaaaaaaaaa000800490000300000000000009078ac141400ac1423bb070b047f00e60001000e00907800"/69], &(0x7f0000000100)) [ 511.606443] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 511.614179] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 511.626806] FAULT_INJECTION: forcing a failure. [ 511.626806] name failslab, interval 1, probability 0, space 0, times 0 [ 511.638899] CPU: 1 PID: 23421 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 511.645947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.655318] Call Trace: [ 511.658003] dump_stack+0x138/0x19c [ 511.661638] should_fail.cold+0x10f/0x159 [ 511.661651] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 511.661666] should_failslab+0xdb/0x130 [ 511.661678] kmem_cache_alloc+0x47/0x780 [ 511.661691] ? ext4_es_can_be_merged+0x16e/0x230 [ 511.661702] __es_insert_extent+0x26c/0xe60 [ 511.661716] ext4_es_insert_extent+0x1f0/0x590 [ 511.674946] ? ext4_es_find_delayed_extent_range+0x970/0x970 [ 511.674968] ext4_map_blocks+0xa03/0x16e0 [ 511.674985] ? ext4_issue_zeroout+0x160/0x160 [ 511.674999] ? __brelse+0x50/0x60 [ 511.675013] ext4_getblk+0xac/0x450 [ 511.683924] ? ext4_iomap_begin+0x8a0/0x8a0 [ 511.683939] ? ext4_free_inode+0x1210/0x1210 [ 511.683953] ext4_bread+0x6e/0x1a0 [ 511.683963] ? ext4_getblk+0x450/0x450 [ 511.683980] ext4_append+0x14b/0x360 [ 511.683991] ext4_mkdir+0x531/0xc20 [ 511.684007] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 511.742761] ? security_inode_mkdir+0xd6/0x110 [ 511.747332] vfs_mkdir+0x3cf/0x610 [ 511.750858] SyS_mkdir+0x1b7/0x200 [ 511.754386] ? SyS_mkdirat+0x210/0x210 [ 511.758260] ? do_syscall_64+0x53/0x630 [ 511.762217] ? SyS_mkdirat+0x210/0x210 [ 511.766088] do_syscall_64+0x1eb/0x630 [ 511.769962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 511.774985] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 511.780156] RIP: 0033:0x458047 [ 511.783351] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 511.791053] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 511.798304] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 13:17:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @local}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x20, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)='veth0\x00', 0x6, 0x14b00000, 0xab0}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x1, 0x1b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000440], 0x2, 0x0, &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0xa8, 0x120}, [@common=@dnat={'dnat\x00', 0x10, {{@random="4d09b20cffe4", 0xfffffffffffffffc}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x228) [ 511.805561] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 511.813096] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 511.820351] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 511.847509] protocol 88fb is buggy, dev hsr_slave_0 [ 511.852741] protocol 88fb is buggy, dev hsr_slave_1 13:17:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xfbca) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x728, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4040) fallocate(r1, 0x3, 0x8001, 0x8001) fallocate(r1, 0x3, 0x5e89, 0xfff9) 13:17:42 executing program 5 (fault-call:2 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7fffffff800, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000080)={0x3f, 0x9}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0xa841, 0x0) sendto$netrom(r2, &(0x7f0000000180), 0x0, 0x8801, &(0x7f00000001c0)={{0x3, @null, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x354daf895057b821) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0xb7}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={r4, @in={{0x2, 0x0, @empty}}, 0x0, 0x53, 0x0, 0x0, 0x1000000000053}, 0x98) [ 511.994784] FAULT_INJECTION: forcing a failure. [ 511.994784] name failslab, interval 1, probability 0, space 0, times 0 [ 512.007233] CPU: 0 PID: 23449 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 512.014332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.023912] Call Trace: [ 512.026617] dump_stack+0x138/0x19c [ 512.030439] should_fail.cold+0x10f/0x159 [ 512.034606] should_failslab+0xdb/0x130 [ 512.038616] kmem_cache_alloc_node_trace+0x283/0x770 [ 512.043725] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 512.049197] __kmalloc_node_track_caller+0x3d/0x80 [ 512.054148] __kmalloc_reserve.isra.0+0x40/0xe0 [ 512.059092] __alloc_skb+0xcf/0x500 [ 512.062761] ? skb_scrub_packet+0x4b0/0x4b0 [ 512.067096] ? netlink_has_listeners+0x20a/0x330 [ 512.071881] kobject_uevent_env+0x74c/0xc41 [ 512.076211] ? internal_create_group+0x4a0/0x7b0 [ 512.081112] kobject_uevent+0x20/0x26 [ 512.084919] lo_ioctl+0x11d3/0x1c70 [ 512.088556] ? loop_probe+0x160/0x160 [ 512.092452] blkdev_ioctl+0x983/0x1880 [ 512.096349] ? blkpg_ioctl+0x980/0x980 [ 512.100248] ? __might_sleep+0x93/0xb0 [ 512.104131] ? __fget+0x210/0x370 [ 512.107579] block_ioctl+0xde/0x120 [ 512.111217] ? blkdev_fallocate+0x3b0/0x3b0 [ 512.115545] do_vfs_ioctl+0x7b9/0x1070 [ 512.119485] ? selinux_file_mprotect+0x5d0/0x5d0 [ 512.124431] ? lock_downgrade+0x6e0/0x6e0 [ 512.128590] ? ioctl_preallocate+0x1c0/0x1c0 [ 512.133007] ? __fget+0x237/0x370 [ 512.136459] ? security_file_ioctl+0x8f/0xc0 [ 512.140988] SyS_ioctl+0x8f/0xc0 [ 512.144465] ? do_vfs_ioctl+0x1070/0x1070 [ 512.148610] do_syscall_64+0x1eb/0x630 [ 512.152490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 512.157342] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 512.162513] RIP: 0033:0x458a97 [ 512.165970] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 512.173694] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 512.180962] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 512.188402] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 512.195672] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 512.202937] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:45 executing program 1 (fault-call:2 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:45 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget(0x0, 0x4, 0x2) semctl$SETVAL(r1, 0x0, 0x10, 0x0) 13:17:45 executing program 5 (fault-call:2 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@newlink={0x34, 0x12, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={r2, @local, @loopback}, 0xc) 13:17:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x640002, 0x0) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/169, 0xa9) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f0000000000), 0xffd7) 13:17:45 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000040)={0x80000001, 0x8, 0x1, 'queue0\x00', 0x100}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000029c0)={'gre0\x00'}) [ 514.473788] FAULT_INJECTION: forcing a failure. [ 514.473788] name failslab, interval 1, probability 0, space 0, times 0 [ 514.506392] FAULT_INJECTION: forcing a failure. [ 514.506392] name failslab, interval 1, probability 0, space 0, times 0 [ 514.530364] CPU: 1 PID: 23465 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 514.538027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.547706] Call Trace: [ 514.550309] dump_stack+0x138/0x19c [ 514.553945] should_fail.cold+0x10f/0x159 [ 514.558211] should_failslab+0xdb/0x130 [ 514.562373] kmem_cache_alloc+0x2d9/0x780 [ 514.566530] ? rcu_read_lock_sched_held+0x110/0x130 [ 514.571558] ? __mark_inode_dirty+0x2b7/0x1040 [ 514.576172] ext4_mb_new_blocks+0x509/0x39a0 [ 514.580582] ? ext4_find_extent+0x709/0x960 [ 514.584913] ext4_ext_map_blocks+0x26d4/0x4fb0 [ 514.589503] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 514.594533] ? __lock_is_held+0xb6/0x140 [ 514.598705] ? lock_acquire+0x16f/0x430 [ 514.602689] ext4_map_blocks+0x7d3/0x16e0 [ 514.606851] ? ext4_issue_zeroout+0x160/0x160 [ 514.611357] ? __brelse+0x50/0x60 [ 514.614824] ext4_getblk+0xac/0x450 [ 514.618624] ? ext4_iomap_begin+0x8a0/0x8a0 [ 514.622958] ? ext4_free_inode+0x1210/0x1210 [ 514.627376] ext4_bread+0x6e/0x1a0 [ 514.631000] ? ext4_getblk+0x450/0x450 [ 514.634885] ext4_append+0x14b/0x360 [ 514.638690] ext4_mkdir+0x531/0xc20 [ 514.642324] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 514.647031] ? security_inode_mkdir+0xd6/0x110 [ 514.651726] vfs_mkdir+0x3cf/0x610 [ 514.655275] SyS_mkdir+0x1b7/0x200 [ 514.658820] ? SyS_mkdirat+0x210/0x210 [ 514.662708] ? do_syscall_64+0x53/0x630 [ 514.666681] ? SyS_mkdirat+0x210/0x210 [ 514.670573] do_syscall_64+0x1eb/0x630 [ 514.674460] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 514.679394] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 514.684577] RIP: 0033:0x458047 [ 514.687848] RSP: 002b:00007f2d39caba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 514.695649] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 514.702934] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 514.710223] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 514.717579] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:17:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x1, 0x106002, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x9) [ 514.724944] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 514.736041] CPU: 0 PID: 23468 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 514.743339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.752785] Call Trace: [ 514.755383] dump_stack+0x138/0x19c [ 514.759104] should_fail.cold+0x10f/0x159 [ 514.763257] should_failslab+0xdb/0x130 [ 514.767260] kmem_cache_alloc_node_trace+0x283/0x770 [ 514.772494] ? rcu_lockdep_current_cpu_online+0xf2/0x140 13:17:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='pagemap\x00', 0xfffffffffffffffa) keyctl$read(0xb, r3, &(0x7f0000000140)=""/19, 0x13) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') sendfile(r1, r4, 0x0, 0x800000bf) r5 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r5, 0x1000000000013) [ 514.777951] __kmalloc_node_track_caller+0x3d/0x80 [ 514.782888] __kmalloc_reserve.isra.0+0x40/0xe0 [ 514.787663] __alloc_skb+0xcf/0x500 [ 514.791295] ? skb_scrub_packet+0x4b0/0x4b0 [ 514.795638] ? netlink_has_listeners+0x20a/0x330 [ 514.800489] kobject_uevent_env+0x74c/0xc41 [ 514.804851] kobject_uevent+0x20/0x26 [ 514.808641] lo_ioctl+0x11d3/0x1c70 [ 514.812550] ? loop_probe+0x160/0x160 [ 514.816574] blkdev_ioctl+0x983/0x1880 [ 514.820671] ? blkpg_ioctl+0x980/0x980 [ 514.824654] ? __might_sleep+0x93/0xb0 [ 514.828538] ? __fget+0x210/0x370 [ 514.832081] block_ioctl+0xde/0x120 [ 514.835698] ? blkdev_fallocate+0x3b0/0x3b0 [ 514.840036] do_vfs_ioctl+0x7b9/0x1070 [ 514.843917] ? selinux_file_mprotect+0x5d0/0x5d0 [ 514.848690] ? lock_downgrade+0x6e0/0x6e0 [ 514.852840] ? ioctl_preallocate+0x1c0/0x1c0 [ 514.857267] ? __fget+0x237/0x370 [ 514.860742] ? security_file_ioctl+0x8f/0xc0 [ 514.865344] SyS_ioctl+0x8f/0xc0 [ 514.868790] ? do_vfs_ioctl+0x1070/0x1070 [ 514.872928] do_syscall_64+0x1eb/0x630 [ 514.876805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 514.881655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 514.886925] RIP: 0033:0x458a97 [ 514.890104] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 514.897975] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 514.905232] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 514.912574] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 514.919828] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 514.927083] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:45 executing program 0: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000000100000a, 0x32, r0, 0x2) r1 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0x40045402, &(0x7f0000013000)) 13:17:45 executing program 1 (fault-call:2 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 514.997594] Bluetooth: hci0 sending frame failed (-49) [ 515.025938] FAULT_INJECTION: forcing a failure. [ 515.025938] name failslab, interval 1, probability 0, space 0, times 0 13:17:45 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup3(r0, r0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x47, 0x800) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r3, r4}}, 0x18) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') [ 515.046678] CPU: 1 PID: 23491 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 515.053734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.063087] Call Trace: [ 515.065673] dump_stack+0x138/0x19c [ 515.069442] should_fail.cold+0x10f/0x159 [ 515.073625] should_failslab+0xdb/0x130 [ 515.077606] kmem_cache_alloc_trace+0x2ec/0x790 [ 515.082418] ? kasan_check_write+0x14/0x20 [ 515.086639] ? _copy_from_user+0x99/0x110 [ 515.090976] copy_mount_options+0x5c/0x2f0 [ 515.095424] SyS_mount+0x87/0x120 [ 515.098959] ? copy_mnt_ns+0x8c0/0x8c0 [ 515.102829] do_syscall_64+0x1eb/0x630 [ 515.106721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 515.117133] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 515.122413] RIP: 0033:0x45b69a [ 515.125630] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 515.133532] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 515.141265] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 515.149488] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 515.157018] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 515.164291] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:45 executing program 5 (fault-call:2 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:45 executing program 1 (fault-call:2 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 515.284558] FAULT_INJECTION: forcing a failure. [ 515.284558] name failslab, interval 1, probability 0, space 0, times 0 [ 515.284830] FAULT_INJECTION: forcing a failure. [ 515.284830] name failslab, interval 1, probability 0, space 0, times 0 [ 515.304691] CPU: 1 PID: 23506 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 515.314921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.324476] Call Trace: [ 515.327185] dump_stack+0x138/0x19c [ 515.330994] should_fail.cold+0x10f/0x159 [ 515.335148] should_failslab+0xdb/0x130 [ 515.339285] kmem_cache_alloc_node+0x28a/0x780 [ 515.343869] __alloc_skb+0x9c/0x500 [ 515.347746] ? skb_scrub_packet+0x4b0/0x4b0 [ 515.352149] ? netlink_has_listeners+0x20a/0x330 [ 515.357085] kobject_uevent_env+0x74c/0xc41 [ 515.361493] kobject_uevent+0x20/0x26 [ 515.365285] lo_ioctl+0x11d3/0x1c70 [ 515.368998] ? loop_probe+0x160/0x160 [ 515.372796] blkdev_ioctl+0x983/0x1880 [ 515.376711] ? blkpg_ioctl+0x980/0x980 [ 515.380606] ? __might_sleep+0x93/0xb0 [ 515.384488] ? __fget+0x210/0x370 [ 515.388197] block_ioctl+0xde/0x120 [ 515.391818] ? blkdev_fallocate+0x3b0/0x3b0 [ 515.396130] do_vfs_ioctl+0x7b9/0x1070 [ 515.400010] ? selinux_file_mprotect+0x5d0/0x5d0 [ 515.404972] ? lock_downgrade+0x6e0/0x6e0 [ 515.409124] ? ioctl_preallocate+0x1c0/0x1c0 [ 515.415891] ? __fget+0x237/0x370 [ 515.425459] ? security_file_ioctl+0x8f/0xc0 [ 515.432032] SyS_ioctl+0x8f/0xc0 [ 515.435401] ? do_vfs_ioctl+0x1070/0x1070 [ 515.439556] do_syscall_64+0x1eb/0x630 [ 515.443459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 515.448401] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 515.453683] RIP: 0033:0x458a97 [ 515.456862] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 515.464590] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 515.471860] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 515.479213] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 515.486750] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 515.494011] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 515.501289] CPU: 0 PID: 23507 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 515.508399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.518199] Call Trace: [ 515.520941] dump_stack+0x138/0x19c [ 515.524644] should_fail.cold+0x10f/0x159 [ 515.528961] should_failslab+0xdb/0x130 [ 515.532964] __kmalloc_track_caller+0x2ef/0x790 [ 515.537617] ? kasan_check_write+0x14/0x20 [ 515.541836] ? strndup_user+0x62/0xf0 [ 515.545989] memdup_user+0x26/0xa0 [ 515.549512] strndup_user+0x62/0xf0 [ 515.553123] SyS_mount+0x6b/0x120 [ 515.556573] ? copy_mnt_ns+0x8c0/0x8c0 [ 515.560447] do_syscall_64+0x1eb/0x630 [ 515.564498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 515.569334] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 515.574593] RIP: 0033:0x45b69a [ 515.577864] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 515.585859] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 515.593117] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 515.600368] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 515.607710] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 515.615166] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 517.092064] Bluetooth: hci0 command 0xfc11 tx timeout [ 517.095618] Bluetooth: hci0: Entering manufacturer mode failed (-110) 13:17:48 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:48 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) dup2(r0, r1) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, 0x0, 0x0) 13:17:48 executing program 0: getpid() r0 = gettid() r1 = getpgid(r0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ff4000/0xa000)=nil, 0x5c938c7c, 0x3, 0x12, &(0x7f0000ff7000/0x4000)=nil, 0x4}) close(r2) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100)={0x81}, 0x4) 13:17:48 executing program 1 (fault-call:2 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:48 executing program 5 (fault-call:2 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 517.535416] FAULT_INJECTION: forcing a failure. [ 517.535416] name failslab, interval 1, probability 0, space 0, times 0 [ 517.551404] FAULT_INJECTION: forcing a failure. [ 517.551404] name failslab, interval 1, probability 0, space 0, times 0 [ 517.570761] CPU: 0 PID: 23525 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 517.577823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.588263] Call Trace: [ 517.590859] dump_stack+0x138/0x19c [ 517.594493] should_fail.cold+0x10f/0x159 [ 517.598646] should_failslab+0xdb/0x130 [ 517.602619] kmem_cache_alloc_node_trace+0x283/0x770 [ 517.607749] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 517.613284] __kmalloc_node_track_caller+0x3d/0x80 [ 517.618299] __kmalloc_reserve.isra.0+0x40/0xe0 [ 517.622961] __alloc_skb+0xcf/0x500 [ 517.626668] ? skb_scrub_packet+0x4b0/0x4b0 [ 517.631085] ? netlink_has_listeners+0x20a/0x330 [ 517.635837] kobject_uevent_env+0x74c/0xc41 [ 517.640505] kobject_uevent+0x20/0x26 [ 517.644301] lo_ioctl+0x11d3/0x1c70 [ 517.647953] ? loop_probe+0x160/0x160 [ 517.651752] blkdev_ioctl+0x983/0x1880 [ 517.655719] ? blkpg_ioctl+0x980/0x980 [ 517.659712] ? __might_sleep+0x93/0xb0 [ 517.663599] ? __fget+0x210/0x370 [ 517.667049] block_ioctl+0xde/0x120 [ 517.670670] ? blkdev_fallocate+0x3b0/0x3b0 [ 517.674984] do_vfs_ioctl+0x7b9/0x1070 [ 517.678874] ? selinux_file_mprotect+0x5d0/0x5d0 [ 517.683619] ? lock_downgrade+0x6e0/0x6e0 [ 517.687759] ? ioctl_preallocate+0x1c0/0x1c0 [ 517.692161] ? __fget+0x237/0x370 [ 517.695616] ? security_file_ioctl+0x8f/0xc0 [ 517.700625] SyS_ioctl+0x8f/0xc0 [ 517.703983] ? do_vfs_ioctl+0x1070/0x1070 [ 517.708309] do_syscall_64+0x1eb/0x630 [ 517.712397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 517.717414] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 517.722762] RIP: 0033:0x458a97 [ 517.726117] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 517.733907] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 517.741166] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 517.748425] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 517.755686] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 517.763210] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 517.770488] CPU: 1 PID: 23523 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 517.777517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.787106] Call Trace: [ 517.789792] dump_stack+0x138/0x19c [ 517.793423] should_fail.cold+0x10f/0x159 [ 517.797669] should_failslab+0xdb/0x130 [ 517.801635] kmem_cache_alloc_trace+0x2ec/0x790 [ 517.806297] ? kasan_check_write+0x14/0x20 [ 517.810520] ? _copy_from_user+0x99/0x110 [ 517.814661] copy_mount_options+0x5c/0x2f0 [ 517.818878] SyS_mount+0x87/0x120 [ 517.822323] ? copy_mnt_ns+0x8c0/0x8c0 [ 517.826551] do_syscall_64+0x1eb/0x630 [ 517.830429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 517.835257] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 517.840440] RIP: 0033:0x45b69a [ 517.843716] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 517.851418] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 517.858669] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 517.865920] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 517.873206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 517.880549] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:49 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r1, 0x8001}}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f00000002c0)={0x79}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x4a, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) 13:17:49 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:49 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x10000000000004, 0x100) pipe(&(0x7f0000000100)={0xffffffffffffffff}) unshare(0x20600) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f00000001c0)={0x0, 0x9, 0x5, [], &(0x7f0000000180)=0xffff}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:17:49 executing program 1 (fault-call:2 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:49 executing program 5 (fault-call:2 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 519.188425] Bluetooth: hci0 command 0xfc11 tx timeout [ 519.188476] Bluetooth: hci0: Entering manufacturer mode failed (-110) 13:17:49 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0x5}}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 519.237261] FAULT_INJECTION: forcing a failure. [ 519.237261] name failslab, interval 1, probability 0, space 0, times 0 [ 519.253397] CPU: 1 PID: 23546 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 519.260707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.270070] Call Trace: [ 519.272793] dump_stack+0x138/0x19c [ 519.276436] should_fail.cold+0x10f/0x159 [ 519.280596] should_failslab+0xdb/0x130 [ 519.284600] kmem_cache_alloc_node_trace+0x283/0x770 [ 519.289979] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 519.295426] __kmalloc_node_track_caller+0x3d/0x80 [ 519.300578] __kmalloc_reserve.isra.0+0x40/0xe0 [ 519.305251] __alloc_skb+0xcf/0x500 [ 519.308859] ? skb_scrub_packet+0x4b0/0x4b0 [ 519.313166] ? netlink_has_listeners+0x20a/0x330 [ 519.318059] kobject_uevent_env+0x74c/0xc41 [ 519.322478] kobject_uevent+0x20/0x26 [ 519.326520] lo_ioctl+0x11d3/0x1c70 [ 519.330270] ? loop_probe+0x160/0x160 [ 519.334069] blkdev_ioctl+0x983/0x1880 [ 519.338110] ? blkpg_ioctl+0x980/0x980 [ 519.342278] ? __might_sleep+0x93/0xb0 [ 519.346358] ? __fget+0x210/0x370 [ 519.349823] block_ioctl+0xde/0x120 [ 519.353446] ? blkdev_fallocate+0x3b0/0x3b0 [ 519.357750] do_vfs_ioctl+0x7b9/0x1070 [ 519.361636] ? selinux_file_mprotect+0x5d0/0x5d0 [ 519.366389] ? lock_downgrade+0x6e0/0x6e0 [ 519.370532] ? ioctl_preallocate+0x1c0/0x1c0 [ 519.374944] ? __fget+0x237/0x370 [ 519.378396] ? security_file_ioctl+0x8f/0xc0 [ 519.382808] SyS_ioctl+0x8f/0xc0 [ 519.386278] ? do_vfs_ioctl+0x1070/0x1070 [ 519.390427] do_syscall_64+0x1eb/0x630 [ 519.394307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 519.399169] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 519.404375] RIP: 0033:0x458a97 [ 519.407555] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 519.415417] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 519.422778] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 519.430043] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:17:50 executing program 2: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={@ipv4={[], [], @rand_addr=0xf0d}, @loopback, @local, 0x100000000, 0x3, 0x1f, 0x400, 0x866, 0x108, r2}) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', 0xffffffffffffffff}, 0x30) ioprio_get$pid(0x3, r3) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x7, 0x10000) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000240)={0x1, 0xfe, &(0x7f0000000140)="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"}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") ioctl$NBD_CLEAR_SOCK(r1, 0xab08) [ 519.437297] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 519.444571] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 519.456355] FAULT_INJECTION: forcing a failure. [ 519.456355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 519.468263] CPU: 0 PID: 23553 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 519.475464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.484919] Call Trace: [ 519.487511] dump_stack+0x138/0x19c [ 519.491224] should_fail.cold+0x10f/0x159 [ 519.495364] __alloc_pages_nodemask+0x1d6/0x7a0 [ 519.500014] ? fs_reclaim_acquire+0x20/0x20 [ 519.504322] ? __alloc_pages_slowpath+0x2930/0x2930 [ 519.509348] cache_grow_begin+0x80/0x410 [ 519.513392] kmem_cache_alloc+0x6a8/0x780 [ 519.517524] ? fs_reclaim_acquire+0x20/0x20 [ 519.521833] getname_flags+0xcb/0x580 [ 519.525618] user_path_at_empty+0x2f/0x50 [ 519.529838] do_mount+0x12b/0x27d0 [ 519.533633] ? copy_mount_options+0x5c/0x2f0 [ 519.538027] ? rcu_read_lock_sched_held+0x110/0x130 [ 519.543030] ? copy_mount_string+0x40/0x40 [ 519.547264] ? _copy_from_user+0x99/0x110 [ 519.551396] ? copy_mount_options+0x1fe/0x2f0 [ 519.555899] SyS_mount+0xab/0x120 [ 519.559352] ? copy_mnt_ns+0x8c0/0x8c0 [ 519.563232] do_syscall_64+0x1eb/0x630 [ 519.567189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 519.572038] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 519.577232] RIP: 0033:0x45b69a [ 519.580413] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 519.588105] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 519.595443] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 519.602699] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 519.609948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 519.617217] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:51 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:51 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080045005, &(0x7f0000000140)) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x4) 13:17:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000000c0), 0x4) listen(r1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 13:17:51 executing program 5 (fault-call:2 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:51 executing program 1 (fault-call:2 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffb000/0x4000)=nil) shmat(r1, &(0x7f0000001000/0x1000)=nil, 0x6000) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000, 0x4, &(0x7f000000d000/0x2000)=nil) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x7) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x10, &(0x7f0000000000)={&(0x7f0000000200)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r3, 0x4) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000001480)={0x3}) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001240)={0x0, @local, @initdev}, &(0x7f0000001280)=0xc) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@local, 0x4e23, 0x509, 0x4e20, 0x53a, 0x2, 0x20, 0xa0, 0x87, r5, r6}, {0x8, 0x9, 0x5, 0xffffffff, 0x6, 0x8, 0x0, 0x8}, {0x101, 0xd95c, 0x7, 0x7}, 0x81, 0x1000, 0x0, 0x1, 0x1}, {{@in6=@loopback, 0x4d3, 0x33}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1b}, 0x3500, 0x1, 0x0, 0x7, 0x8001, 0x3, 0x9}}, 0xe8) madvise(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x9) [ 520.583632] FAULT_INJECTION: forcing a failure. [ 520.583632] name failslab, interval 1, probability 0, space 0, times 0 [ 520.605421] CPU: 1 PID: 23576 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 520.612599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.622082] Call Trace: [ 520.624693] dump_stack+0x138/0x19c [ 520.628339] should_fail.cold+0x10f/0x159 [ 520.632503] should_failslab+0xdb/0x130 [ 520.636577] kmem_cache_alloc_node_trace+0x283/0x770 [ 520.641694] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 520.647157] __kmalloc_node_track_caller+0x3d/0x80 [ 520.652078] __kmalloc_reserve.isra.0+0x40/0xe0 [ 520.657147] __alloc_skb+0xcf/0x500 [ 520.660774] ? skb_scrub_packet+0x4b0/0x4b0 [ 520.665086] ? netlink_has_listeners+0x20a/0x330 [ 520.669903] kobject_uevent_env+0x74c/0xc41 [ 520.674228] kobject_uevent+0x20/0x26 [ 520.678025] lo_ioctl+0x11d3/0x1c70 [ 520.681644] ? loop_probe+0x160/0x160 [ 520.685460] blkdev_ioctl+0x983/0x1880 [ 520.689347] ? blkpg_ioctl+0x980/0x980 [ 520.693228] ? __might_sleep+0x93/0xb0 [ 520.697099] ? __fget+0x210/0x370 [ 520.700584] block_ioctl+0xde/0x120 [ 520.704310] ? blkdev_fallocate+0x3b0/0x3b0 [ 520.708805] do_vfs_ioctl+0x7b9/0x1070 [ 520.712687] ? selinux_file_mprotect+0x5d0/0x5d0 [ 520.717436] ? lock_downgrade+0x6e0/0x6e0 [ 520.721770] ? ioctl_preallocate+0x1c0/0x1c0 [ 520.726369] ? __fget+0x237/0x370 [ 520.729850] ? security_file_ioctl+0x8f/0xc0 [ 520.734249] SyS_ioctl+0x8f/0xc0 [ 520.737693] ? do_vfs_ioctl+0x1070/0x1070 [ 520.741831] do_syscall_64+0x1eb/0x630 [ 520.745713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 520.750555] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 520.755839] RIP: 0033:0x458a97 [ 520.759011] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 520.766706] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 520.774016] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 520.781276] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 520.788530] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 520.795783] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 520.826969] FAULT_INJECTION: forcing a failure. [ 520.826969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 520.839091] CPU: 0 PID: 23577 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 520.846129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.855491] Call Trace: [ 520.858141] dump_stack+0x138/0x19c [ 520.861787] should_fail.cold+0x10f/0x159 [ 520.866114] __alloc_pages_nodemask+0x1d6/0x7a0 [ 520.871013] ? fs_reclaim_acquire+0x20/0x20 [ 520.875389] ? __alloc_pages_slowpath+0x2930/0x2930 [ 520.880562] cache_grow_begin+0x80/0x410 [ 520.884615] kmem_cache_alloc+0x6a8/0x780 [ 520.888762] ? fs_reclaim_acquire+0x20/0x20 [ 520.893085] getname_flags+0xcb/0x580 [ 520.896971] user_path_at_empty+0x2f/0x50 [ 520.901231] do_mount+0x12b/0x27d0 [ 520.904773] ? copy_mount_options+0x5c/0x2f0 [ 520.909178] ? rcu_read_lock_sched_held+0x110/0x130 [ 520.914883] ? copy_mount_string+0x40/0x40 [ 520.919195] ? _copy_from_user+0x99/0x110 [ 520.923343] ? copy_mount_options+0x1fe/0x2f0 [ 520.927833] SyS_mount+0xab/0x120 [ 520.931289] ? copy_mnt_ns+0x8c0/0x8c0 [ 520.935595] do_syscall_64+0x1eb/0x630 [ 520.939515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 520.944647] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 520.949976] RIP: 0033:0x45b69a [ 520.953151] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 520.960849] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 520.968111] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 520.975382] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 520.982657] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 520.989939] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:52 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x4000, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x8, 0xffffffffffffd468}, {0x6, 0x7}]}, 0x14, 0x2) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000400)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000800)=""/246) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000100)=""/59) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, r4) getsockopt$inet_int(r3, 0x0, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl(r0, 0x8, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$PPPIOCSPASS(r1, 0x4004743c, 0x0) 13:17:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) execve(0x0, &(0x7f0000000200)=[&(0x7f0000000180)='/dev/uinput\x00', 0x0], 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)='hsr0\x00') mkdirat(0xffffffffffffffff, 0x0, 0x8) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff0100000000200000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe437dbe0fbeed61000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100"/644], 0x1) syz_open_dev$vcsa(0x0, 0x3, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x0, 0x1, 0x0, 0xffff}}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') futex(0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1) 13:17:52 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x40, "73e7f9f9cf5dad8e77212ef28e28ed4e45efbafe2e00fb740cafb5c8f8c005837bd06b7980546876abed57e62cd10c452eb0af7a9f3a8e23f8eb3e59b50215f9"}, &(0x7f0000000140)=0x48) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={r3, 0x2}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x51, r0, 0x81000000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 13:17:52 executing program 5 (fault-call:2 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:52 executing program 1 (fault-call:2 fault-nth:53): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:52 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x5, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x80000, 0x0, 0x0, 0x0, 0x0, "75b782e4ad88b89d1fc3191637b20000000000007f660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a"}, 0x60) [ 522.275903] FAULT_INJECTION: forcing a failure. [ 522.275903] name failslab, interval 1, probability 0, space 0, times 0 [ 522.303472] CPU: 1 PID: 23599 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 522.310616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.320158] Call Trace: [ 522.322760] dump_stack+0x138/0x19c [ 522.326490] should_fail.cold+0x10f/0x159 [ 522.330655] should_failslab+0xdb/0x130 [ 522.334734] kmem_cache_alloc_node_trace+0x283/0x770 [ 522.339851] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 522.339869] __kmalloc_node_track_caller+0x3d/0x80 [ 522.339882] __kmalloc_reserve.isra.0+0x40/0xe0 [ 522.339895] __alloc_skb+0xcf/0x500 [ 522.339903] ? skb_scrub_packet+0x4b0/0x4b0 [ 522.339915] ? netlink_has_listeners+0x20a/0x330 [ 522.339928] kobject_uevent_env+0x74c/0xc41 [ 522.339941] kobject_uevent+0x20/0x26 [ 522.339952] lo_ioctl+0x11d3/0x1c70 [ 522.339962] ? loop_probe+0x160/0x160 [ 522.339984] blkdev_ioctl+0x983/0x1880 [ 522.388357] ? blkpg_ioctl+0x980/0x980 [ 522.392337] ? __might_sleep+0x93/0xb0 [ 522.392347] ? __fget+0x210/0x370 [ 522.392361] block_ioctl+0xde/0x120 [ 522.392370] ? blkdev_fallocate+0x3b0/0x3b0 [ 522.392379] do_vfs_ioctl+0x7b9/0x1070 [ 522.392389] ? selinux_file_mprotect+0x5d0/0x5d0 [ 522.392401] ? lock_downgrade+0x6e0/0x6e0 [ 522.399729] ? ioctl_preallocate+0x1c0/0x1c0 [ 522.399743] ? __fget+0x237/0x370 [ 522.399759] ? security_file_ioctl+0x8f/0xc0 [ 522.432889] SyS_ioctl+0x8f/0xc0 [ 522.436265] ? do_vfs_ioctl+0x1070/0x1070 [ 522.440424] do_syscall_64+0x1eb/0x630 [ 522.444319] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 522.449170] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 522.454358] RIP: 0033:0x458a97 [ 522.457693] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 522.465463] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 522.472807] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 522.480156] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 522.487710] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 522.495297] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 522.519771] FAULT_INJECTION: forcing a failure. [ 522.519771] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 522.531697] CPU: 1 PID: 23607 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 522.539560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.548961] Call Trace: [ 522.551565] dump_stack+0x138/0x19c [ 522.555215] should_fail.cold+0x10f/0x159 [ 522.559392] __alloc_pages_nodemask+0x1d6/0x7a0 [ 522.564075] ? fs_reclaim_acquire+0x20/0x20 [ 522.568418] ? __alloc_pages_slowpath+0x2930/0x2930 [ 522.573470] cache_grow_begin+0x80/0x410 [ 522.573485] kmem_cache_alloc_trace+0x6b5/0x790 [ 522.582193] ? kasan_check_write+0x14/0x20 [ 522.582210] copy_mount_options+0x5c/0x2f0 [ 522.582224] SyS_mount+0x87/0x120 [ 522.582231] ? copy_mnt_ns+0x8c0/0x8c0 [ 522.582244] do_syscall_64+0x1eb/0x630 [ 522.602063] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 522.606923] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 522.612118] RIP: 0033:0x45b69a [ 522.615305] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 522.623008] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 522.630272] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 522.637564] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 522.645056] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 522.652316] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:54 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:54 executing program 4: io_setup(0x945d, &(0x7f0000000000)=0x0) r1 = socket$isdn(0x22, 0x3, 0x25) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0xffff, r1, &(0x7f0000000040)="d8ca62a70574e664a2dfe7a7df6ae44dc99b540b3ed29e2a5c07c35540093a3eb368b312b13a337563bc80f0a31ae3cca1c3a936580f5113bbd6ac3eb2c0580dfda809eddbba89a8b27223df272f523f23c30b9d2dc298cdb6cbfef213b38c0c3395c1a8e9f0f6d4a52bb6a08d48644d74fdd85e96ecf8472b6bc127837b01d7681a0019a3cfcf73f5adbba1a8c202639c7e7137c7da040836d3f71f9668efce907dc1eb25f2541e51e44137a6b6b40f2531d18236754334a1d7f34129660ae3f22a608ae068bc35b23275cb723cad0c39f51a88f7bf42fa35c84c5e9c9c730d37d6e73927be0caf3efb0b94bb8069fe8891d25a", 0xf4, 0x6, 0x0, 0x0, r2}]) ioctl$TCSBRKP(r2, 0x5425, 0x5) syz_emit_ethernet(0x50e, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0) 13:17:54 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x8, {0xdd6}}, 0x18) socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x3, 0x84) socket$tipc(0x1e, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 13:17:54 executing program 5 (fault-call:2 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000002, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0xffffffffb17dbc52) setsockopt$inet_dccp_buf(r2, 0x21, 0xf, &(0x7f0000000080)="3361e736783988f68c29d6d89f409eff61b0bdc287a3d2e3a25e0c68ad3f3ad838bd95909c84ff1ea1586488ae2877735f434cf71b544dd63c96849140e10e11966c01c0859ca9b0398920a2072d7e88eae7022ab0de29c0d72a8af3b7ebdb7639c34fe0e4d223824837d22111c03ddec160e0de13084076a119c09470d8a2c85f5e6d1972abf31a7c0e343593dd941236e14a96712b8d328cb616911ddd3564b79a7487e4e5a486dcb7fb5f64524c11cb1818603a6411dbb5eb12a9d36509b1812bf58d322f3b008d4e10de36251f8a5a57db4cc929e0eb4f32aad3d25c7233ada3d9b8c1fd3c116ed9", 0xea) getsockopt$inet6_buf(r1, 0x29, 0x2, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x39e8c2cfef4dc904) 13:17:54 executing program 1 (fault-call:2 fault-nth:54): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:54 executing program 0: eventfd2(0x0, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000d4a000)={0x1000000000}) [ 523.682289] FAULT_INJECTION: forcing a failure. [ 523.682289] name failslab, interval 1, probability 0, space 0, times 0 [ 523.721006] CPU: 0 PID: 23633 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 523.728091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.738093] Call Trace: [ 523.740712] dump_stack+0x138/0x19c [ 523.744461] should_fail.cold+0x10f/0x159 [ 523.748902] should_failslab+0xdb/0x130 [ 523.753253] kmem_cache_alloc_node+0x28a/0x780 [ 523.757887] __alloc_skb+0x9c/0x500 [ 523.761532] ? skb_scrub_packet+0x4b0/0x4b0 [ 523.765878] ? netlink_has_listeners+0x20a/0x330 [ 523.770646] kobject_uevent_env+0x74c/0xc41 [ 523.774998] kobject_uevent+0x20/0x26 [ 523.778836] lo_ioctl+0x11d3/0x1c70 [ 523.782486] ? loop_probe+0x160/0x160 [ 523.786299] blkdev_ioctl+0x983/0x1880 [ 523.790198] ? blkpg_ioctl+0x980/0x980 [ 523.794099] ? __might_sleep+0x93/0xb0 [ 523.797993] ? __fget+0x210/0x370 [ 523.801542] block_ioctl+0xde/0x120 [ 523.805182] ? blkdev_fallocate+0x3b0/0x3b0 [ 523.809713] do_vfs_ioctl+0x7b9/0x1070 [ 523.813615] ? selinux_file_mprotect+0x5d0/0x5d0 [ 523.818378] ? lock_downgrade+0x6e0/0x6e0 [ 523.822537] ? ioctl_preallocate+0x1c0/0x1c0 [ 523.826960] ? __fget+0x237/0x370 [ 523.830419] ? security_file_ioctl+0x8f/0xc0 [ 523.834836] SyS_ioctl+0x8f/0xc0 [ 523.838225] ? do_vfs_ioctl+0x1070/0x1070 [ 523.842557] do_syscall_64+0x1eb/0x630 [ 523.846451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 523.851305] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 523.856498] RIP: 0033:0x458a97 [ 523.859691] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 523.867410] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 523.874776] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 13:17:54 executing program 2: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="7365637559693a53c3f0eb724e74151f38596119e07c28db06bcc196402c4563d3ee33da79000000001f6eeb924f8cda768a01000000000002"], 0x1) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) clone(0xa000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40000000002f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 523.882488] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 523.889778] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 523.897147] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 523.909810] FAULT_INJECTION: forcing a failure. [ 523.909810] name failslab, interval 1, probability 0, space 0, times 0 [ 523.939954] CPU: 0 PID: 23632 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 523.947007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.956644] Call Trace: [ 523.959251] dump_stack+0x138/0x19c [ 523.962897] should_fail.cold+0x10f/0x159 [ 523.967066] should_failslab+0xdb/0x130 [ 523.971058] __kmalloc_track_caller+0x2ef/0x790 [ 523.975746] ? kstrdup_const+0x48/0x60 [ 523.979653] kstrdup+0x3a/0x70 [ 523.982865] kstrdup_const+0x48/0x60 [ 523.986595] alloc_vfsmnt+0xe5/0x7d0 [ 523.990344] vfs_kern_mount.part.0+0x2a/0x3d0 [ 523.994886] do_mount+0x417/0x27d0 [ 523.998572] ? copy_mount_options+0x5c/0x2f0 [ 524.003002] ? rcu_read_lock_sched_held+0x110/0x130 [ 524.008120] ? copy_mount_string+0x40/0x40 [ 524.012366] ? copy_mount_options+0x1fe/0x2f0 [ 524.016875] SyS_mount+0xab/0x120 [ 524.020339] ? copy_mnt_ns+0x8c0/0x8c0 [ 524.024233] do_syscall_64+0x1eb/0x630 [ 524.028129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 524.032984] entry_SYSCALL_64_after_hwframe+0x42/0xb7 13:17:54 executing program 0: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000000000)=@tipc, 0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000140)=0x14) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '\x00'}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0xfd09}) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6c2, 0x4200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000001c0)={r2, 0x80000, r3}) 13:17:54 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930206000000a84308910000803900090035000c00060000001900150000000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x20040000) fallocate(r0, 0x0, 0x80000000, 0x9) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="941914f0aeaddbd101cac2008f79c675042140208d1ca9e7d6df8661c8f51180438f22dae28ba793b4c970ca8f41ec9b46e814f6ad586b8f2e74f87f18a61de1dbe7fa875bf6f57c8e1b45476c6f1a97460ed8eaba80617fc342346eec42f11cc215f3a5c668397abffa9c076dd1467de9abfca98e68235d3d67242b9bdc7312e4dc3413d558782f94f5e94d3dc3a2ef960e17e91225f0ff0da6384bf5c44d", 0x9f}], 0x1, 0x4e) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x9, 0x6, 0x204, 0x780, 0xe5, 0x527, 0x1, 0x80000000, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x49, 0x8000, 0x40, 0x8001, r2}, 0x10) [ 524.038185] RIP: 0033:0x45b69a [ 524.041380] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 524.049095] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 524.056367] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 524.063641] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 524.070918] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 524.078200] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:54 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@rand_addr, @rand_addr=0xff}, 0xc) r0 = syz_open_dev$sg(0x0, 0x0, 0x2) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) getsockopt$packet_int(r1, 0x107, 0x12, &(0x7f00000000c0), &(0x7f0000000180)=0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16, @ANYRES64=r0], 0xfed3) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0xffff, 0x80801) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000280)=0x1) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/33, 0x200000a1}], 0x1) 13:17:54 executing program 1 (fault-call:2 fault-nth:55): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 524.250764] FAULT_INJECTION: forcing a failure. [ 524.250764] name failslab, interval 1, probability 0, space 0, times 0 [ 524.284910] CPU: 1 PID: 23662 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 524.291969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.301328] Call Trace: [ 524.303940] dump_stack+0x138/0x19c [ 524.307590] should_fail.cold+0x10f/0x159 [ 524.311755] should_failslab+0xdb/0x130 [ 524.315769] kmem_cache_alloc+0x2d9/0x780 [ 524.319932] ? __schedule+0x7c6/0x1cf0 [ 524.323838] ? cache_grow_end.part.0+0x92/0x160 [ 524.328548] getname_flags+0xcb/0x580 [ 524.332550] ? trace_hardirqs_on_caller+0x400/0x590 [ 524.337604] user_path_at_empty+0x2f/0x50 [ 524.341792] do_mount+0x12b/0x27d0 [ 524.345441] ? copy_mount_string+0x40/0x40 [ 524.349690] ? copy_mount_options+0x151/0x2f0 [ 524.354199] ? __sanitizer_cov_trace_pc+0x3e/0x60 [ 524.359071] ? copy_mount_options+0x1fe/0x2f0 [ 524.363580] SyS_mount+0xab/0x120 [ 524.370695] ? copy_mnt_ns+0x8c0/0x8c0 [ 524.374611] do_syscall_64+0x1eb/0x630 [ 524.378508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 524.383370] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 524.388566] RIP: 0033:0x45b69a [ 524.391758] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 524.399496] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 524.406770] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 524.414049] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 524.421323] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 524.428612] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 525.496519] audit: type=1400 audit(1555420676.039:143): avc: denied { map } for pid=23671 comm="syz-executor.4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 526.468909] IPVS: ftp: loaded support on port[0] = 21 13:17:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) fchownat(0xffffffffffffffff, 0x0, r1, 0x0, 0x1c00) [ 526.788578] chnl_net:caif_netlink_parms(): no params data found [ 526.822006] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.828413] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.835623] device bridge_slave_0 entered promiscuous mode [ 526.843014] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.849542] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.856672] device bridge_slave_1 entered promiscuous mode [ 526.871995] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 526.881403] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 526.900105] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 526.907434] team0: Port device team_slave_0 added [ 526.914124] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 526.921188] team0: Port device team_slave_1 added [ 526.926707] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 526.934116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 526.986039] device hsr_slave_0 entered promiscuous mode [ 527.064040] device hsr_slave_1 entered promiscuous mode [ 527.124739] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 527.131840] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 527.146023] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.152535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.159229] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.165645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 527.192630] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 527.199608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 527.207959] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 527.217983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 527.225019] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.242909] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.252436] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 527.259656] 8021q: adding VLAN 0 to HW filter on device team0 [ 527.268112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 527.276501] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.282979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 527.296076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 527.303873] bridge0: port 2(bridge_slave_1) entered blocking state [ 527.310443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 527.319757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 527.330069] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 527.343130] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 527.354625] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 527.364963] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 527.371512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 527.379757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 527.387504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 527.395885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 527.408022] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 527.418454] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 527.780337] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 13:17:59 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, &(0x7f0000000100)={0x370}, 0x8) 13:17:59 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:17:59 executing program 1 (fault-call:2 fault-nth:56): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000100)=@req3={0x3, 0x5, 0xffffffffffff1f10, 0x76a1, 0x1ff, 0x101, 0x1f}, 0x1c) close(r1) accept4$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80000) 13:17:59 executing program 5 (fault-call:2 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:59 executing program 2: getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x0) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000140)={[{0x10000, 0x2, 0x800, 0x4, 0x746, 0xa0f, 0x5, 0x1, 0x80, 0x4, 0x7ff, 0x5, 0xf6}, {0x9, 0x200, 0xa9, 0xfffffffffffffff8, 0x3, 0x101, 0x7ff, 0xffffffff, 0x2, 0x3, 0x5, 0x7, 0x6}, {0xffffffffffffff4d, 0x0, 0x7, 0x7f, 0x401, 0x8, 0x22, 0x4, 0x40000000000000, 0x3ff, 0x5, 0x2d, 0x3a7}], 0x1}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000040), 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 528.653843] FAULT_INJECTION: forcing a failure. [ 528.653843] name failslab, interval 1, probability 0, space 0, times 0 [ 528.671703] CPU: 1 PID: 23696 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 528.678771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.688511] Call Trace: [ 528.691105] dump_stack+0x138/0x19c [ 528.694885] should_fail.cold+0x10f/0x159 [ 528.699196] should_failslab+0xdb/0x130 [ 528.703267] kmem_cache_alloc_node+0x28a/0x780 [ 528.708023] __alloc_skb+0x9c/0x500 [ 528.711652] ? skb_scrub_packet+0x4b0/0x4b0 [ 528.716081] ? netlink_has_listeners+0x20a/0x330 [ 528.720925] kobject_uevent_env+0x74c/0xc41 [ 528.725363] kobject_uevent+0x20/0x26 [ 528.729164] lo_ioctl+0x11d3/0x1c70 [ 528.732890] ? loop_probe+0x160/0x160 [ 528.736699] blkdev_ioctl+0x983/0x1880 [ 528.740607] ? blkpg_ioctl+0x980/0x980 [ 528.744910] ? __might_sleep+0x93/0xb0 [ 528.748792] ? __fget+0x210/0x370 [ 528.752248] block_ioctl+0xde/0x120 [ 528.758007] ? blkdev_fallocate+0x3b0/0x3b0 [ 528.762338] do_vfs_ioctl+0x7b9/0x1070 [ 528.766413] ? selinux_file_mprotect+0x5d0/0x5d0 [ 528.771189] ? lock_downgrade+0x6e0/0x6e0 [ 528.775344] ? ioctl_preallocate+0x1c0/0x1c0 [ 528.779743] ? __fget+0x237/0x370 [ 528.783212] ? security_file_ioctl+0x8f/0xc0 [ 528.787623] SyS_ioctl+0x8f/0xc0 [ 528.790990] ? do_vfs_ioctl+0x1070/0x1070 [ 528.795136] do_syscall_64+0x1eb/0x630 [ 528.799012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 528.803847] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 528.809022] RIP: 0033:0x458a97 [ 528.812202] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 528.819908] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 528.827166] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 528.834427] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 528.841788] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 528.849053] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 528.857188] protocol 88fb is buggy, dev hsr_slave_0 [ 528.862318] protocol 88fb is buggy, dev hsr_slave_1 [ 528.867427] protocol 88fb is buggy, dev hsr_slave_0 [ 528.872527] protocol 88fb is buggy, dev hsr_slave_1 [ 528.877645] protocol 88fb is buggy, dev hsr_slave_0 [ 528.882759] protocol 88fb is buggy, dev hsr_slave_1 [ 528.903252] FAULT_INJECTION: forcing a failure. [ 528.903252] name failslab, interval 1, probability 0, space 0, times 0 [ 528.919846] CPU: 1 PID: 23701 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 528.927103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.927108] Call Trace: [ 528.927126] dump_stack+0x138/0x19c [ 528.927146] should_fail.cold+0x10f/0x159 [ 528.927163] should_failslab+0xdb/0x130 [ 528.927176] kmem_cache_alloc_trace+0x2ec/0x790 [ 528.927188] ? kasan_check_write+0x14/0x20 [ 528.939215] ? _copy_from_user+0x99/0x110 [ 528.939232] copy_mount_options+0x5c/0x2f0 [ 528.939246] SyS_mount+0x87/0x120 [ 528.939255] ? copy_mnt_ns+0x8c0/0x8c0 [ 528.939274] do_syscall_64+0x1eb/0x630 [ 528.939283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 528.939300] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 528.939308] RIP: 0033:0x45b69a [ 528.939316] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:17:59 executing program 2: [ 529.000679] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 529.007943] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 529.015247] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 529.022500] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 529.029753] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:17:59 executing program 0: 13:17:59 executing program 5 (fault-call:2 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:59 executing program 1 (fault-call:2 fault-nth:57): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:59 executing program 0: 13:17:59 executing program 2: [ 529.263783] FAULT_INJECTION: forcing a failure. [ 529.263783] name failslab, interval 1, probability 0, space 0, times 0 [ 529.281839] FAULT_INJECTION: forcing a failure. [ 529.281839] name failslab, interval 1, probability 0, space 0, times 0 [ 529.288786] CPU: 1 PID: 23719 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 529.300524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.310079] Call Trace: [ 529.312685] dump_stack+0x138/0x19c [ 529.316492] should_fail.cold+0x10f/0x159 [ 529.320652] should_failslab+0xdb/0x130 [ 529.324641] kmem_cache_alloc+0x2d9/0x780 [ 529.328795] ? check_preemption_disabled+0x3c/0x250 [ 529.333825] alloc_vfsmnt+0x28/0x7d0 [ 529.337669] vfs_kern_mount.part.0+0x2a/0x3d0 [ 529.342259] ? find_held_lock+0x35/0x130 [ 529.346505] vfs_kern_mount+0x40/0x60 [ 529.350303] btrfs_mount+0x3ce/0x2b14 [ 529.354186] ? lock_downgrade+0x6e0/0x6e0 [ 529.358336] ? find_held_lock+0x35/0x130 [ 529.362403] ? pcpu_alloc+0x3af/0x1060 [ 529.366313] ? btrfs_remount+0x11f0/0x11f0 [ 529.370548] ? rcu_read_lock_sched_held+0x110/0x130 [ 529.375568] ? __lockdep_init_map+0x10c/0x570 [ 529.380060] ? __lockdep_init_map+0x10c/0x570 [ 529.384578] mount_fs+0x9d/0x2a7 [ 529.388059] vfs_kern_mount.part.0+0x5e/0x3d0 [ 529.392552] do_mount+0x417/0x27d0 [ 529.396086] ? copy_mount_options+0x5c/0x2f0 [ 529.400586] ? rcu_read_lock_sched_held+0x110/0x130 [ 529.405879] ? copy_mount_string+0x40/0x40 [ 529.416884] ? copy_mount_options+0x1fe/0x2f0 [ 529.429678] SyS_mount+0xab/0x120 [ 529.433135] ? copy_mnt_ns+0x8c0/0x8c0 [ 529.437020] do_syscall_64+0x1eb/0x630 [ 529.440993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 529.445834] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 529.451015] RIP: 0033:0x45b69a [ 529.454202] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 529.462018] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 529.469460] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 529.476984] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 529.484351] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 529.491818] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 529.500750] CPU: 0 PID: 23725 Comm: syz-executor.5 Not tainted 4.14.111 #1 13:18:00 executing program 4: r0 = socket(0x1, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) [ 529.507978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.517348] Call Trace: [ 529.520063] dump_stack+0x138/0x19c [ 529.523898] should_fail.cold+0x10f/0x159 [ 529.528156] should_failslab+0xdb/0x130 [ 529.532448] kmem_cache_alloc_node_trace+0x283/0x770 [ 529.537763] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 529.543386] __kmalloc_node_track_caller+0x3d/0x80 [ 529.548321] __kmalloc_reserve.isra.0+0x40/0xe0 [ 529.553473] __alloc_skb+0xcf/0x500 [ 529.557499] ? skb_scrub_packet+0x4b0/0x4b0 [ 529.564087] ? netlink_has_listeners+0x20a/0x330 [ 529.568925] kobject_uevent_env+0x74c/0xc41 [ 529.573544] kobject_uevent+0x20/0x26 [ 529.577422] lo_ioctl+0x11d3/0x1c70 [ 529.581127] ? loop_probe+0x160/0x160 [ 529.585988] blkdev_ioctl+0x983/0x1880 [ 529.589956] ? blkpg_ioctl+0x980/0x980 [ 529.593834] ? __might_sleep+0x93/0xb0 [ 529.597706] ? __fget+0x210/0x370 [ 529.601344] block_ioctl+0xde/0x120 [ 529.605161] ? blkdev_fallocate+0x3b0/0x3b0 [ 529.609503] do_vfs_ioctl+0x7b9/0x1070 [ 529.613538] ? selinux_file_mprotect+0x5d0/0x5d0 [ 529.618308] ? lock_downgrade+0x6e0/0x6e0 [ 529.622476] ? ioctl_preallocate+0x1c0/0x1c0 [ 529.626888] ? __fget+0x237/0x370 [ 529.630339] ? security_file_ioctl+0x8f/0xc0 [ 529.635612] SyS_ioctl+0x8f/0xc0 [ 529.638997] ? do_vfs_ioctl+0x1070/0x1070 [ 529.643362] do_syscall_64+0x1eb/0x630 [ 529.647257] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 529.652193] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 529.657375] RIP: 0033:0x458a97 [ 529.660655] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.668365] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 529.675627] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 529.690012] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 529.697380] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 529.704759] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:02 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x406000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xffffffffffffff39, 0x0, 0xf33}}}}, 0x30}}, 0x0) 13:18:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x44, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 13:18:02 executing program 1 (fault-call:2 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:02 executing program 5 (fault-call:2 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:02 executing program 4: 13:18:02 executing program 4: 13:18:02 executing program 2: [ 531.671715] FAULT_INJECTION: forcing a failure. [ 531.671715] name failslab, interval 1, probability 0, space 0, times 0 [ 531.692809] FAULT_INJECTION: forcing a failure. [ 531.692809] name failslab, interval 1, probability 0, space 0, times 0 [ 531.716115] CPU: 1 PID: 23747 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 531.723193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.732558] Call Trace: [ 531.735325] dump_stack+0x138/0x19c [ 531.738953] should_fail.cold+0x10f/0x159 [ 531.743101] should_failslab+0xdb/0x130 [ 531.747074] kmem_cache_alloc_node+0x28a/0x780 [ 531.751840] __alloc_skb+0x9c/0x500 [ 531.755558] ? skb_scrub_packet+0x4b0/0x4b0 [ 531.759874] ? netlink_has_listeners+0x20a/0x330 [ 531.764635] kobject_uevent_env+0x74c/0xc41 [ 531.769067] kobject_uevent+0x20/0x26 [ 531.772863] lo_ioctl+0x11d3/0x1c70 [ 531.776486] ? loop_probe+0x160/0x160 [ 531.780282] blkdev_ioctl+0x983/0x1880 [ 531.784314] ? blkpg_ioctl+0x980/0x980 [ 531.788203] ? __might_sleep+0x93/0xb0 [ 531.792080] ? __fget+0x210/0x370 [ 531.795711] block_ioctl+0xde/0x120 [ 531.799347] ? blkdev_fallocate+0x3b0/0x3b0 [ 531.803752] do_vfs_ioctl+0x7b9/0x1070 [ 531.807639] ? selinux_file_mprotect+0x5d0/0x5d0 [ 531.812471] ? lock_downgrade+0x6e0/0x6e0 [ 531.816612] ? ioctl_preallocate+0x1c0/0x1c0 [ 531.821038] ? __fget+0x237/0x370 [ 531.824525] ? security_file_ioctl+0x8f/0xc0 [ 531.828927] SyS_ioctl+0x8f/0xc0 [ 531.832289] ? do_vfs_ioctl+0x1070/0x1070 [ 531.836532] do_syscall_64+0x1eb/0x630 [ 531.840424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 531.845353] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 531.850539] RIP: 0033:0x458a97 [ 531.853805] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 531.861506] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 531.868765] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 531.876134] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 531.883406] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 531.890667] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 531.898122] CPU: 0 PID: 23744 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 531.905170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.914556] Call Trace: [ 531.917161] dump_stack+0x138/0x19c [ 531.920804] should_fail.cold+0x10f/0x159 [ 531.924957] should_failslab+0xdb/0x130 [ 531.929185] __kmalloc_track_caller+0x2ef/0x790 [ 531.933847] ? unwind_get_return_address+0x61/0xa0 [ 531.938764] ? __save_stack_trace+0x7b/0xd0 [ 531.943179] ? btrfs_parse_early_options+0xa3/0x310 [ 531.948196] kstrdup+0x3a/0x70 [ 531.951426] btrfs_parse_early_options+0xa3/0x310 [ 531.956400] ? btrfs_freeze+0xc0/0xc0 [ 531.960276] ? find_next_bit+0x28/0x30 [ 531.964157] ? pcpu_alloc+0xcf5/0x1060 [ 531.968247] ? find_held_lock+0x35/0x130 [ 531.972291] ? pcpu_alloc+0xcf5/0x1060 [ 531.976178] btrfs_mount+0x11d/0x2b14 [ 531.979961] ? lock_downgrade+0x6e0/0x6e0 [ 531.984089] ? find_held_lock+0x35/0x130 [ 531.988134] ? pcpu_alloc+0x3af/0x1060 [ 531.992189] ? _find_next_bit+0xee/0x120 [ 531.996232] ? check_preemption_disabled+0x3c/0x250 [ 532.001247] ? btrfs_remount+0x11f0/0x11f0 [ 532.005473] ? rcu_read_lock_sched_held+0x110/0x130 [ 532.010580] ? __lockdep_init_map+0x10c/0x570 [ 532.015080] ? __lockdep_init_map+0x10c/0x570 [ 532.019566] mount_fs+0x9d/0x2a7 [ 532.023008] vfs_kern_mount.part.0+0x5e/0x3d0 [ 532.027621] do_mount+0x417/0x27d0 [ 532.031501] ? copy_mount_options+0x5c/0x2f0 [ 532.035918] ? rcu_read_lock_sched_held+0x110/0x130 [ 532.040919] ? copy_mount_string+0x40/0x40 [ 532.045148] ? copy_mount_options+0x1fe/0x2f0 [ 532.049640] SyS_mount+0xab/0x120 [ 532.053075] ? copy_mnt_ns+0x8c0/0x8c0 [ 532.057063] do_syscall_64+0x1eb/0x630 [ 532.061023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 532.065864] entry_SYSCALL_64_after_hwframe+0x42/0xb7 13:18:02 executing program 0: [ 532.071124] RIP: 0033:0x45b69a [ 532.074302] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 532.082268] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 532.089660] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 532.097013] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 532.104358] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 532.111680] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:02 executing program 2: 13:18:02 executing program 1 (fault-call:2 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:02 executing program 4: [ 532.255782] FAULT_INJECTION: forcing a failure. [ 532.255782] name failslab, interval 1, probability 0, space 0, times 0 [ 532.271550] CPU: 0 PID: 23767 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 532.278692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.288076] Call Trace: [ 532.288095] dump_stack+0x138/0x19c [ 532.288114] should_fail.cold+0x10f/0x159 [ 532.288141] should_failslab+0xdb/0x130 [ 532.288154] __kmalloc+0x2f3/0x7a0 [ 532.288165] ? find_held_lock+0x35/0x130 [ 532.288180] ? pcpu_alloc+0xcf5/0x1060 [ 532.288194] ? btrfs_mount+0x19a/0x2b14 [ 532.288206] btrfs_mount+0x19a/0x2b14 [ 532.288216] ? lock_downgrade+0x6e0/0x6e0 [ 532.288223] ? find_held_lock+0x35/0x130 [ 532.288233] ? pcpu_alloc+0x3af/0x1060 [ 532.288249] ? btrfs_remount+0x11f0/0x11f0 [ 532.288263] ? rcu_read_lock_sched_held+0x110/0x130 [ 532.288281] ? __lockdep_init_map+0x10c/0x570 [ 532.310818] ? __lockdep_init_map+0x10c/0x570 [ 532.310835] mount_fs+0x9d/0x2a7 [ 532.310849] vfs_kern_mount.part.0+0x5e/0x3d0 [ 532.310861] do_mount+0x417/0x27d0 [ 532.318699] ? copy_mount_options+0x5c/0x2f0 [ 532.318712] ? rcu_read_lock_sched_held+0x110/0x130 [ 532.318724] ? copy_mount_string+0x40/0x40 [ 532.318736] ? copy_mount_options+0x1fe/0x2f0 [ 532.318748] SyS_mount+0xab/0x120 [ 532.318755] ? copy_mnt_ns+0x8c0/0x8c0 [ 532.318769] do_syscall_64+0x1eb/0x630 [ 532.318776] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 532.318793] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 532.318800] RIP: 0033:0x45b69a [ 532.318805] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 532.318816] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 532.318821] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 532.318826] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 532.318831] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 532.318836] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:05 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:05 executing program 4: 13:18:05 executing program 0: 13:18:05 executing program 2: 13:18:05 executing program 5 (fault-call:2 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:05 executing program 1 (fault-call:2 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:05 executing program 4: 13:18:05 executing program 2: 13:18:05 executing program 0: 13:18:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[{0x10}], 0x10}, 0x4}], 0x1, 0x0) 13:18:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="4aca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 534.768620] FAULT_INJECTION: forcing a failure. [ 534.768620] name failslab, interval 1, probability 0, space 0, times 0 [ 534.800930] CPU: 0 PID: 23782 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 534.808160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.817655] Call Trace: [ 534.820387] dump_stack+0x138/0x19c [ 534.824109] should_fail.cold+0x10f/0x159 [ 534.828255] should_failslab+0xdb/0x130 [ 534.832256] kmem_cache_alloc_node+0x28a/0x780 [ 534.836864] __alloc_skb+0x9c/0x500 [ 534.841003] ? skb_scrub_packet+0x4b0/0x4b0 [ 534.845311] ? netlink_has_listeners+0x20a/0x330 [ 534.850053] kobject_uevent_env+0x74c/0xc41 [ 534.854392] kobject_uevent+0x20/0x26 [ 534.858178] lo_ioctl+0x11d3/0x1c70 [ 534.861790] ? loop_probe+0x160/0x160 [ 534.865603] blkdev_ioctl+0x983/0x1880 [ 534.869473] ? blkpg_ioctl+0x980/0x980 [ 534.873362] ? __might_sleep+0x93/0xb0 [ 534.877228] ? __fget+0x210/0x370 [ 534.880843] block_ioctl+0xde/0x120 [ 534.884472] ? blkdev_fallocate+0x3b0/0x3b0 [ 534.888786] do_vfs_ioctl+0x7b9/0x1070 [ 534.892679] ? selinux_file_mprotect+0x5d0/0x5d0 [ 534.897505] ? lock_downgrade+0x6e0/0x6e0 [ 534.901658] ? ioctl_preallocate+0x1c0/0x1c0 [ 534.906053] ? __fget+0x237/0x370 [ 534.909534] ? security_file_ioctl+0x8f/0xc0 [ 534.913937] SyS_ioctl+0x8f/0xc0 [ 534.917288] ? do_vfs_ioctl+0x1070/0x1070 [ 534.921429] do_syscall_64+0x1eb/0x630 [ 534.925328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 534.930244] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 534.935591] RIP: 0033:0x458a97 [ 534.938771] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 534.946561] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 534.953817] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 534.961157] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 534.968812] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 534.976219] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 534.990831] FAULT_INJECTION: forcing a failure. [ 534.990831] name failslab, interval 1, probability 0, space 0, times 0 [ 535.011807] CPU: 1 PID: 23783 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 535.019202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.019206] Call Trace: [ 535.019228] dump_stack+0x138/0x19c [ 535.019247] should_fail.cold+0x10f/0x159 [ 535.019262] should_failslab+0xdb/0x130 [ 535.019277] kmem_cache_alloc+0x2d9/0x780 [ 535.047234] ? check_preemption_disabled+0x3c/0x250 [ 535.052270] alloc_vfsmnt+0x28/0x7d0 [ 535.055971] vfs_kern_mount.part.0+0x2a/0x3d0 [ 535.060450] ? find_held_lock+0x35/0x130 [ 535.064493] vfs_kern_mount+0x40/0x60 [ 535.068476] btrfs_mount+0x3ce/0x2b14 [ 535.072268] ? lock_downgrade+0x6e0/0x6e0 [ 535.076396] ? find_held_lock+0x35/0x130 [ 535.080447] ? pcpu_alloc+0x3af/0x1060 [ 535.084356] ? btrfs_remount+0x11f0/0x11f0 [ 535.088576] ? rcu_read_lock_sched_held+0x110/0x130 [ 535.093670] ? __lockdep_init_map+0x10c/0x570 [ 535.098150] ? __lockdep_init_map+0x10c/0x570 [ 535.102719] mount_fs+0x9d/0x2a7 [ 535.106118] vfs_kern_mount.part.0+0x5e/0x3d0 [ 535.110607] do_mount+0x417/0x27d0 [ 535.114128] ? copy_mount_options+0x5c/0x2f0 [ 535.118807] ? rcu_read_lock_sched_held+0x110/0x130 [ 535.123810] ? copy_mount_string+0x40/0x40 [ 535.128295] ? copy_mount_options+0x1fe/0x2f0 [ 535.132863] SyS_mount+0xab/0x120 [ 535.136304] ? copy_mnt_ns+0x8c0/0x8c0 [ 535.140196] do_syscall_64+0x1eb/0x630 [ 535.144072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 535.148905] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 535.154422] RIP: 0033:0x45b69a [ 535.157678] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:18:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x10) [ 535.165371] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 535.172631] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 535.179911] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 535.187174] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 535.194425] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:08 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:08 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) 13:18:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") open$dir(&(0x7f0000000040)='./file0\x00', 0x200002, 0x33) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) unshare(0x8000400) lseek(r1, 0x0, 0x2) 13:18:08 executing program 5 (fault-call:2 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:08 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={'rose', 0x0}, 0x0, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200008}, 0xc, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="c0020000", @ANYRES16=r2, @ANYBLOB="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"/729], 0x2c0}, 0x1, 0x0, 0x0, 0x4}, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r3, 0x401, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2000000}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = shmget(0x0, 0x2000, 0x10, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000640)=""/94) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x20, 0x40) 13:18:08 executing program 1 (fault-call:2 fault-nth:61): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpid() connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x80240) syz_open_pts(r0, 0x8400) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 537.800303] FAULT_INJECTION: forcing a failure. [ 537.800303] name failslab, interval 1, probability 0, space 0, times 0 [ 537.812443] CPU: 0 PID: 23822 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 537.819687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.829169] Call Trace: [ 537.831769] dump_stack+0x138/0x19c [ 537.835416] should_fail.cold+0x10f/0x159 [ 537.839603] should_failslab+0xdb/0x130 [ 537.843578] kmem_cache_alloc_node+0x28a/0x780 [ 537.848249] __alloc_skb+0x9c/0x500 [ 537.852339] ? skb_scrub_packet+0x4b0/0x4b0 [ 537.856666] ? netlink_has_listeners+0x20a/0x330 [ 537.861773] kobject_uevent_env+0x74c/0xc41 [ 537.866179] kobject_uevent+0x20/0x26 [ 537.871680] lo_ioctl+0x11d3/0x1c70 [ 537.875306] ? loop_probe+0x160/0x160 [ 537.879110] blkdev_ioctl+0x983/0x1880 [ 537.883201] ? blkpg_ioctl+0x980/0x980 [ 537.887083] ? __might_sleep+0x93/0xb0 [ 537.891055] ? __fget+0x210/0x370 [ 537.894585] block_ioctl+0xde/0x120 [ 537.898195] ? blkdev_fallocate+0x3b0/0x3b0 [ 537.902512] do_vfs_ioctl+0x7b9/0x1070 [ 537.906485] ? selinux_file_mprotect+0x5d0/0x5d0 [ 537.911234] ? lock_downgrade+0x6e0/0x6e0 [ 537.915851] ? ioctl_preallocate+0x1c0/0x1c0 [ 537.920257] ? __fget+0x237/0x370 [ 537.923705] ? security_file_ioctl+0x8f/0xc0 [ 537.928109] SyS_ioctl+0x8f/0xc0 [ 537.931494] ? do_vfs_ioctl+0x1070/0x1070 [ 537.936291] do_syscall_64+0x1eb/0x630 [ 537.941885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 537.947488] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 537.952693] RIP: 0033:0x458a97 [ 537.955872] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 537.963568] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 537.970826] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 537.978087] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 537.985524] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 537.993349] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 538.003868] FAULT_INJECTION: forcing a failure. [ 538.003868] name failslab, interval 1, probability 0, space 0, times 0 [ 538.023720] CPU: 1 PID: 23826 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 538.030776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.040400] Call Trace: [ 538.043097] dump_stack+0x138/0x19c [ 538.046748] should_fail.cold+0x10f/0x159 [ 538.050940] should_failslab+0xdb/0x130 [ 538.054930] kmem_cache_alloc+0x2d9/0x780 [ 538.059212] ? check_preemption_disabled+0x3c/0x250 [ 538.064246] alloc_vfsmnt+0x28/0x7d0 [ 538.067970] vfs_kern_mount.part.0+0x2a/0x3d0 [ 538.072476] ? find_held_lock+0x35/0x130 [ 538.076819] vfs_kern_mount+0x40/0x60 [ 538.080668] btrfs_mount+0x3ce/0x2b14 [ 538.084479] ? lock_downgrade+0x6e0/0x6e0 [ 538.088796] ? find_held_lock+0x35/0x130 [ 538.092965] ? pcpu_alloc+0x3af/0x1060 [ 538.097294] ? btrfs_remount+0x11f0/0x11f0 [ 538.101753] ? rcu_read_lock_sched_held+0x110/0x130 [ 538.106781] ? __lockdep_init_map+0x10c/0x570 [ 538.111405] ? __lockdep_init_map+0x10c/0x570 [ 538.116111] mount_fs+0x9d/0x2a7 [ 538.119486] vfs_kern_mount.part.0+0x5e/0x3d0 [ 538.123972] do_mount+0x417/0x27d0 [ 538.127516] ? copy_mount_options+0x5c/0x2f0 [ 538.131923] ? rcu_read_lock_sched_held+0x110/0x130 [ 538.136979] ? copy_mount_string+0x40/0x40 [ 538.141216] ? copy_mount_options+0x1fe/0x2f0 [ 538.145701] SyS_mount+0xab/0x120 [ 538.149169] ? copy_mnt_ns+0x8c0/0x8c0 [ 538.153160] do_syscall_64+0x1eb/0x630 [ 538.157065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 538.162019] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 538.167301] RIP: 0033:0x45b69a [ 538.170833] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 538.179017] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 538.186294] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 538.193577] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 13:18:08 executing program 4: gettid() gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000000)='vboxnet1*)ppp0\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000080)='loginui\ae\x96\x00\x00') sendfile(r1, r1, 0x0, 0x175604ea) 13:18:08 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, 0x0, &(0x7f0000000100)=0xfffffffffffffea6) 13:18:08 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0, 0x19a}], 0x1}, 0x0) r0 = socket(0x10, 0x10000000080002, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000300)={0x8}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(0x0, 0x0) tee(r1, r2, 0x6, 0x8) write$FUSE_DIRENT(r3, &(0x7f0000000200)={0x48, 0x0, 0x3, [{0x6, 0x0, 0x0, 0x6}, {0x3, 0x100000001, 0x3, 0x0, 'syz'}]}, 0x48) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) r5 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)='./cgroup\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={r5, 0x5, 0x9}, &(0x7f0000000840)=ANY=[@ANYBLOB="006e633d706b63733120456173683d77703338340000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d75ccd841963a83cf01741323dcaef89f0bb8fb061b69436b672c0fbcccc893e058f45a1a449a0d86c53921f2e24d833b37c09b828fdbcd7f78f28a9f76ffdd687827f1adb52a91c6af0b50651885679e8e8df5b86dfcdf25cc507912abd0815b9b2c63566ee44709af12e6d0a18923fa7bde93f06e87cea1110787c3a1e55b77ba6da9d2a948a959fe037d6ca16d376a72ceca3"], 0x0, 0x0) getresgid(&(0x7f0000000500), 0x0, &(0x7f0000000580)) fstat(r1, &(0x7f00000005c0)) perf_event_open(&(0x7f00000007c0)={0x5, 0x70, 0x4, 0xb129, 0x3f, 0x4, 0x0, 0x0, 0x1000, 0x9, 0x0, 0x10000, 0x200, 0x2, 0x0, 0x8, 0x0, 0x6, 0x7ff, 0x26, 0x6, 0x10001, 0x28ea, 0x518, 0x2, 0x7f, 0x1, 0x0, 0x8, 0x0, 0x10001, 0x0, 0x8000, 0x0, 0x6, 0x6, 0x8e22, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x2}, 0x20000, 0x0, 0x57, 0x2, 0x3, 0x80000000, 0xfffffffffffff031}, 0xffffffffffffffff, 0xd, r1, 0x1) stat(0x0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000c80)=ANY=[@ANYBLOB="df0000000000cb02000000000000000000000000000004002c1d0763779f24b77e24aad477200ee1198f8199079e6faf000000"], 0x33) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002047e0002000270f7f8", 0x16}], 0x1, 0x0) getpriority(0x0, 0xffffffffffffffff) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000cc0)={0x620, r6, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x12c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2711}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff801}}}]}}, {{0x8, 0x1, r4}, {0x13c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x2, 0x6, 0x7, 0x5}, {0xdc, 0x0, 0x1, 0x2}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8538}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r4}, {0x1b0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff9}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r4}, {0x80, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r4}, {0x14c, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r4}}}]}}]}, 0x620}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000080)="290000001800190000003fffffffda0602007a00fde80001084000040d0005000005000000060000ff", 0x29}], 0x1) prctl$PR_SVE_SET_VL(0x32, 0x2290) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 538.201025] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 538.208582] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:08 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xe2, 0x200100) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x90400) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000000)) sendmsg(r1, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="2800000000000000290000000300000027020201594a87ccfe8000000000000059000000000000000c67a12c584937fb1bb8c4f79e0b58f1998bded7cdbc8eb63d1ccded6870fbcb41eb804614cb489c8faca7fc0f4e359556094f489c9886a1854461c8fb0762ef62bab4d8f5de24102328568078a45013c5d9adc5977e13f39a617b09450a71f873f60de7b6240cd2a7ddbd53f79d9bb790baf14ae26c74ecfc9b822225086b6504"], 0x28}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2, 0x4e20, 0x3, 'lblc\x00', 0x21, 0x100, 0x2}, 0x2c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) 13:18:08 executing program 5 (fault-call:2 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 538.424352] FAULT_INJECTION: forcing a failure. [ 538.424352] name failslab, interval 1, probability 0, space 0, times 0 [ 538.445541] CPU: 1 PID: 23855 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 538.452738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.462187] Call Trace: [ 538.464785] dump_stack+0x138/0x19c [ 538.468447] should_fail.cold+0x10f/0x159 [ 538.472613] should_failslab+0xdb/0x130 [ 538.476668] kmem_cache_alloc_node_trace+0x283/0x770 [ 538.481759] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 538.487216] __kmalloc_node_track_caller+0x3d/0x80 [ 538.492150] __kmalloc_reserve.isra.0+0x40/0xe0 [ 538.496824] __alloc_skb+0xcf/0x500 [ 538.500456] ? skb_scrub_packet+0x4b0/0x4b0 [ 538.504766] ? netlink_has_listeners+0x20a/0x330 [ 538.509515] kobject_uevent_env+0x74c/0xc41 [ 538.513834] kobject_uevent+0x20/0x26 [ 538.517639] lo_ioctl+0x11d3/0x1c70 [ 538.521317] ? loop_probe+0x160/0x160 [ 538.525122] blkdev_ioctl+0x983/0x1880 [ 538.529030] ? blkpg_ioctl+0x980/0x980 [ 538.533027] ? __might_sleep+0x93/0xb0 [ 538.536906] ? __fget+0x210/0x370 [ 538.540353] block_ioctl+0xde/0x120 [ 538.544059] ? blkdev_fallocate+0x3b0/0x3b0 [ 538.548380] do_vfs_ioctl+0x7b9/0x1070 [ 538.552348] ? selinux_file_mprotect+0x5d0/0x5d0 [ 538.557207] ? lock_downgrade+0x6e0/0x6e0 [ 538.561517] ? ioctl_preallocate+0x1c0/0x1c0 [ 538.565944] ? __fget+0x237/0x370 [ 538.569402] ? security_file_ioctl+0x8f/0xc0 [ 538.573893] SyS_ioctl+0x8f/0xc0 [ 538.577266] ? do_vfs_ioctl+0x1070/0x1070 [ 538.581539] do_syscall_64+0x1eb/0x630 [ 538.585506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 538.590338] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 538.595530] RIP: 0033:0x458a97 [ 538.598720] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 538.606555] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 538.614014] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 538.621296] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 538.629112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 538.636491] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:11 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x22, 0x2, 0x4) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="48d1baeb318d77a8db3329191700fdd1d90c5860f742c113337b36cbb820853d2551e729902e5533c568488da97fc39320441f8224cf", 0x36, 0xfffffffffffffffc) keyctl$invalidate(0x15, r2) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, 0x0, 0x507100) 13:18:11 executing program 1 (fault-call:2 fault-nth:62): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000140)=@nl, 0x80) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f00000001c0)='vmnet0trustedselinuxnodev$md5sumcgroup)\x00', 0x28, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="24000000210007041dfffd946f61050002000000fd00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 13:18:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x1f, 0x5, 0x9, 0x9}, 0x3c) 13:18:11 executing program 5 (fault-call:2 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3ff, 0x40000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000080)={0xa, 0x0, 0x3, 0x5, '\x00', 0x5}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x3, 0x7}) socket$inet(0x2, 0x3, 0xda) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0xfffffffffffffeb1) 13:18:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) close(r1) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) [ 540.842836] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=33 sclass=netlink_audit_socket pig=23869 comm=syz-executor.2 [ 540.871358] FAULT_INJECTION: forcing a failure. [ 540.871358] name failslab, interval 1, probability 0, space 0, times 0 13:18:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x100000000, 0x402) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000004c0)) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000480)={@multicast2, @dev={0xac, 0x14, 0x14, 0x1b}, @local}, 0xc) r2 = socket(0x10, 0x2, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000700)=0x40) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000100)=0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r5 = socket$inet_udp(0x2, 0x2, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/111, 0x6f) setsockopt$inet_mreqsrc(r5, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @dev={0xac, 0x14, 0x14, 0xf}, @dev}, 0xc) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000180)={0x8, 0x1, 0x6, {0x5, @raw_data="1470eb7749afa95cd4d6b8e4661ec18dc454d934a1c40118dc0145be6a4a878960e2a8ca5713d6b42692a77efeda2d6f0144374c118bdc35772f3077037a99407f4e8249afd9f91d80aa62ad01bc8009d4bbb19a555bf0aa938e448e03c6a7648181470913a487e8b25a342a7697a89f63ddb7e9c0d86da02f08b56d9579ffc3edbffe82bad22cd99724dfd9b3778425e49f771e7624c233235195a23dec9d9b3a142d1da8390fead4eb3dcbabadb2a51b52485178540b72142c4f5db55f1db72941ebb54c0f771d"}}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000340)) sendfile(r2, r4, 0x0, 0x14a) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="010029bd7000fbdbdf2a03000000600dd940bcc1829fc14bb7839048711486aedbb5df15f7f994fad54730d920e3c9642b38035c8b9676d2817ec1c6dbd043b12432d9f39c35ed3dbd6e11c8393f58"], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x800) [ 540.894283] CPU: 0 PID: 23867 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 540.901536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.901542] Call Trace: [ 540.901561] dump_stack+0x138/0x19c [ 540.901579] should_fail.cold+0x10f/0x159 [ 540.901594] should_failslab+0xdb/0x130 [ 540.901604] __kmalloc+0x2f3/0x7a0 [ 540.901616] ? find_held_lock+0x35/0x130 [ 540.901630] ? pcpu_alloc+0xcf5/0x1060 [ 540.901641] ? btrfs_mount+0x19a/0x2b14 [ 540.901652] btrfs_mount+0x19a/0x2b14 [ 540.901661] ? lock_downgrade+0x6e0/0x6e0 [ 540.901669] ? find_held_lock+0x35/0x130 [ 540.901679] ? pcpu_alloc+0x3af/0x1060 [ 540.901695] ? btrfs_remount+0x11f0/0x11f0 [ 540.901710] ? rcu_read_lock_sched_held+0x110/0x130 [ 540.901729] ? __lockdep_init_map+0x10c/0x570 [ 540.901739] ? __lockdep_init_map+0x10c/0x570 [ 540.901763] mount_fs+0x9d/0x2a7 [ 540.901783] vfs_kern_mount.part.0+0x5e/0x3d0 [ 540.927420] FAULT_INJECTION: forcing a failure. [ 540.927420] name failslab, interval 1, probability 0, space 0, times 0 [ 540.930334] do_mount+0x417/0x27d0 [ 540.930344] ? copy_mount_options+0x5c/0x2f0 [ 540.930354] ? rcu_read_lock_sched_held+0x110/0x130 [ 540.930365] ? copy_mount_string+0x40/0x40 [ 540.930387] ? copy_mount_options+0x1fe/0x2f0 [ 540.930399] SyS_mount+0xab/0x120 [ 540.930406] ? copy_mnt_ns+0x8c0/0x8c0 [ 540.930419] do_syscall_64+0x1eb/0x630 [ 541.028781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 541.033843] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 541.039029] RIP: 0033:0x45b69a [ 541.042305] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 541.051145] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 541.058516] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 541.065780] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 541.073042] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 541.080564] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 541.087854] CPU: 1 PID: 23872 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 541.094974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.104337] Call Trace: [ 541.106924] dump_stack+0x138/0x19c [ 541.110547] should_fail.cold+0x10f/0x159 [ 541.114778] should_failslab+0xdb/0x130 [ 541.118875] kmem_cache_alloc_node_trace+0x283/0x770 [ 541.124074] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 541.129518] __kmalloc_node_track_caller+0x3d/0x80 [ 541.134494] __kmalloc_reserve.isra.0+0x40/0xe0 [ 541.139169] __alloc_skb+0xcf/0x500 [ 541.142791] ? skb_scrub_packet+0x4b0/0x4b0 [ 541.147110] ? netlink_has_listeners+0x20a/0x330 [ 541.151865] kobject_uevent_env+0x74c/0xc41 [ 541.156402] kobject_uevent+0x20/0x26 [ 541.160268] lo_ioctl+0x11d3/0x1c70 [ 541.163909] ? loop_probe+0x160/0x160 [ 541.167793] blkdev_ioctl+0x983/0x1880 [ 541.171866] ? blkpg_ioctl+0x980/0x980 [ 541.175751] ? __might_sleep+0x93/0xb0 [ 541.179623] ? __fget+0x210/0x370 [ 541.183065] block_ioctl+0xde/0x120 [ 541.186687] ? blkdev_fallocate+0x3b0/0x3b0 [ 541.191184] do_vfs_ioctl+0x7b9/0x1070 [ 541.195064] ? selinux_file_mprotect+0x5d0/0x5d0 [ 541.199827] ? lock_downgrade+0x6e0/0x6e0 [ 541.203974] ? ioctl_preallocate+0x1c0/0x1c0 [ 541.208377] ? __fget+0x237/0x370 [ 541.211821] ? security_file_ioctl+0x8f/0xc0 [ 541.216215] SyS_ioctl+0x8f/0xc0 [ 541.219576] ? do_vfs_ioctl+0x1070/0x1070 [ 541.223712] do_syscall_64+0x1eb/0x630 [ 541.227973] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 541.232812] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 541.237989] RIP: 0033:0x458a97 13:18:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x100000000000008) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x102, 0x1, 0x0, 0x0, 0x1}, 0x20) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x10000) [ 541.241162] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.248890] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 541.256243] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 541.263501] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 541.270773] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 541.278283] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) fcntl$lock(r0, 0x27, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x7ff, r1}) ptrace$cont(0x9, r1, 0x0, 0x0) 13:18:11 executing program 1 (fault-call:2 fault-nth:63): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 541.341968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=23891 comm=syz-executor.4 [ 541.361484] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=23891 comm=syz-executor.4 [ 541.405736] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25924 sclass=netlink_route_socket pig=23899 comm=syz-executor.4 [ 541.421142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=23899 comm=syz-executor.4 [ 541.487408] FAULT_INJECTION: forcing a failure. [ 541.487408] name failslab, interval 1, probability 0, space 0, times 0 [ 541.512106] CPU: 1 PID: 23909 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 541.519166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.528531] Call Trace: [ 541.531639] dump_stack+0x138/0x19c [ 541.535290] should_fail.cold+0x10f/0x159 [ 541.539467] should_failslab+0xdb/0x130 [ 541.543452] __kmalloc_track_caller+0x2ef/0x790 [ 541.548121] ? unwind_get_return_address+0x61/0xa0 [ 541.553134] ? __save_stack_trace+0x7b/0xd0 [ 541.557450] ? btrfs_parse_early_options+0xa3/0x310 [ 541.562453] kstrdup+0x3a/0x70 [ 541.565638] btrfs_parse_early_options+0xa3/0x310 [ 541.570472] ? btrfs_freeze+0xc0/0xc0 [ 541.574287] ? find_next_bit+0x28/0x30 [ 541.578157] ? pcpu_alloc+0xcf5/0x1060 [ 541.582032] ? find_held_lock+0x35/0x130 [ 541.586085] ? pcpu_alloc+0xcf5/0x1060 [ 541.589963] btrfs_mount+0x11d/0x2b14 [ 541.593770] ? lock_downgrade+0x6e0/0x6e0 [ 541.597911] ? find_held_lock+0x35/0x130 [ 541.601975] ? pcpu_alloc+0x3af/0x1060 [ 541.605851] ? _find_next_bit+0xee/0x120 [ 541.609900] ? check_preemption_disabled+0x3c/0x250 [ 541.614913] ? btrfs_remount+0x11f0/0x11f0 [ 541.619147] ? rcu_read_lock_sched_held+0x110/0x130 [ 541.624159] ? __lockdep_init_map+0x10c/0x570 [ 541.628654] ? __lockdep_init_map+0x10c/0x570 [ 541.633159] mount_fs+0x9d/0x2a7 [ 541.636561] vfs_kern_mount.part.0+0x5e/0x3d0 [ 541.641176] do_mount+0x417/0x27d0 [ 541.644748] ? copy_mount_options+0x5c/0x2f0 [ 541.649173] ? rcu_read_lock_sched_held+0x110/0x130 [ 541.654286] ? copy_mount_string+0x40/0x40 [ 541.658542] ? copy_mount_options+0x1fe/0x2f0 [ 541.663056] SyS_mount+0xab/0x120 [ 541.666514] ? copy_mnt_ns+0x8c0/0x8c0 [ 541.670398] do_syscall_64+0x1eb/0x630 [ 541.674367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 541.679286] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 541.684458] RIP: 0033:0x45b69a [ 541.687630] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 541.695330] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 541.702589] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 541.709848] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 541.717106] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 541.724369] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:14 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 13:18:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0x23, "5dbe36", "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"}}, 0x110) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200100000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) 13:18:14 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x308e2cae6b119d03) r0 = socket(0x11, 0x7, 0xfffffffffffffffe) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 13:18:14 executing program 5 (fault-call:2 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:14 executing program 1 (fault-call:2 fault-nth:64): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:14 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x701a81, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='stack\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={r1, r2}) socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x287be0a8, 0x40) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xb39}, &(0x7f00000000c0)=0x8) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000180)={0x49, 0x4, 0xa, 0x8, 0xffff000000000, 0x81}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000100)={r4, 0xc3f, 0x7, [0x40, 0x2, 0x2ad382a5, 0x2, 0x8, 0x100000000, 0x80000001]}, 0x16) setsockopt$sock_int(r3, 0x1, 0x31, &(0x7f0000000200), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000000)={r4, 0xffffffff}, &(0x7f0000000140)=0x8) 13:18:14 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x208082, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0xfffffffffffffff9, 0x487, 0x4, 0x1, 0x3}, &(0x7f0000000180)=0x14) r2 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[@ANYBLOB=' \n'], 0x2) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 543.913323] FAULT_INJECTION: forcing a failure. [ 543.913323] name failslab, interval 1, probability 0, space 0, times 0 [ 543.930194] FAULT_INJECTION: forcing a failure. [ 543.930194] name failslab, interval 1, probability 0, space 0, times 0 [ 543.978341] CPU: 0 PID: 23922 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 543.985756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.995128] Call Trace: [ 543.997737] dump_stack+0x138/0x19c [ 544.001715] should_fail.cold+0x10f/0x159 [ 544.005971] should_failslab+0xdb/0x130 [ 544.009963] __kmalloc_track_caller+0x2ef/0x790 [ 544.014727] ? kstrdup_const+0x48/0x60 [ 544.018702] kstrdup+0x3a/0x70 [ 544.021981] kstrdup_const+0x48/0x60 [ 544.025688] alloc_vfsmnt+0xe5/0x7d0 [ 544.029490] vfs_kern_mount.part.0+0x2a/0x3d0 [ 544.033991] ? find_held_lock+0x35/0x130 [ 544.038049] vfs_kern_mount+0x40/0x60 [ 544.041843] btrfs_mount+0x3ce/0x2b14 [ 544.045633] ? lock_downgrade+0x6e0/0x6e0 [ 544.049769] ? find_held_lock+0x35/0x130 [ 544.053825] ? pcpu_alloc+0x3af/0x1060 [ 544.057800] ? btrfs_remount+0x11f0/0x11f0 [ 544.062126] ? rcu_read_lock_sched_held+0x110/0x130 [ 544.067149] ? __lockdep_init_map+0x10c/0x570 [ 544.071725] ? __lockdep_init_map+0x10c/0x570 [ 544.076215] mount_fs+0x9d/0x2a7 [ 544.079576] vfs_kern_mount.part.0+0x5e/0x3d0 [ 544.084078] do_mount+0x417/0x27d0 [ 544.087637] ? copy_mount_options+0x5c/0x2f0 [ 544.092054] ? rcu_read_lock_sched_held+0x110/0x130 [ 544.097174] ? copy_mount_string+0x40/0x40 [ 544.101406] ? copy_mount_options+0x1fe/0x2f0 [ 544.105899] SyS_mount+0xab/0x120 [ 544.109341] ? copy_mnt_ns+0x8c0/0x8c0 [ 544.113225] do_syscall_64+0x1eb/0x630 [ 544.117113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 544.121953] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 544.127135] RIP: 0033:0x45b69a [ 544.130314] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 544.138012] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 544.145278] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 544.152574] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 544.160036] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 544.167295] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@broadcast, @in=@local}]}, 0x38}}, 0x0) 13:18:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x800) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000100)={r3, 0x1, 0x6, @broadcast}, 0x10) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000000)) accept$nfc_llcp(r2, &(0x7f00000001c0), &(0x7f0000000140)=0x60) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 544.174701] CPU: 1 PID: 23923 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 544.181837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.191569] Call Trace: [ 544.194180] dump_stack+0x138/0x19c [ 544.197843] should_fail.cold+0x10f/0x159 [ 544.202002] should_failslab+0xdb/0x130 [ 544.205975] kmem_cache_alloc+0x2d9/0x780 [ 544.210121] ? selinux_file_mprotect+0x5d0/0x5d0 [ 544.214866] ? lock_downgrade+0x6e0/0x6e0 [ 544.219012] ? ioctl_preallocate+0x1c0/0x1c0 [ 544.223406] getname_flags+0xcb/0x580 [ 544.227194] SyS_mkdir+0x7e/0x200 [ 544.230629] ? SyS_mkdirat+0x210/0x210 [ 544.234499] ? do_syscall_64+0x53/0x630 [ 544.238453] ? SyS_mkdirat+0x210/0x210 [ 544.242322] do_syscall_64+0x1eb/0x630 [ 544.246191] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 544.251025] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 544.256207] RIP: 0033:0x458047 [ 544.259466] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 544.267168] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 13:18:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x203, 0x0, 0x800, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xffffffffffff8000, 0x0, 0x8001, 0x4}}}}, 0x30}}, 0x10) [ 544.274464] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 544.281721] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 544.289002] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 544.296263] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket(0x20000000000000a, 0x3, 0x4) getsockopt$sock_buf(r2, 0x1, 0x24, &(0x7f0000e530e9)=""/16, &(0x7f00000001c0)=0x10) 13:18:14 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a503d39c2bd6a40fa8c8aa024d00000000ffffffff25fe48261e21ccf67e1d7b5510029663000000e565aa9a9d32c7627ffe7a54cdbd77b300", 0x2b}, 0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, 0x0, 0x0) mq_open(&(0x7f0000000000)='\x00', 0x82, 0x40, &(0x7f0000000040)={0x8, 0x100, 0x0, 0x80000001, 0xfff, 0x0, 0x4, 0x4}) 13:18:17 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 13:18:17 executing program 1 (fault-call:2 fault-nth:65): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:17 executing program 5 (fault-call:2 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:17 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000200)={0x10001, 0x1}) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000080)=0x80) r3 = accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @host}, 0x10, 0x800) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000400)={r3, 0x4, 0x3ff, "146c30b5728f55ecfffee9fc1a4a5a8a62ac7b6a9d5b98b9b596e311daae8475d545a1a6aa368f61f4798e0e78c9ae4708c16598e960408b3fb2ea48ddf94c13a5f4bb27d31224bb5a97ee245cda360cafafabe8bec1068e16bc82c5bb856f4ffbbfe05ac9bc56d45b188703b58fc117c529b15d79110e9dfe7c52d0f97dddd1d339aea7bbef736d254667cc4840ff4d96576b65be408fc4ab16af3535a0125cae423554eb11da04fff3c9f3ee7f5fd32237436b5164cd6b2d39b9c4cff0f7bbb2f9"}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000180)={[], 0x0, 0x40}) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="27ffffff0900fdc2c5eaf676cd2f20633a4f9543a39d627cffe30f4b805e517907d9107d18595b502ca8f09c8e596644204cb733bd9361cf93aa8d9639bba74304f4cab6d39409f78458243aed9b2166e0e46459fc92ba81e6f37eabd429063d9bb57a6e1044a660a86616b8d4d513df800374d080dc86fd9bc099e8a27dec716a2bbb6d74769448df0cebd9df06cb4039c1071f0ac03aeb7836c4ffce424b413e66fdb31b8a2e08e90a985095e61167f6ea6f5f8a87ac97c44cded228f0ecbc19afbf9dd6938b1af004c19dfa93584c3a87dc8c8614819f028fc79b08"]) 13:18:17 executing program 2: r0 = syz_open_dev$media(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000000000006) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = accept(r1, 0x0, 0x0) dup2(r2, r6) 13:18:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x400002, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYBLOB="2e0d0000fffb883c6b61db41b84b15ab7fa7cdd1dece881d562098f02a4c928a52f6a075d14b9b79c046c4a6f5c61697712ae93d6dc4654b8a73cb3bffba2472b23cb825da9ccc38819ac4967faa94fa61e92ec9458ee8be01062d5e193f4613906e9d737a5a9de29312eb8697d5b6556e59c045fde371ffd7b7629a37f2629839ec5635f23e562058eb05c9ecb5901ad0e7723bc5eb82b2c1a6578ef6b70190222c65432e71"]) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'bridge_slave_0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"]}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000200)=0x116004) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$TIOCNXCL(r2, 0x540d) [ 546.952709] FAULT_INJECTION: forcing a failure. [ 546.952709] name failslab, interval 1, probability 0, space 0, times 0 [ 546.990553] FAULT_INJECTION: forcing a failure. [ 546.990553] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:18:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='/dev/rfkill\x00', 0x0) setrlimit(0x1, &(0x7f0000011000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6}) memfd_create(0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) read$FUSE(r2, &(0x7f0000001240), 0xfffffe96) [ 547.005466] CPU: 1 PID: 23968 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 547.012625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.012630] Call Trace: [ 547.012650] dump_stack+0x138/0x19c [ 547.012671] should_fail.cold+0x10f/0x159 [ 547.012687] should_failslab+0xdb/0x130 [ 547.012697] kmem_cache_alloc+0x2d9/0x780 [ 547.012711] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 547.012732] ? ext4_sync_fs+0x810/0x810 [ 547.012742] ext4_alloc_inode+0x1d/0x610 [ 547.012751] alloc_inode+0x66/0x190 [ 547.012760] new_inode_pseudo+0x19/0xf0 [ 547.012770] new_inode+0x1f/0x40 [ 547.012784] __ext4_new_inode+0x32c/0x4870 [ 547.012807] ? avc_has_perm+0x2df/0x4b0 [ 547.012820] ? ext4_free_inode+0x1210/0x1210 [ 547.012837] ? dquot_get_next_dqblk+0x160/0x160 [ 547.012868] ext4_mkdir+0x331/0xc20 [ 547.032585] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 547.032601] ? security_inode_mkdir+0xd6/0x110 [ 547.032616] vfs_mkdir+0x3cf/0x610 [ 547.032626] SyS_mkdir+0x1b7/0x200 [ 547.032636] ? SyS_mkdirat+0x210/0x210 [ 547.040922] ? do_syscall_64+0x53/0x630 [ 547.040934] ? SyS_mkdirat+0x210/0x210 [ 547.040943] do_syscall_64+0x1eb/0x630 [ 547.040950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 547.040966] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 547.040974] RIP: 0033:0x458047 [ 547.040979] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 547.040988] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 547.040993] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 547.040999] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 547.041004] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 547.041009] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 547.163086] CPU: 0 PID: 23974 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 547.176655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.176660] Call Trace: [ 547.176682] dump_stack+0x138/0x19c [ 547.193136] should_fail.cold+0x10f/0x159 [ 547.199351] ? __might_sleep+0x93/0xb0 [ 547.199368] __alloc_pages_nodemask+0x1d6/0x7a0 [ 547.199382] ? __alloc_pages_slowpath+0x2930/0x2930 [ 547.217283] ? lock_downgrade+0x6e0/0x6e0 [ 547.221425] alloc_pages_current+0xec/0x1e0 [ 547.225830] __page_cache_alloc+0x248/0x3e0 [ 547.230231] do_read_cache_page+0x625/0xfc0 [ 547.234548] ? blkdev_writepages+0xd0/0xd0 [ 547.238768] ? find_get_pages_contig+0xaa0/0xaa0 [ 547.243593] ? blkdev_get+0xb0/0x8e0 [ 547.247288] ? dput.part.0+0x170/0x750 [ 547.251166] ? bd_may_claim+0xd0/0xd0 [ 547.254965] ? path_put+0x50/0x70 [ 547.258400] ? lookup_bdev.part.0+0xe1/0x160 [ 547.262806] read_cache_page_gfp+0x6e/0x90 [ 547.267038] btrfs_read_disk_super+0xdd/0x440 [ 547.271520] btrfs_scan_one_device+0xc6/0x400 [ 547.276010] ? device_list_add+0x8d0/0x8d0 [ 547.280244] ? __free_pages+0x54/0x90 [ 547.284059] ? free_pages+0x46/0x50 [ 547.287745] btrfs_mount+0x2e3/0x2b14 [ 547.291547] ? lock_downgrade+0x6e0/0x6e0 [ 547.295682] ? check_preemption_disabled+0x3c/0x250 [ 547.300684] ? btrfs_remount+0x11f0/0x11f0 [ 547.305301] ? rcu_read_lock_sched_held+0x110/0x130 [ 547.310305] ? __lockdep_init_map+0x10c/0x570 [ 547.314963] mount_fs+0x9d/0x2a7 [ 547.318315] vfs_kern_mount.part.0+0x5e/0x3d0 [ 547.322792] ? find_held_lock+0x35/0x130 [ 547.327012] vfs_kern_mount+0x40/0x60 [ 547.330975] btrfs_mount+0x3ce/0x2b14 [ 547.334761] ? lock_downgrade+0x6e0/0x6e0 [ 547.338988] ? btrfs_remount+0x11f0/0x11f0 [ 547.343215] ? rcu_read_lock_sched_held+0x110/0x130 [ 547.348222] ? __lockdep_init_map+0x10c/0x570 [ 547.352705] ? __lockdep_init_map+0x10c/0x570 [ 547.357201] mount_fs+0x9d/0x2a7 [ 547.360656] vfs_kern_mount.part.0+0x5e/0x3d0 [ 547.365171] do_mount+0x417/0x27d0 [ 547.368704] ? copy_mount_string+0x40/0x40 [ 547.372924] ? copy_mount_options+0x18f/0x2f0 [ 547.377732] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 547.382649] ? copy_mount_options+0x1fe/0x2f0 [ 547.387143] SyS_mount+0xab/0x120 [ 547.390676] ? copy_mnt_ns+0x8c0/0x8c0 [ 547.394571] do_syscall_64+0x1eb/0x630 [ 547.398448] ? trace_hardirqs_off_thunk+0x1a/0x1c 13:18:17 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xee, 0x1) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x3, 0x3, [], &(0x7f0000000140)=0x100000001}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x5, 0x1a, 0x4, "a4c080317ee9892057d029be7a8e7a5b845d69cd949a9e3336e50ed286b90f7bf1718b5ed41a35f669a631dc4349e7fb12128d92e5c424e2c81b831feb97615f", "b2afedbec07d9b038c496fca669abce03abe61818e10e4ef8d7132207be6d5aaf93a306a892f0249f1463d5b155ed3ff1533700ca940a01cfbd27bf9019571e4", "25114f60c1792304be01dd9506c30175804b6491c51cf3ee2534deade0191928", [0xd2, 0x1]}) r1 = syz_open_dev$loop(&(0x7f0000c86000)='/dev/loop#\x00', 0xd2fa, 0x8001) ioctl(r1, 0x800000000000125e, &(0x7f00000000c0)) [ 547.403286] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 547.408481] RIP: 0033:0x45b69a [ 547.411654] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 547.419344] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 547.426598] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 547.433937] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 547.441286] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 547.448898] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:17 executing program 5 (fault-call:2 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 547.511628] device nr0 entered promiscuous mode 13:18:17 executing program 1 (fault-call:2 fault-nth:66): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:17 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000013c0), &(0x7f0000001300)=0xa6fcaf998dbf1a7b) write(r0, &(0x7f0000000000)="91d4326ef85260d38b7fb72bee5ae26bdda2b0492a7515fd148483e0d30b2c87ef0ec32c6c7ca2573efe2d3de6f7836b39409493cd5e3fa6765307081353c7235fe17fe3472e2902760794dc9d7358677697e464e4f2a3bd93e33b7a7b840702e88fc9ca5b2dfb779b012a16710be149f4bcfeb34136c40cfa", 0x79) read(r0, &(0x7f0000000180)=""/4096, 0x1000) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000080)=0xc2) r1 = msgget(0x2, 0x400) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000001400)=""/212) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000001280)={0xf9a0000, 0x3, 0x100000000000, [], &(0x7f0000000100)={0x9e091f, 0x8, [], @p_u8=&(0x7f00000000c0)=0x1}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000012c0)='bbr\x00', 0x4) 13:18:18 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x246) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 547.632335] FAULT_INJECTION: forcing a failure. [ 547.632335] name failslab, interval 1, probability 0, space 0, times 0 [ 547.668227] FAULT_INJECTION: forcing a failure. [ 547.668227] name failslab, interval 1, probability 0, space 0, times 0 [ 547.708566] CPU: 0 PID: 24001 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 547.715709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.725247] Call Trace: [ 547.727849] dump_stack+0x138/0x19c [ 547.731493] should_fail.cold+0x10f/0x159 [ 547.735743] should_failslab+0xdb/0x130 [ 547.739833] kmem_cache_alloc+0x2d9/0x780 [ 547.744267] ? __d_lookup+0x3a2/0x670 [ 547.748080] ? mark_held_locks+0xb1/0x100 [ 547.752241] ? d_lookup+0xe5/0x240 [ 547.755801] __d_alloc+0x2d/0x9f0 [ 547.759270] d_alloc+0x4d/0x270 [ 547.762646] __lookup_hash+0x58/0x190 [ 547.766448] filename_create+0x16c/0x430 [ 547.770524] ? kern_path_mountpoint+0x40/0x40 [ 547.775025] SyS_mkdir+0x92/0x200 [ 547.778480] ? SyS_mkdirat+0x210/0x210 [ 547.782372] ? do_syscall_64+0x53/0x630 [ 547.786346] ? SyS_mkdirat+0x210/0x210 [ 547.790348] do_syscall_64+0x1eb/0x630 [ 547.794237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 547.799088] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 547.804276] RIP: 0033:0x458047 [ 547.807469] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 547.815181] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 547.822633] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 547.830056] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 547.837420] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 547.845131] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 547.852802] CPU: 1 PID: 24003 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 547.860074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.869441] Call Trace: [ 547.872070] dump_stack+0x138/0x19c [ 547.875706] should_fail.cold+0x10f/0x159 [ 547.875723] should_failslab+0xdb/0x130 [ 547.875736] kmem_cache_alloc_trace+0x2ec/0x790 [ 547.875755] selinux_parse_opts_str+0x3c7/0xa30 [ 547.875771] ? selinux_socket_sock_rcv_skb+0x570/0x570 [ 547.875795] ? free_pages+0x46/0x50 [ 547.888727] ? selinux_sb_copy_data+0x21e/0x390 [ 547.888748] security_sb_parse_opts_str+0x7b/0xb0 [ 547.888763] parse_security_options+0x4e/0xa0 [ 547.888774] btrfs_mount+0x2bb/0x2b14 [ 547.888795] ? lock_downgrade+0x6e0/0x6e0 [ 547.888802] ? find_held_lock+0x35/0x130 [ 547.888814] ? pcpu_alloc+0x3af/0x1060 [ 547.888830] ? btrfs_remount+0x11f0/0x11f0 [ 547.888845] ? rcu_read_lock_sched_held+0x110/0x130 [ 547.942736] ? __lockdep_init_map+0x10c/0x570 [ 547.947250] mount_fs+0x9d/0x2a7 [ 547.950771] vfs_kern_mount.part.0+0x5e/0x3d0 [ 547.955291] ? find_held_lock+0x35/0x130 [ 547.959363] vfs_kern_mount+0x40/0x60 [ 547.963177] btrfs_mount+0x3ce/0x2b14 [ 547.967036] ? lock_downgrade+0x6e0/0x6e0 [ 547.971193] ? find_held_lock+0x35/0x130 [ 547.975265] ? pcpu_alloc+0x3af/0x1060 [ 547.979258] ? btrfs_remount+0x11f0/0x11f0 [ 547.983511] ? rcu_read_lock_sched_held+0x110/0x130 [ 547.988736] ? __lockdep_init_map+0x10c/0x570 [ 547.993258] ? __lockdep_init_map+0x10c/0x570 [ 547.998155] mount_fs+0x9d/0x2a7 [ 548.001668] vfs_kern_mount.part.0+0x5e/0x3d0 [ 548.006390] do_mount+0x417/0x27d0 [ 548.009937] ? copy_mount_string+0x40/0x40 [ 548.014370] ? copy_mount_options+0x151/0x2f0 [ 548.018990] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 548.023867] ? copy_mount_options+0x1fe/0x2f0 [ 548.028652] SyS_mount+0xab/0x120 [ 548.032307] ? copy_mnt_ns+0x8c0/0x8c0 [ 548.036213] do_syscall_64+0x1eb/0x630 [ 548.040108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 548.045181] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 548.050367] RIP: 0033:0x45b69a [ 548.053552] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 548.061709] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 548.068989] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 548.076442] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 548.083706] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 548.090968] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:20 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 13:18:20 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x1ff, 0x3, 0x8, 0xa95, 0x15, 0x3, 0x1ff, 0x2, 0x3, 0x8001, 0x3, 0x4d5}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 13:18:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x2010, r0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_SMI(r3, 0xaeb7) r4 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_int(r4, 0x29, 0xce, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000180)) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x500) sendfile(r2, r1, 0x0, 0x3) 13:18:20 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000040)={{0x3a, @multicast2, 0x4e23, 0x1, 'dh\x00', 0x1, 0x4, 0x76}, {@loopback, 0x4e24, 0x2002, 0x1, 0x7, 0xffffffff}}, 0x44) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, 0x0, &(0x7f00000029c0)) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) 13:18:20 executing program 5 (fault-call:2 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:20 executing program 1 (fault-call:2 fault-nth:67): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 550.016812] audit: type=1400 audit(1555420700.355:144): avc: denied { map } for pid=24024 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=14995 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ppp_device_t:s0 tclass=chr_file permissive=1 [ 550.057622] FAULT_INJECTION: forcing a failure. [ 550.057622] name failslab, interval 1, probability 0, space 0, times 0 [ 550.075556] FAULT_INJECTION: forcing a failure. [ 550.075556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 550.092661] CPU: 1 PID: 24031 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 550.099726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.099734] Call Trace: [ 550.111813] dump_stack+0x138/0x19c [ 550.115454] should_fail.cold+0x10f/0x159 [ 550.119624] ? __might_sleep+0x93/0xb0 [ 550.123532] __alloc_pages_nodemask+0x1d6/0x7a0 [ 550.128214] ? trace_hardirqs_on+0xd/0x10 [ 550.132380] ? __alloc_pages_slowpath+0x2930/0x2930 [ 550.137434] ? btrfs_parse_early_options+0x1a2/0x310 [ 550.137462] alloc_pages_current+0xec/0x1e0 [ 550.137476] __get_free_pages+0xf/0x40 [ 550.137486] get_zeroed_page+0x11/0x20 [ 550.154868] parse_security_options+0x1f/0xa0 [ 550.159394] btrfs_mount+0x2bb/0x2b14 [ 550.159408] ? lock_downgrade+0x6e0/0x6e0 [ 550.159417] ? find_held_lock+0x35/0x130 [ 550.159430] ? pcpu_alloc+0x3af/0x1060 [ 550.159445] ? btrfs_remount+0x11f0/0x11f0 [ 550.171612] ? rcu_read_lock_sched_held+0x110/0x130 [ 550.171635] ? __lockdep_init_map+0x10c/0x570 [ 550.171652] mount_fs+0x9d/0x2a7 [ 550.193068] vfs_kern_mount.part.0+0x5e/0x3d0 [ 550.197575] ? find_held_lock+0x35/0x130 [ 550.201764] vfs_kern_mount+0x40/0x60 [ 550.205734] btrfs_mount+0x3ce/0x2b14 [ 550.209738] ? lock_downgrade+0x6e0/0x6e0 [ 550.214066] ? find_held_lock+0x35/0x130 [ 550.218134] ? pcpu_alloc+0x3af/0x1060 [ 550.222119] ? btrfs_remount+0x11f0/0x11f0 [ 550.226465] ? rcu_read_lock_sched_held+0x110/0x130 [ 550.231488] ? __lockdep_init_map+0x10c/0x570 [ 550.235975] ? __lockdep_init_map+0x10c/0x570 [ 550.240489] mount_fs+0x9d/0x2a7 [ 550.243858] vfs_kern_mount.part.0+0x5e/0x3d0 [ 550.248346] do_mount+0x417/0x27d0 [ 550.251877] ? copy_mount_options+0x5c/0x2f0 [ 550.256280] ? rcu_read_lock_sched_held+0x110/0x130 [ 550.261291] ? copy_mount_string+0x40/0x40 [ 550.265525] ? copy_mount_options+0x1fe/0x2f0 [ 550.270018] SyS_mount+0xab/0x120 [ 550.273468] ? copy_mnt_ns+0x8c0/0x8c0 [ 550.277361] do_syscall_64+0x1eb/0x630 [ 550.281331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 550.286183] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 550.291366] RIP: 0033:0x45b69a [ 550.294644] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 550.302346] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a 13:18:20 executing program 2: clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) ptrace(0x10, r1) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="346da61f7147e5dfe135c214a8370b14780a3bb24b6691fa4673827744fca860aef4c0c4f7f5fa485f7378cddcccab2be362e03a34b21df8c1") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) r2 = socket$bt_rfcomm(0x1f, 0xfffffffffffffffe, 0x3) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x4400, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x8000, 0x0) fanotify_mark(r3, 0x2, 0x48001023, r4, &(0x7f0000000280)='./file0\x00') getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000140)=0x68) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000002180)={0x0}) 13:18:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0x4}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) socket$netlink(0x10, 0x3, 0x6) [ 550.312648] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 550.319910] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 550.327174] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 550.334462] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 550.341916] CPU: 0 PID: 24025 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 550.348954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.358322] Call Trace: [ 550.360928] dump_stack+0x138/0x19c [ 550.365006] should_fail.cold+0x10f/0x159 [ 550.369166] should_failslab+0xdb/0x130 [ 550.373233] kmem_cache_alloc+0x2d9/0x780 [ 550.377401] ? __debug_object_init+0x171/0x8e0 [ 550.381993] ? ext4_alloc_inode+0x1d/0x610 [ 550.386240] selinux_inode_alloc_security+0xb6/0x2a0 [ 550.391353] security_inode_alloc+0x9a/0xe0 [ 550.395671] inode_init_always+0x552/0xaf0 [ 550.395681] alloc_inode+0x83/0x190 [ 550.403537] new_inode_pseudo+0x19/0xf0 [ 550.403547] new_inode+0x1f/0x40 [ 550.403559] __ext4_new_inode+0x32c/0x4870 [ 550.403587] ? avc_has_perm+0x2df/0x4b0 [ 550.419328] ? ext4_free_inode+0x1210/0x1210 [ 550.423785] ? dquot_get_next_dqblk+0x160/0x160 [ 550.428457] ext4_mkdir+0x331/0xc20 [ 550.432077] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 550.436823] ? security_inode_mkdir+0xd6/0x110 [ 550.441841] vfs_mkdir+0x3cf/0x610 [ 550.445685] SyS_mkdir+0x1b7/0x200 [ 550.449207] ? SyS_mkdirat+0x210/0x210 [ 550.453176] ? do_syscall_64+0x53/0x630 [ 550.457140] ? SyS_mkdirat+0x210/0x210 [ 550.461035] do_syscall_64+0x1eb/0x630 [ 550.465015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 550.470117] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 550.475289] RIP: 0033:0x458047 [ 550.478480] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 550.486185] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 550.493715] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 550.500968] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 550.508329] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:18:20 executing program 1 (fault-call:2 fault-nth:68): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="7b1a55a97b6a2c1519d5a6671a0000000022c02000ff198c691d05715a1ca74f8252608fb967c04e62a4f8f1e42e9008d4e5d55ae26d6efa20dbc14d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000100)=0x400, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x263, &(0x7f0000000200)=[{&(0x7f00000000c0)="50d503da6c94d3974a38dbe5d85002d441bed5472ca2424544c50ccffe6d1dcf3ff5db"}, {&(0x7f00000002c0)}], 0x0, &(0x7f0000001fc0)}, 0x20000}], 0x1, 0x8000) 13:18:20 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd0701483098178d0f87a2cd3c8b5b35e41e7f92d89606f3f5e880378ec99ab09f6d4ec72561590915b9e396b902ffc81c4da5afefcb338afdff19d86a37214b114aba8394b1c378a3e5f8b") r2 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r2, 0x0, 0x666d) [ 550.515660] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="b06f66643d000000000000d90f976124c1be68617ba3cfd520211b8501a9e9782c1541b9f4aca02750f1c2b66face93b5e0e75a4d85f87df019db825ebfdec63bfb4ad0e6cd856afff7e02d0eb7c8392fd5fcf8532efbe361e24cf3d21e43b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x4000010007f) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81806) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clock_gettime(0x0, 0x0) clone(0x3000000a0160100, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) creat(0x0, 0x80) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) flistxattr(r0, &(0x7f0000000480)=""/241, 0xf1) [ 550.678606] FAULT_INJECTION: forcing a failure. [ 550.678606] name failslab, interval 1, probability 0, space 0, times 0 [ 550.703659] CPU: 0 PID: 24060 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 550.710717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.720286] Call Trace: [ 550.722896] dump_stack+0x138/0x19c [ 550.726671] should_fail.cold+0x10f/0x159 [ 550.730851] should_failslab+0xdb/0x130 [ 550.731622] audit: type=1800 audit(1555420701.069:145): pid=24069 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17089 res=0 [ 550.734850] kmem_cache_alloc+0x2d9/0x780 [ 550.734867] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 550.734881] ? btrfs_scan_one_device+0x89/0x400 [ 550.771897] ? trace_hardirqs_on_caller+0x400/0x590 [ 550.776929] getname_kernel+0x53/0x350 [ 550.777406] audit: type=1804 audit(1555420701.099:146): pid=24069 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir481360412/syzkaller.VTSnU2/665/file0" dev="sda1" ino=17089 res=1 [ 550.780837] kern_path+0x20/0x40 [ 550.780851] lookup_bdev.part.0+0x63/0x160 [ 550.780859] ? blkdev_open+0x260/0x260 [ 550.780871] ? free_hot_cold_page+0x766/0xca0 [ 550.780881] blkdev_get_by_path+0x76/0xf0 [ 550.780894] btrfs_scan_one_device+0x97/0x400 [ 550.780911] ? device_list_add+0x8d0/0x8d0 [ 550.837193] ? __free_pages+0x54/0x90 [ 550.841003] ? free_pages+0x46/0x50 [ 550.844637] btrfs_mount+0x2e3/0x2b14 [ 550.848549] ? lock_downgrade+0x6e0/0x6e0 [ 550.852712] ? find_held_lock+0x35/0x130 [ 550.856787] ? pcpu_alloc+0x3af/0x1060 [ 550.861582] ? btrfs_remount+0x11f0/0x11f0 [ 550.865821] ? rcu_read_lock_sched_held+0x110/0x130 [ 550.870969] ? __lockdep_init_map+0x10c/0x570 [ 550.875582] mount_fs+0x9d/0x2a7 [ 550.879044] vfs_kern_mount.part.0+0x5e/0x3d0 [ 550.884558] ? find_held_lock+0x35/0x130 [ 550.897978] vfs_kern_mount+0x40/0x60 [ 550.901779] btrfs_mount+0x3ce/0x2b14 [ 550.905600] ? lock_downgrade+0x6e0/0x6e0 [ 550.909752] ? find_held_lock+0x35/0x130 [ 550.913829] ? pcpu_alloc+0x3af/0x1060 [ 550.917787] ? btrfs_remount+0x11f0/0x11f0 [ 550.922237] ? rcu_read_lock_sched_held+0x110/0x130 [ 550.928833] ? __lockdep_init_map+0x10c/0x570 [ 550.933436] ? __lockdep_init_map+0x10c/0x570 [ 550.938024] mount_fs+0x9d/0x2a7 [ 550.941474] vfs_kern_mount.part.0+0x5e/0x3d0 [ 550.945965] do_mount+0x417/0x27d0 [ 550.949604] ? copy_mount_options+0x5c/0x2f0 [ 550.954005] ? rcu_read_lock_sched_held+0x110/0x130 [ 550.959323] ? copy_mount_string+0x40/0x40 [ 550.964025] ? copy_mount_options+0x1fe/0x2f0 [ 550.968555] SyS_mount+0xab/0x120 [ 550.972047] ? copy_mnt_ns+0x8c0/0x8c0 [ 550.975937] do_syscall_64+0x1eb/0x630 [ 550.979818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 550.985640] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 550.990995] RIP: 0033:0x45b69a [ 550.994177] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 551.002132] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 551.009396] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 551.016665] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 551.023936] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 551.031294] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_dccp_int(r1, 0x21, 0x4, &(0x7f0000000040)=0x9, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)=""/62, 0x3e}}], 0x6de, 0x62, 0x0) 13:18:23 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 13:18:23 executing program 5 (fault-call:2 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:23 executing program 1 (fault-call:2 fault-nth:69): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:23 executing program 4: socket$inet(0x2, 0x3, 0x1c) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 553.068090] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) [ 553.078609] FAULT_INJECTION: forcing a failure. [ 553.078609] name failslab, interval 1, probability 0, space 0, times 0 [ 553.093990] FAULT_INJECTION: forcing a failure. [ 553.093990] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 553.106162] CPU: 0 PID: 24084 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 553.107253] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 553.113174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.113180] Call Trace: [ 553.113199] dump_stack+0x138/0x19c [ 553.113217] should_fail.cold+0x10f/0x159 [ 553.113236] __alloc_pages_nodemask+0x1d6/0x7a0 [ 553.113252] ? __alloc_pages_slowpath+0x2930/0x2930 [ 553.113275] cache_grow_begin+0x80/0x410 [ 553.113288] kmem_cache_alloc+0x6a8/0x780 [ 553.113297] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 553.113311] getname_kernel+0x53/0x350 [ 553.150899] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) [ 553.153468] kern_path+0x20/0x40 [ 553.153482] lookup_bdev.part.0+0x63/0x160 [ 553.153490] ? blkdev_open+0x260/0x260 [ 553.153504] ? free_hot_cold_page+0x766/0xca0 [ 553.157643] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 [ 553.161686] blkdev_get_by_path+0x76/0xf0 [ 553.161706] btrfs_scan_one_device+0x97/0x400 [ 553.161717] ? device_list_add+0x8d0/0x8d0 13:18:23 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001200)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000013c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x9}, 0xc, &(0x7f0000001380)={&(0x7f0000001240)={0x108, r2, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfb}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @remote}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x270}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xe04e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffffe}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x20000041) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000080)={0x0, 0x1000, &(0x7f0000000200)="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"}) read$rfkill(r1, &(0x7f0000000040), 0x8) bind$rds(r1, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) 13:18:23 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7f) setsockopt$inet_int(r0, 0x0, 0x21, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200400, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host}, 0x10) [ 553.161729] ? __free_pages+0x54/0x90 [ 553.161738] ? free_pages+0x46/0x50 [ 553.161751] btrfs_mount+0x2e3/0x2b14 [ 553.161761] ? lock_downgrade+0x6e0/0x6e0 [ 553.161769] ? find_held_lock+0x35/0x130 [ 553.161781] ? pcpu_alloc+0x3af/0x1060 [ 553.161797] ? btrfs_remount+0x11f0/0x11f0 [ 553.161812] ? rcu_read_lock_sched_held+0x110/0x130 [ 553.161834] ? __lockdep_init_map+0x10c/0x570 [ 553.191792] mount_fs+0x9d/0x2a7 [ 553.191807] vfs_kern_mount.part.0+0x5e/0x3d0 [ 553.191817] ? find_held_lock+0x35/0x130 13:18:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 553.191828] vfs_kern_mount+0x40/0x60 [ 553.191843] btrfs_mount+0x3ce/0x2b14 [ 553.191851] ? lock_downgrade+0x6e0/0x6e0 [ 553.191861] ? find_held_lock+0x35/0x130 [ 553.205184] ? pcpu_alloc+0x3af/0x1060 [ 553.205202] ? btrfs_remount+0x11f0/0x11f0 [ 553.205219] ? rcu_read_lock_sched_held+0x110/0x130 [ 553.205239] ? __lockdep_init_map+0x10c/0x570 [ 553.205249] ? __lockdep_init_map+0x10c/0x570 [ 553.205262] mount_fs+0x9d/0x2a7 [ 553.205274] vfs_kern_mount.part.0+0x5e/0x3d0 [ 553.205287] do_mount+0x417/0x27d0 13:18:23 executing program 2: clone(0x800000409ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xf) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4002, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0x3) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)=0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 553.205296] ? copy_mount_options+0x5c/0x2f0 [ 553.205306] ? rcu_read_lock_sched_held+0x110/0x130 [ 553.205317] ? copy_mount_string+0x40/0x40 [ 553.205339] ? copy_mount_options+0x1fe/0x2f0 [ 553.205351] SyS_mount+0xab/0x120 [ 553.241639] ? copy_mnt_ns+0x8c0/0x8c0 [ 553.241656] do_syscall_64+0x1eb/0x630 [ 553.241665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.241683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 553.241698] RIP: 0033:0x45b69a [ 553.250913] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 553.250925] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 553.250932] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 553.250938] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 553.250944] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 553.250950] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 553.381891] CPU: 0 PID: 24083 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 553.424049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.424053] Call Trace: [ 553.424070] dump_stack+0x138/0x19c [ 553.424083] should_fail.cold+0x10f/0x159 [ 553.424095] should_failslab+0xdb/0x130 [ 553.424103] kmem_cache_alloc+0x2d9/0x780 13:18:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 553.424111] ? __debug_object_init+0x171/0x8e0 [ 553.424121] ? ext4_alloc_inode+0x1d/0x610 [ 553.424133] selinux_inode_alloc_security+0xb6/0x2a0 [ 553.424142] security_inode_alloc+0x9a/0xe0 [ 553.424153] inode_init_always+0x552/0xaf0 [ 553.424160] alloc_inode+0x83/0x190 [ 553.424167] new_inode_pseudo+0x19/0xf0 [ 553.424174] new_inode+0x1f/0x40 [ 553.424183] __ext4_new_inode+0x32c/0x4870 [ 553.424197] ? avc_has_perm+0x2df/0x4b0 [ 553.424205] ? ext4_free_inode+0x1210/0x1210 [ 553.424217] ? dquot_get_next_dqblk+0x160/0x160 [ 553.424229] ext4_mkdir+0x331/0xc20 [ 553.424242] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 553.424251] ? security_inode_mkdir+0xd6/0x110 [ 553.424260] vfs_mkdir+0x3cf/0x610 [ 553.424269] SyS_mkdir+0x1b7/0x200 [ 553.424276] ? SyS_mkdirat+0x210/0x210 [ 553.424283] ? do_syscall_64+0x53/0x630 [ 553.424290] ? SyS_mkdirat+0x210/0x210 [ 553.424298] do_syscall_64+0x1eb/0x630 [ 553.424304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.424327] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 553.424334] RIP: 0033:0x458047 [ 553.424338] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 553.424346] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 553.424350] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 553.424354] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 553.424358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 553.424362] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0xfe80) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xb1, "34fa77544b76a1c783672f7b446b05ca6e7cfbedab1d11d4e4d233668f32a329279d85d48d78cb9d59da7c46ad37faff312eb781b83fb2f61b7d154ae7b589f0e23aa14754685d25dcb901b34b50e0a624b8b2520834e323871ad4a277b2040ec470d9571b3e4cc307e34eef8b9bd8602d8c5b101f8a799479445e22195d1ff676fa802f0549d9fefce0a1f926c3fd32dfba10ae8db82225d04dd60f7ce95e35cf299ae209f3cbc1470f5d23a815e409c7"}, &(0x7f0000000140)=0xb9) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x7, 0x2, 0x5, 0x7, r2}, &(0x7f0000000240)=0x10) 13:18:24 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 13:18:26 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 13:18:26 executing program 5 (fault-call:2 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:26 executing program 1 (fault-call:2 fault-nth:70): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:26 executing program 2: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000001100000000000000000076657468315f746f5f7465616d000000736974302000000000000400000000006272696467653000000000000000000076657468305f746f5f627269646765000180c2000000000000000000aaaaaaaaaa0000400000000000007000000070000000a80000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000002001000000feffffff01000000110000000000000000007465716c30000000000000000000000073797a5f74757e000000000000000000697036677265300000000000090000007663616e30000000d5691b3b00000000ffffffffffff000000000000aaaaaaaa98aa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x250) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0x1c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x2, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0xb8, 0xb8, 0x130, [@limit={'limit\x00', 0x20, {{0xfffffffffffffffa, 0x9}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x238) 13:18:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1) inotify_rm_watch(r1, r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@dev, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r0) 13:18:26 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x404080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x2, 0xffffffffffffff9c}) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x80, 0xf, 0x3, "e4041589030a3506d3878a0a9a2fcf8b5f8b5adbf979e2ba78e1192fa22548f5", 0x4745504d}) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f00000000c0)={0x0, {0x7f, 0x9}}) splice(r0, 0x0, r1, 0x0, 0x100, 0x0) dup2(r0, r1) 13:18:26 executing program 2: r0 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@nfc, &(0x7f0000000040)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x2}, &(0x7f0000000280)=0x8) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x181000, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000400)=""/42, &(0x7f0000000440)=0x2a) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x6) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000002c0)={r1, 0x6, 0xa9, "ab20d3aaaf84d7597bb22b915a17e25d01c3f4feb44a797ff921601e50209fb8b68f591063908f7681f43014948b4917f6c73d1b4950bdb8813a88a9b0ee71ca0b036f73311d155eb32ccb903a9bc61da70758fdaa2b824494de5c287680812716d662b6d7147f5b513cb585f45c8dda5f50c29c44f90c152d1a747e51ffeba051f33a4f81208d13e21c01e7f63aae0a80a01a025517b62b68f4334857f2c9f37b0f196276a9891a03"}, 0xb1) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000003c0)) 13:18:26 executing program 4: r0 = socket(0x10, 0x3, 0x6) write(r0, &(0x7f0000000100)="220000002000070700be000009000701020000400000000000200000050013800500", 0x22) [ 556.123758] ebtables: ebtables: counters copy to user failed while replacing table [ 556.133922] FAULT_INJECTION: forcing a failure. [ 556.133922] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 556.163924] CPU: 0 PID: 24142 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 556.171113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.181441] Call Trace: [ 556.181467] dump_stack+0x138/0x19c [ 556.181487] should_fail.cold+0x10f/0x159 [ 556.181499] ? __might_sleep+0x93/0xb0 [ 556.181515] __alloc_pages_nodemask+0x1d6/0x7a0 [ 556.181530] ? __alloc_pages_slowpath+0x2930/0x2930 [ 556.181540] ? lock_downgrade+0x6e0/0x6e0 [ 556.181557] alloc_pages_current+0xec/0x1e0 [ 556.181569] __page_cache_alloc+0x248/0x3e0 [ 556.192116] do_read_cache_page+0x625/0xfc0 [ 556.192131] ? blkdev_writepages+0xd0/0xd0 [ 556.192146] ? find_get_pages_contig+0xaa0/0xaa0 [ 556.192156] ? blkdev_get+0xb0/0x8e0 [ 556.210562] ? dput.part.0+0x170/0x750 [ 556.210576] ? bd_may_claim+0xd0/0xd0 [ 556.210586] ? path_put+0x50/0x70 [ 556.210596] ? lookup_bdev.part.0+0xe1/0x160 [ 556.223787] read_cache_page_gfp+0x6e/0x90 [ 556.223803] btrfs_read_disk_super+0xdd/0x440 [ 556.223814] btrfs_scan_one_device+0xc6/0x400 [ 556.223826] ? device_list_add+0x8d0/0x8d0 [ 556.231113] FAULT_INJECTION: forcing a failure. [ 556.231113] name failslab, interval 1, probability 0, space 0, times 0 [ 556.232900] ? __free_pages+0x54/0x90 [ 556.232911] ? free_pages+0x46/0x50 [ 556.232928] btrfs_mount+0x2e3/0x2b14 [ 556.232941] ? lock_downgrade+0x6e0/0x6e0 [ 556.232950] ? find_held_lock+0x35/0x130 [ 556.232964] ? pcpu_alloc+0x3af/0x1060 [ 556.247906] ? btrfs_remount+0x11f0/0x11f0 [ 556.247925] ? rcu_read_lock_sched_held+0x110/0x130 [ 556.247946] ? __lockdep_init_map+0x10c/0x570 [ 556.247962] mount_fs+0x9d/0x2a7 [ 556.247976] vfs_kern_mount.part.0+0x5e/0x3d0 [ 556.247983] ? find_held_lock+0x35/0x130 [ 556.247993] vfs_kern_mount+0x40/0x60 [ 556.248004] btrfs_mount+0x3ce/0x2b14 [ 556.248014] ? lock_downgrade+0x6e0/0x6e0 [ 556.265816] ? find_held_lock+0x35/0x130 [ 556.265833] ? pcpu_alloc+0x3af/0x1060 [ 556.265854] ? btrfs_remount+0x11f0/0x11f0 [ 556.265872] ? rcu_read_lock_sched_held+0x110/0x130 [ 556.361673] ? __lockdep_init_map+0x10c/0x570 [ 556.366581] ? __lockdep_init_map+0x10c/0x570 [ 556.371363] mount_fs+0x9d/0x2a7 [ 556.374748] vfs_kern_mount.part.0+0x5e/0x3d0 [ 556.379288] do_mount+0x417/0x27d0 [ 556.382955] ? copy_mount_options+0x5c/0x2f0 [ 556.387371] ? rcu_read_lock_sched_held+0x110/0x130 [ 556.392399] ? copy_mount_string+0x40/0x40 [ 556.396655] ? copy_mount_options+0x1fe/0x2f0 [ 556.401199] SyS_mount+0xab/0x120 [ 556.404661] ? copy_mnt_ns+0x8c0/0x8c0 [ 556.408568] do_syscall_64+0x1eb/0x630 [ 556.412467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.417344] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 556.422560] RIP: 0033:0x45b69a 13:18:26 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0x40405514, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xc0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:18:26 executing program 4: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='.//ile0\x00') r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000340)='./file0\x00', 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000280)=0xc) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='fuse\x00', 0x1014010, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x40}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'system.posix_acl_access\x00'}}, {@fowner_gt={'fowner>', r3}}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75703065726469723d2e2f66696c65302c6c6f7765726469723d0e3a66696c65302c776f726b6469723d2e2f66696c6531"]) fcntl$notify(r0, 0x402, 0x80000004) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r4, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0400"/12, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000400000000002000010000000000"], 0x4c, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/qat_adf_ctl\x00', 0x400, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') geteuid() 13:18:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000080)=0x339b35df) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x602, 0x1}, 0x2c) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000100)) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1}, 0x2c) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getpeername$netlink(r0, &(0x7f0000000140), &(0x7f0000000180)=0xc) 13:18:26 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f00000001c0)={0x0, "12f4076f084becd1669e95ed38e5f3bf7da983a1120cfc5ae6671f7fe88b6fe3"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r4, 0xfffffffffffffbff, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @local}, @ib={0x1b, 0x5, 0x0, {"8dcabd605be9b8c11eac5cf42794a07b"}, 0x4, 0x2, 0x55}}}, 0x118) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) [ 556.425744] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 556.433456] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 556.440817] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 556.448182] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 556.455642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 556.462921] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 556.476347] CPU: 1 PID: 24144 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 556.483398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.492934] Call Trace: [ 556.495566] dump_stack+0x138/0x19c [ 556.499207] should_fail.cold+0x10f/0x159 [ 556.503370] should_failslab+0xdb/0x130 [ 556.507358] __kmalloc+0x2f3/0x7a0 [ 556.510921] ? ext4_find_extent+0x709/0x960 [ 556.515347] ext4_find_extent+0x709/0x960 [ 556.519641] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 556.525327] ext4_ext_map_blocks+0x1a3/0x4fb0 [ 556.529915] ? save_trace+0x290/0x290 [ 556.533786] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 556.538992] ? __lock_is_held+0xb6/0x140 [ 556.543145] ? lock_acquire+0x16f/0x430 [ 556.547109] ? ext4_map_blocks+0x354/0x16e0 [ 556.551430] ext4_map_blocks+0xc8a/0x16e0 [ 556.555818] ? __lock_is_held+0xb6/0x140 [ 556.560033] ? check_preemption_disabled+0x3c/0x250 [ 556.565203] ? ext4_issue_zeroout+0x160/0x160 [ 556.569710] ? __brelse+0x50/0x60 [ 556.573359] ext4_getblk+0xac/0x450 [ 556.576999] ? ext4_iomap_begin+0x8a0/0x8a0 [ 556.581518] ? ext4_free_inode+0x1210/0x1210 [ 556.585926] ext4_bread+0x6e/0x1a0 [ 556.589455] ? ext4_getblk+0x450/0x450 [ 556.593356] ext4_append+0x14b/0x360 [ 556.597068] ext4_mkdir+0x531/0xc20 [ 556.600701] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 556.605364] ? security_inode_mkdir+0xd6/0x110 [ 556.609940] vfs_mkdir+0x3cf/0x610 [ 556.613497] SyS_mkdir+0x1b7/0x200 [ 556.617121] ? SyS_mkdirat+0x210/0x210 [ 556.621111] ? do_syscall_64+0x53/0x630 [ 556.625182] ? SyS_mkdirat+0x210/0x210 [ 556.629064] do_syscall_64+0x1eb/0x630 [ 556.632945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.637773] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 556.643154] RIP: 0033:0x458047 [ 556.646585] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 556.654390] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 556.661667] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 556.668951] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 556.676231] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 556.683555] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:29 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x80489439, &(0x7f0000000140)) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000040)) 13:18:29 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 13:18:29 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$kcm(0x29, 0x5, 0x0) 13:18:29 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000002c0)={0x0, r1}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x200}) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000007691c8c8f3d00ef04981af"], 0x8) 13:18:29 executing program 1 (fault-call:2 fault-nth:71): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:29 executing program 5 (fault-call:2 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x80, 0x100) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000100)=0x22b) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b6673b366617400020401", 0xf, 0x2}], 0x8080, 0x0) 13:18:29 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000001c0)={[], 0x800000, 0x0, 0x20, 0x0, 0x884, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 559.178375] FAULT_INJECTION: forcing a failure. [ 559.178375] name failslab, interval 1, probability 0, space 0, times 0 [ 559.189720] CPU: 0 PID: 24187 Comm: syz-executor.5 Not tainted 4.14.111 #1 [ 559.196740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.206203] Call Trace: [ 559.206225] dump_stack+0x138/0x19c [ 559.206244] should_fail.cold+0x10f/0x159 [ 559.206257] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 559.206270] should_failslab+0xdb/0x130 [ 559.206284] kmem_cache_alloc+0x47/0x780 [ 559.229561] __es_insert_extent+0x26c/0xe60 [ 559.229579] ext4_es_insert_extent+0x1f0/0x590 [ 559.229592] ? check_preemption_disabled+0x3c/0x250 [ 559.229604] ? ext4_es_find_delayed_extent_range+0x970/0x970 [ 559.238084] FAULT_INJECTION: forcing a failure. [ 559.238084] name failslab, interval 1, probability 0, space 0, times 0 [ 559.238571] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 559.238587] ? ext4_es_find_delayed_extent_range+0x31d/0x970 [ 559.238606] ext4_ext_put_gap_in_cache+0xcb/0x110 [ 559.238616] ? ext4_zeroout_es+0x170/0x170 [ 559.238627] ? ext4_find_extent+0x64c/0x960 [ 559.238642] ext4_ext_map_blocks+0x1d52/0x4fb0 [ 559.290129] ? save_trace+0x290/0x290 [ 559.293924] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 559.299034] ? __lock_is_held+0xb6/0x140 [ 559.303088] ? lock_acquire+0x16f/0x430 [ 559.307047] ? ext4_map_blocks+0x354/0x16e0 [ 559.311364] ext4_map_blocks+0xc8a/0x16e0 [ 559.315513] ? __lock_is_held+0xb6/0x140 [ 559.319563] ? check_preemption_disabled+0x3c/0x250 [ 559.324573] ? ext4_issue_zeroout+0x160/0x160 [ 559.329057] ? __brelse+0x50/0x60 [ 559.332506] ext4_getblk+0xac/0x450 [ 559.336145] ? ext4_iomap_begin+0x8a0/0x8a0 [ 559.340459] ? ext4_free_inode+0x1210/0x1210 [ 559.344856] ext4_bread+0x6e/0x1a0 [ 559.348383] ? ext4_getblk+0x450/0x450 [ 559.352262] ext4_append+0x14b/0x360 [ 559.355975] ext4_mkdir+0x531/0xc20 [ 559.359636] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 559.364309] ? security_inode_mkdir+0xd6/0x110 [ 559.368882] vfs_mkdir+0x3cf/0x610 [ 559.372421] SyS_mkdir+0x1b7/0x200 [ 559.375962] ? SyS_mkdirat+0x210/0x210 [ 559.379838] ? do_syscall_64+0x53/0x630 [ 559.384062] ? SyS_mkdirat+0x210/0x210 [ 559.387937] do_syscall_64+0x1eb/0x630 [ 559.391824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 559.396661] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 559.401842] RIP: 0033:0x458047 [ 559.405107] RSP: 002b:00007f9d45dd1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 559.412817] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 559.420072] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 559.427336] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 559.434590] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 559.441846] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 559.449133] CPU: 1 PID: 24184 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 559.456156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.465521] Call Trace: [ 559.468120] dump_stack+0x138/0x19c [ 559.472197] should_fail.cold+0x10f/0x159 [ 559.476356] should_failslab+0xdb/0x130 [ 559.480456] kmem_cache_alloc+0x47/0x780 [ 559.484534] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 559.484546] __radix_tree_create+0x337/0x4d0 [ 559.484562] page_cache_tree_insert+0xa7/0x2d0 [ 559.484574] ? file_check_and_advance_wb_err+0x380/0x380 [ 559.484585] ? debug_smp_processor_id+0x1c/0x20 [ 559.484600] __add_to_page_cache_locked+0x2a7/0x7e0 [ 559.484611] ? find_lock_entry+0x3f0/0x3f0 [ 559.484625] add_to_page_cache_lru+0xf4/0x310 [ 559.484638] ? add_to_page_cache_locked+0x40/0x40 [ 559.494668] ? __page_cache_alloc+0xdd/0x3e0 [ 559.494682] do_read_cache_page+0x64e/0xfc0 [ 559.494695] ? blkdev_writepages+0xd0/0xd0 [ 559.494708] ? find_get_pages_contig+0xaa0/0xaa0 [ 559.494717] ? blkdev_get+0xb0/0x8e0 [ 559.494727] ? dput.part.0+0x170/0x750 [ 559.494737] ? bd_may_claim+0xd0/0xd0 [ 559.494747] ? path_put+0x50/0x70 [ 559.494755] ? lookup_bdev.part.0+0xe1/0x160 [ 559.494766] read_cache_page_gfp+0x6e/0x90 [ 559.494779] btrfs_read_disk_super+0xdd/0x440 [ 559.494802] btrfs_scan_one_device+0xc6/0x400 [ 559.514679] ? device_list_add+0x8d0/0x8d0 [ 559.514693] ? __free_pages+0x54/0x90 [ 559.514702] ? free_pages+0x46/0x50 [ 559.514716] btrfs_mount+0x2e3/0x2b14 [ 559.514726] ? lock_downgrade+0x6e0/0x6e0 [ 559.514733] ? find_held_lock+0x35/0x130 [ 559.514745] ? pcpu_alloc+0x3af/0x1060 [ 559.514761] ? btrfs_remount+0x11f0/0x11f0 [ 559.514777] ? rcu_read_lock_sched_held+0x110/0x130 [ 559.514802] ? __lockdep_init_map+0x10c/0x570 [ 559.523621] mount_fs+0x9d/0x2a7 [ 559.523636] vfs_kern_mount.part.0+0x5e/0x3d0 [ 559.523645] ? find_held_lock+0x35/0x130 [ 559.523664] vfs_kern_mount+0x40/0x60 [ 559.523679] btrfs_mount+0x3ce/0x2b14 [ 559.523687] ? lock_downgrade+0x6e0/0x6e0 [ 559.523694] ? find_held_lock+0x35/0x130 [ 559.523707] ? pcpu_alloc+0x3af/0x1060 [ 559.523723] ? btrfs_remount+0x11f0/0x11f0 [ 559.523738] ? rcu_read_lock_sched_held+0x110/0x130 [ 559.523755] ? __lockdep_init_map+0x10c/0x570 [ 559.523766] ? __lockdep_init_map+0x10c/0x570 [ 559.523778] mount_fs+0x9d/0x2a7 [ 559.533911] vfs_kern_mount.part.0+0x5e/0x3d0 [ 559.533926] do_mount+0x417/0x27d0 [ 559.533934] ? copy_mount_options+0x5c/0x2f0 [ 559.533944] ? rcu_read_lock_sched_held+0x110/0x130 [ 559.533956] ? copy_mount_string+0x40/0x40 [ 559.533968] ? copy_mount_options+0x1fe/0x2f0 [ 559.533981] SyS_mount+0xab/0x120 [ 559.533988] ? copy_mnt_ns+0x8c0/0x8c0 [ 559.534001] do_syscall_64+0x1eb/0x630 [ 559.534009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 559.534026] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 559.723133] RIP: 0033:0x45b69a 13:18:30 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000000c0)={0x6, 0x80000000000200}) ioctl$VHOST_SET_FEATURES(r0, 0x40084d00, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) [ 559.726605] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 559.734328] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 559.741624] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 559.749173] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 559.756529] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 559.763800] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:30 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x88f16fd063307b15, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0x6, 0xfffffffffffffff7, 0x800, 0x400, 0x10, 0x3}) r1 = socket$inet6(0xa, 0x800, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0x2, 0x0, &(0x7f0000000180)) 13:18:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x100040, 0x0, 0x0, 0x9b}, {0x80000006}]}, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x50) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x1f, 0x7, [0x5, 0x101, 0x2e, 0x6, 0x8, 0x5, 0x7]}, &(0x7f00000001c0)=0x16) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000280)=0x9a6, &(0x7f00000002c0)=0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r2, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140), 0x4) fcntl$setstatus(r0, 0x4, 0x4000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={r3, 0x7ff, 0x20}, &(0x7f0000000240)=0x18) 13:18:30 executing program 1 (fault-call:2 fault-nth:72): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:30 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) readv(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/177, 0xb1}], 0x1) sendfile(r0, r0, 0x0, 0x2000005) [ 560.048576] FAULT_INJECTION: forcing a failure. [ 560.048576] name failslab, interval 1, probability 0, space 0, times 0 [ 560.092394] CPU: 1 PID: 24228 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 560.099574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.109122] Call Trace: [ 560.109149] dump_stack+0x138/0x19c [ 560.109167] should_fail.cold+0x10f/0x159 [ 560.109182] should_failslab+0xdb/0x130 [ 560.109193] kmem_cache_alloc_node+0x56/0x780 [ 560.109202] ? mount_fs+0x9d/0x2a7 [ 560.109218] create_task_io_context+0x31/0x3d0 [ 560.109230] generic_make_request_checks+0x1512/0x1ad0 [ 560.109241] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.109254] ? blk_cleanup_queue+0x610/0x610 [ 560.115469] ? trace_hardirqs_on+0x10/0x10 [ 560.115486] generic_make_request+0x7d/0xa50 [ 560.115496] ? save_trace+0x290/0x290 [ 560.115509] ? blk_queue_enter+0x520/0x520 [ 560.168052] ? find_held_lock+0x35/0x130 [ 560.172215] ? guard_bio_eod+0x161/0x530 [ 560.176354] submit_bio+0x1a5/0x3f0 [ 560.179973] ? submit_bio+0x1a5/0x3f0 [ 560.183848] ? generic_make_request+0xa50/0xa50 [ 560.188515] ? guard_bio_eod+0x1fd/0x530 [ 560.192562] submit_bh_wbc+0x550/0x720 [ 560.196462] block_read_full_page+0x7a5/0x960 [ 560.200950] ? set_init_blocksize+0x220/0x220 [ 560.205519] ? __bread_gfp+0x290/0x290 [ 560.209499] ? add_to_page_cache_lru+0x159/0x310 [ 560.214252] ? add_to_page_cache_locked+0x40/0x40 [ 560.219187] blkdev_readpage+0x1d/0x30 [ 560.223067] do_read_cache_page+0x674/0xfc0 [ 560.227373] ? blkdev_writepages+0xd0/0xd0 [ 560.231598] ? find_get_pages_contig+0xaa0/0xaa0 [ 560.236439] ? blkdev_get+0xb0/0x8e0 [ 560.240140] ? dput.part.0+0x170/0x750 [ 560.244011] ? bd_may_claim+0xd0/0xd0 [ 560.247795] ? path_put+0x50/0x70 [ 560.251244] ? lookup_bdev.part.0+0xe1/0x160 [ 560.255647] read_cache_page_gfp+0x6e/0x90 [ 560.259871] btrfs_read_disk_super+0xdd/0x440 [ 560.264452] btrfs_scan_one_device+0xc6/0x400 [ 560.268938] ? device_list_add+0x8d0/0x8d0 [ 560.273166] ? __free_pages+0x54/0x90 [ 560.276968] ? free_pages+0x46/0x50 [ 560.280600] btrfs_mount+0x2e3/0x2b14 [ 560.284384] ? lock_downgrade+0x6e0/0x6e0 [ 560.288518] ? find_held_lock+0x35/0x130 [ 560.292581] ? pcpu_alloc+0x3af/0x1060 [ 560.296654] ? btrfs_remount+0x11f0/0x11f0 [ 560.300879] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.305893] ? __lockdep_init_map+0x10c/0x570 [ 560.310561] mount_fs+0x9d/0x2a7 [ 560.313918] vfs_kern_mount.part.0+0x5e/0x3d0 [ 560.318484] ? find_held_lock+0x35/0x130 [ 560.322531] vfs_kern_mount+0x40/0x60 [ 560.326323] btrfs_mount+0x3ce/0x2b14 [ 560.330372] ? lock_downgrade+0x6e0/0x6e0 [ 560.334507] ? find_held_lock+0x35/0x130 [ 560.338641] ? pcpu_alloc+0x3af/0x1060 [ 560.342521] ? btrfs_remount+0x11f0/0x11f0 [ 560.346793] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.351974] ? __lockdep_init_map+0x10c/0x570 [ 560.356560] ? __lockdep_init_map+0x10c/0x570 [ 560.361044] mount_fs+0x9d/0x2a7 [ 560.364399] vfs_kern_mount.part.0+0x5e/0x3d0 [ 560.369603] do_mount+0x417/0x27d0 [ 560.373126] ? copy_mount_options+0x5c/0x2f0 [ 560.377516] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.382526] ? copy_mount_string+0x40/0x40 [ 560.386750] ? copy_mount_options+0x1fe/0x2f0 [ 560.391315] SyS_mount+0xab/0x120 [ 560.394765] ? copy_mnt_ns+0x8c0/0x8c0 [ 560.398646] do_syscall_64+0x1eb/0x630 [ 560.402692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 560.407541] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 560.412720] RIP: 0033:0x45b69a [ 560.415996] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 560.423702] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 560.430973] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 560.438227] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 560.445478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 560.452742] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:32 executing program 1 (fault-call:2 fault-nth:73): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:32 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r1, 0x2}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000007000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:18:32 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x99, 0x4000) write$nbd(r0, &(0x7f00000000c0)={0x67446698, 0x1000000000000001, 0x0, 0x4, 0x4, "3ad4399d73ad5e7cbccbddc8aaa975bde4647b5c00"/30}, 0x9055209f57dc66a4) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223, 0x3e8}, @local, {[@lsrr={0x83, 0x3, 0x5ef}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) 13:18:32 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8240, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0xfffffffffffffde1) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) poll(&(0x7f0000000000), 0x0, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 13:18:32 executing program 3 (fault-call:8 fault-nth:0): clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0fc5a1856c74aec4ab82c7d803f7eaa0eee200ffa0955a6d2efd657127c8b6985527de8617a2ce4070ef2c6f3148c7b9098fd0cd5a47c06f64a13cd80d0a552390b7f8b8502f0cc19c245d3eb77737632c7e5015876bf6f286700d979b7545c0718c9cbe7d1a8d2d049f3e954c33c28fffcb0d650be1386bb4d0f25fbf2a0d0160475817b81c5cc817eed6962f21cbc92710bf85519c1e35045846992bfb9e4d00e44b940832d32fe28b5a444ae1e590dd04fdbb3d3ff96f1321c89df5f3df6e7bb7cce76c8594ab68548b188bfe8188e07848263d6b7e9c0d17") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:32 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000, 0x1018, 0x7ff, {"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"}}, {0x0, "c3a89858671d5c4be0b28b51a96b2843a4fc82ef9311541e42959052fcab544fb73485e02e6e978fa12538bf6aedeefc10dd9448dbbef3ef986753d5a7b7856babe01b368f484a1c9561de5db08788e5aba79439a4c43e2514e1231eda2a3bd4eac36c0a33c7f04d017fdb949a1210442246"}}, &(0x7f0000001140)=""/4096, 0x108c, 0x1000}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000040)={0x0, {0x0, 0x6}}) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400000, 0x20) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$input_event(r2, &(0x7f00000000c0)={{r3, r4/1000+30000}, 0x1f, 0x5, 0xe278}, 0x18) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000004500)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000004380)={0x50, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x50}}, 0x0) [ 562.259333] FAULT_INJECTION: forcing a failure. [ 562.259333] name failslab, interval 1, probability 0, space 0, times 0 [ 562.319823] CPU: 0 PID: 24253 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 562.326977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.336627] Call Trace: [ 562.339232] dump_stack+0x138/0x19c [ 562.342878] should_fail.cold+0x10f/0x159 [ 562.347050] should_failslab+0xdb/0x130 [ 562.351041] kmem_cache_alloc_node+0x56/0x780 [ 562.351053] ? mount_fs+0x9d/0x2a7 [ 562.351072] create_task_io_context+0x31/0x3d0 [ 562.351084] generic_make_request_checks+0x1512/0x1ad0 13:18:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) bind$inet(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) socket$packet(0x11, 0x3, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_destroy(r2) syz_genetlink_get_family_id$nbd(0x0) socket$inet6(0xa, 0x0, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 13:18:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0xf5, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$int_in(r3, 0x800040c004500a, &(0x7f0000000040)=0x80000002) flistxattr(r2, &(0x7f0000000200)=""/4, 0x4) getsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) read$FUSE(r3, &(0x7f0000000240), 0x1000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000ffb000/0x3000)=nil) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") [ 562.359201] ? rcu_read_lock_sched_held+0x110/0x130 [ 562.359218] ? blk_cleanup_queue+0x610/0x610 [ 562.359233] ? trace_hardirqs_on+0x10/0x10 [ 562.382795] generic_make_request+0x7d/0xa50 [ 562.387312] ? save_trace+0x290/0x290 [ 562.391123] ? blk_queue_enter+0x520/0x520 [ 562.395377] ? find_held_lock+0x35/0x130 [ 562.399458] ? guard_bio_eod+0x161/0x530 [ 562.403563] submit_bio+0x1a5/0x3f0 [ 562.407229] ? submit_bio+0x1a5/0x3f0 [ 562.411385] ? generic_make_request+0xa50/0xa50 [ 562.416065] ? guard_bio_eod+0x1fd/0x530 [ 562.420154] submit_bh_wbc+0x550/0x720 [ 562.424058] block_read_full_page+0x7a5/0x960 [ 562.428576] ? set_init_blocksize+0x220/0x220 [ 562.433432] ? __bread_gfp+0x290/0x290 [ 562.437331] ? add_to_page_cache_lru+0x159/0x310 [ 562.442103] ? add_to_page_cache_locked+0x40/0x40 [ 562.447055] blkdev_readpage+0x1d/0x30 [ 562.451047] do_read_cache_page+0x674/0xfc0 [ 562.454127] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 562.455384] ? blkdev_writepages+0xd0/0xd0 [ 562.455404] ? find_get_pages_contig+0xaa0/0xaa0 [ 562.455414] ? blkdev_get+0xb0/0x8e0 [ 562.455425] ? dput.part.0+0x170/0x750 [ 562.455435] ? bd_may_claim+0xd0/0xd0 [ 562.486474] ? path_put+0x50/0x70 [ 562.489942] ? lookup_bdev.part.0+0xe1/0x160 [ 562.494447] read_cache_page_gfp+0x6e/0x90 [ 562.498691] btrfs_read_disk_super+0xdd/0x440 [ 562.503318] btrfs_scan_one_device+0xc6/0x400 [ 562.507826] ? device_list_add+0x8d0/0x8d0 [ 562.512067] ? __free_pages+0x54/0x90 [ 562.515905] ? free_pages+0x46/0x50 [ 562.519561] btrfs_mount+0x2e3/0x2b14 [ 562.523469] ? lock_downgrade+0x6e0/0x6e0 [ 562.527661] ? find_held_lock+0x35/0x130 [ 562.531914] ? pcpu_alloc+0x3af/0x1060 [ 562.535989] ? btrfs_remount+0x11f0/0x11f0 [ 562.540230] ? rcu_read_lock_sched_held+0x110/0x130 [ 562.545267] ? __lockdep_init_map+0x10c/0x570 [ 562.549768] mount_fs+0x9d/0x2a7 [ 562.553134] vfs_kern_mount.part.0+0x5e/0x3d0 [ 562.557784] ? find_held_lock+0x35/0x130 [ 562.561944] vfs_kern_mount+0x40/0x60 [ 562.565739] btrfs_mount+0x3ce/0x2b14 [ 562.569828] ? lock_downgrade+0x6e0/0x6e0 [ 562.573980] ? find_held_lock+0x35/0x130 [ 562.578036] ? pcpu_alloc+0x3af/0x1060 [ 562.582102] ? btrfs_remount+0x11f0/0x11f0 [ 562.586335] ? rcu_read_lock_sched_held+0x110/0x130 [ 562.591352] ? __lockdep_init_map+0x10c/0x570 [ 562.596023] ? __lockdep_init_map+0x10c/0x570 [ 562.600515] mount_fs+0x9d/0x2a7 [ 562.603900] vfs_kern_mount.part.0+0x5e/0x3d0 [ 562.608388] do_mount+0x417/0x27d0 [ 562.612010] ? retint_kernel+0x2d/0x2d [ 562.615902] ? copy_mount_string+0x40/0x40 [ 562.620222] ? copy_mount_options+0x195/0x2f0 [ 562.624712] ? copy_mount_options+0x1fe/0x2f0 [ 562.629309] SyS_mount+0xab/0x120 [ 562.633012] ? copy_mnt_ns+0x8c0/0x8c0 [ 562.636906] do_syscall_64+0x1eb/0x630 [ 562.640873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 562.645724] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 562.651001] RIP: 0033:0x45b69a [ 562.654211] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 562.662527] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 562.669821] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 562.677171] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 562.684441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 562.691704] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:32 executing program 0: socketpair(0x3, 0x802, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xee}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="13008f0074c7747963b9ae2243b36f20d79c92e64c76acadf4765cf99990e7b227a72823fe4179cb617ab0b9766db9990651e5bf6b2d2e1d4e0fa7e2cd8770c3e0996c79ad33f68b349622cf95493f9d27c78cc35daef13dda59773decd85fc82852c6746ac00e0a12fc08d599c5fcacb8b6ce13a39847c8cbd9a6d4"], 0x97) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, &(0x7f00000000c0)) [ 562.811333] print_req_error: I/O error, dev loop0, sector 128 13:18:33 executing program 1 (fault-call:2 fault-nth:74): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:33 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x0, 0x0, 0x0}) read(r0, &(0x7f0000000080)=""/4, 0x4) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x7, 0x82) getresuid(&(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)=0x0) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000280)={0x3, @null, r2}) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x125801) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000100)={0x1, 0x7}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000040)=0x9, 0x4) 13:18:33 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40400, 0x0) read$FUSE(r0, &(0x7f0000000100), 0x1000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0x800, 0x1f, 0x80000001, 0x2, 0x6}) 13:18:33 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2040, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000180)=0x5b8d26df) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r2, @ANYBLOB="040026bd7000fedbdf250600000014000200080003000000000008000b000a00000048000200080002004e21000014000100000000000000000000000000000000010800490001000000080001000000080004000100000008000800f3000000080004000800000020000214cd0c3f5bb88036cea100080002004e20000014000100"/146], 0x90}, 0x1, 0x0, 0x0, 0x4000001}, 0x10) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07041dfffd946fa2830020200a0009000108000000680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18b0400000000000000db2406b208d37ed01cc0", 0x4c}], 0x1}, 0x0) write$ppp(r0, &(0x7f0000000200)="e7c6cb628e8da69a7695bafbe5185eba28eb5675e93877de18cd93cf835b482e7a716223890a38f8b334baee3af3e300bb96d612e405786ff28a60875466b7cf4ee2e0333ad3100ea35ceabc47e7ff95ea765f09af90687aa6dc57644d8b45af52a1c9375245eb4f01fa2c97dc6ea455466bc9005a5d0d317bba12bd8e5219e21b27c30235e604f7980204ebac2ae06f8daef603bcc4b8dafd451842af63ab01467a2ddafd71034ba09ecfe3943b36c54c7e97edd68caf126f1bb0c4a9d5bff7a8fb71418aea9febfdeb0f9400ba069ed3215618624accd2", 0xd8) 13:18:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) io_setup(0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) accept4(r1, &(0x7f0000000100)=@alg, &(0x7f0000000180)=0x80, 0x80000) listen(r1, 0x5) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$UHID_CREATE2(r3, &(0x7f0000000340)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00', 0x2b, 0x3, 0xffffffff, 0x0, 0x9, 0x600000000000, "8c40521f24a58e710081725eaf66042d4f6f11f8dcd9692cc94cefd34c31e87592df49c277bf70fd7db800"}, 0x143) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x80000001, 0x0, 0x0, 0x1000000000054}, 0x98) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x100000000, 0x42500) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r4, r5}}, 0x18) accept4(r5, &(0x7f0000000200)=@in={0x2, 0x0, @multicast2}, &(0x7f00000004c0)=0x80, 0x80000) [ 563.009734] FAULT_INJECTION: forcing a failure. [ 563.009734] name failslab, interval 1, probability 0, space 0, times 0 [ 563.021268] CPU: 0 PID: 24300 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 563.028296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.037654] Call Trace: [ 563.040282] dump_stack+0x138/0x19c [ 563.043946] should_fail.cold+0x10f/0x159 [ 563.048403] ? __lock_is_held+0xb6/0x140 [ 563.052479] ? mempool_free+0x1d0/0x1d0 [ 563.052503] should_failslab+0xdb/0x130 [ 563.052516] kmem_cache_alloc+0x47/0x780 [ 563.052530] ? mempool_free+0x1d0/0x1d0 [ 563.052539] mempool_alloc_slab+0x47/0x60 [ 563.052548] mempool_alloc+0x13a/0x300 [ 563.052564] ? remove_element.isra.0+0x1b0/0x1b0 [ 563.052575] ? find_held_lock+0x35/0x130 [ 563.052587] ? create_empty_buffers+0x2cf/0x480 [ 563.052598] ? save_trace+0x290/0x290 [ 563.079522] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 563.082708] bio_alloc_bioset+0x368/0x680 [ 563.082724] ? bvec_alloc+0x2e0/0x2e0 [ 563.082741] submit_bh_wbc+0xf6/0x720 [ 563.082752] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 563.082763] block_read_full_page+0x7a5/0x960 [ 563.082774] ? set_init_blocksize+0x220/0x220 [ 563.082785] ? __bread_gfp+0x290/0x290 [ 563.082796] ? add_to_page_cache_lru+0x159/0x310 [ 563.082806] ? add_to_page_cache_locked+0x40/0x40 [ 563.082819] blkdev_readpage+0x1d/0x30 [ 563.110049] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 563.112701] do_read_cache_page+0x674/0xfc0 [ 563.112716] ? blkdev_writepages+0xd0/0xd0 [ 563.112731] ? find_get_pages_contig+0xaa0/0xaa0 [ 563.112742] ? blkdev_get+0xb0/0x8e0 [ 563.182540] ? dput.part.0+0x170/0x750 [ 563.186425] ? bd_may_claim+0xd0/0xd0 [ 563.190220] ? path_put+0x50/0x70 [ 563.193656] ? lookup_bdev.part.0+0xe1/0x160 [ 563.198048] read_cache_page_gfp+0x6e/0x90 [ 563.202371] btrfs_read_disk_super+0xdd/0x440 [ 563.206857] btrfs_scan_one_device+0xc6/0x400 [ 563.211350] ? device_list_add+0x8d0/0x8d0 [ 563.215580] ? __free_pages+0x54/0x90 [ 563.219363] ? free_pages+0x46/0x50 [ 563.222976] btrfs_mount+0x2e3/0x2b14 [ 563.226764] ? lock_downgrade+0x6e0/0x6e0 [ 563.230992] ? find_held_lock+0x35/0x130 [ 563.235037] ? pcpu_alloc+0x3af/0x1060 [ 563.238911] ? btrfs_remount+0x11f0/0x11f0 [ 563.243238] ? rcu_read_lock_sched_held+0x110/0x130 [ 563.248243] ? __lockdep_init_map+0x10c/0x570 [ 563.252728] mount_fs+0x9d/0x2a7 [ 563.256095] vfs_kern_mount.part.0+0x5e/0x3d0 [ 563.260570] ? find_held_lock+0x35/0x130 [ 563.264628] vfs_kern_mount+0x40/0x60 [ 563.268439] btrfs_mount+0x3ce/0x2b14 [ 563.272227] ? lock_downgrade+0x6e0/0x6e0 [ 563.276355] ? find_held_lock+0x35/0x130 [ 563.280398] ? pcpu_alloc+0x3af/0x1060 [ 563.284275] ? btrfs_remount+0x11f0/0x11f0 [ 563.288495] ? rcu_read_lock_sched_held+0x110/0x130 [ 563.293499] ? __lockdep_init_map+0x10c/0x570 [ 563.298019] ? __lockdep_init_map+0x10c/0x570 [ 563.302501] mount_fs+0x9d/0x2a7 [ 563.305861] vfs_kern_mount.part.0+0x5e/0x3d0 [ 563.310350] do_mount+0x417/0x27d0 [ 563.313874] ? copy_mount_options+0x5c/0x2f0 [ 563.318267] ? rcu_read_lock_sched_held+0x110/0x130 [ 563.323267] ? copy_mount_string+0x40/0x40 [ 563.327503] ? copy_mount_options+0x1fe/0x2f0 [ 563.332001] SyS_mount+0xab/0x120 [ 563.335472] ? copy_mnt_ns+0x8c0/0x8c0 [ 563.339356] do_syscall_64+0x1eb/0x630 [ 563.343497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 563.348330] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 563.353527] RIP: 0033:0x45b69a 13:18:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x200000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001000)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x98) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, 0xe8) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000001000)=""/144, &(0x7f0000001ffc)=0x90) [ 563.356701] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 563.364653] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 563.372077] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 563.379338] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 563.386590] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 563.393937] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x9, 0x200) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x8001, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10001}], 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x2f, @loopback, 0x4e23, 0x1, 'wlc\x00', 0x4, 0x4, 0x14}, {@remote, 0x4e22, 0x1, 0x3, 0x3, 0x100}}, 0x44) [ 563.668992] IPVS: set_ctl: invalid protocol: 47 127.0.0.1:20003 [ 563.751120] IPVS: set_ctl: invalid protocol: 47 127.0.0.1:20003 13:18:35 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x3, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000140)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'veth0_to_bridge\x00', 0xc001}) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x40002300001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="7800000089f0bed6ef10323bbef8616f830cff3bea343edaf2fbb84c71edcf6efde03c3bf69ce92f83138d2401500157cd5409df0a4e2bd610d7f03b03a179bd15ea95054d2c1befbc51082d34e81a215ae7b9762cd7d2fa256e691a6108d4f279689d779bc1be36416a06a53f4c43ea1cb675bde1d38094b9f943ad"], &(0x7f0000000040)=0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e24, @loopback}]}, &(0x7f0000000280)=0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="623ad882c0d98a0d7ed2fa6843dd3c22", 0x0, 0x0, 0x0, 0x4}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f00000000c0), 0x3bb1) write$cgroup_type(r4, &(0x7f00000001c0)='threaded\x00', 0xd47c4e) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x0, r5}) tkill(r2, 0x1) 13:18:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000001000010800"/20, @ANYRES32=0x0, @ANYRES32], 0x3}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000100)=r1) socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=r1) 13:18:35 executing program 1 (fault-call:2 fault-nth:75): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x440, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x8002, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r2, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8001}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7d}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x5c}}, 0xc000) socket$inet(0x10, 0x2, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x2, 0x0) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, &(0x7f0000000100)=0x6) sendmsg(r0, &(0x7f0000000400)={0x0, 0x308, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000190007041dfffd946f610500020000001f00000000000800080006000404ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x100000000000026e}, 0x400) 13:18:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400042, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0x9f, 0x9}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f00000003c0)=0xe8) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x20808, &(0x7f0000000440)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@mode={'mode', 0x3d, 0x290}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x8}}], [{@euid_gt={'euid>', r2}}, {@obj_role={'obj_role', 0x3d, 'btrfs\x00'}}, {@uid_gt={'uid>', r3}}, {@obj_type={'obj_type', 0x3d, '/dev/dlm_plock\x00'}}, {@obj_user={'obj_user', 0x3d, '\'^+:'}}]}) syz_open_dev$sndctrl(&(0x7f00000005c0)='/dev/snd/controlC#\x00', 0x200, 0x0) 13:18:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0004ff0b0b2ed1092051ffff75070098394cda040089cbdf3a2c040000710e1300"/46], 0x2e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") read(r0, &(0x7f00000005c0)=""/231, 0x1da) r2 = syz_open_pts(r0, 0x42100) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0xffffffffffffffc1) r3 = dup2(r2, r0) ioctl$TCXONC(r3, 0x540a, 0x3) 13:18:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'veth0_to_bridge\x00', &(0x7f0000000040)=@ethtool_cmd={0x14}}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10040, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0x71a0, 0x80000000, 0x40, 0x7, 0x0, 0x10000, 0x1}, 0xc) [ 565.383862] FAULT_INJECTION: forcing a failure. [ 565.383862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 565.396338] CPU: 1 PID: 24342 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 565.403451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.413075] Call Trace: [ 565.415770] dump_stack+0x138/0x19c [ 565.419611] should_fail.cold+0x10f/0x159 [ 565.423780] __alloc_pages_nodemask+0x1d6/0x7a0 [ 565.428461] ? fs_reclaim_acquire+0x20/0x20 13:18:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000300)=""/183, &(0x7f00000003c0)=0xb7) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000000)='netdevsim0\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={0x0, 0xfffffffffffffff7}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={r2, 0x68, "de8d085c1a0955402c6f5abba37a39836fe20dada3ed8a8f588f51a7bf80f15df5fcf82621c08157a36997c96fc0243a8911ba1c686740fe48276a6fcd8bff381cd996a27a6be18250ac1dce9e23b7041ec206fa952db1e6a8a8ae2144904a02eae7ca8d29a2962b"}, &(0x7f00000002c0)=0x70) mlockall(0x3) [ 565.432884] ? __alloc_pages_slowpath+0x2930/0x2930 [ 565.432904] cache_grow_begin+0x80/0x410 [ 565.432917] kmem_cache_alloc_node_trace+0x69a/0x770 [ 565.432928] ? mutex_unlock+0xd/0x10 [ 565.432940] ? btrfs_scan_one_device+0xeb/0x400 [ 565.455733] __kmalloc_node+0x3d/0x80 [ 565.459722] kvmalloc_node+0x93/0xe0 [ 565.463547] btrfs_mount+0xf88/0x2b14 [ 565.467445] ? lock_downgrade+0x6e0/0x6e0 [ 565.471752] ? find_held_lock+0x35/0x130 [ 565.475814] ? pcpu_alloc+0x3af/0x1060 [ 565.475836] ? btrfs_remount+0x11f0/0x11f0 13:18:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2, 0x1) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000002560b700fff0ffff0403fffffff300000a00000006"]) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)=ANY=[@ANYBLOB="22000000000000008d030000000000000000000000050000"]) [ 565.475853] ? rcu_read_lock_sched_held+0x110/0x130 [ 565.475874] ? __lockdep_init_map+0x10c/0x570 [ 565.475891] mount_fs+0x9d/0x2a7 [ 565.475904] vfs_kern_mount.part.0+0x5e/0x3d0 [ 565.475911] ? find_held_lock+0x35/0x130 [ 565.475922] vfs_kern_mount+0x40/0x60 [ 565.475932] btrfs_mount+0x3ce/0x2b14 [ 565.475940] ? lock_downgrade+0x6e0/0x6e0 [ 565.475947] ? find_held_lock+0x35/0x130 [ 565.513462] ? pcpu_alloc+0x3af/0x1060 [ 565.513484] ? btrfs_remount+0x11f0/0x11f0 [ 565.530247] ? rcu_read_lock_sched_held+0x110/0x130 [ 565.535294] ? __lockdep_init_map+0x10c/0x570 [ 565.539783] ? __lockdep_init_map+0x10c/0x570 [ 565.544351] mount_fs+0x9d/0x2a7 [ 565.547705] vfs_kern_mount.part.0+0x5e/0x3d0 [ 565.552202] do_mount+0x417/0x27d0 [ 565.555728] ? copy_mount_options+0x5c/0x2f0 [ 565.560129] ? rcu_read_lock_sched_held+0x110/0x130 [ 565.572440] ? copy_mount_string+0x40/0x40 [ 565.584213] ? copy_mount_options+0x1fe/0x2f0 [ 565.588697] SyS_mount+0xab/0x120 [ 565.592220] ? copy_mnt_ns+0x8c0/0x8c0 [ 565.596092] do_syscall_64+0x1eb/0x630 [ 565.599960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 565.604791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 565.610034] RIP: 0033:0x45b69a [ 565.613203] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 565.620894] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a 13:18:35 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 565.628233] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 565.635574] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 565.642911] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 565.650335] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x2) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x5c, &(0x7f0000000100)}, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r1, 0x1ff, 0x33a8c1bc, r0}) 13:18:38 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x3, 0x400) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x214, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40041}, 0x40) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x400) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000080)={0x0, 0x81, 0xffffffffffffac2b}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0xf) r4 = semget$private(0x0, 0x7, 0x0) semctl$SEM_INFO(r4, 0x7, 0x13, &(0x7f0000000140)=""/186) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000000c0)) 13:18:38 executing program 1 (fault-call:2 fault-nth:76): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10000, &(0x7f0000000080)="0adc1f123c123f319bd070") rmdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:38 executing program 4: r0 = timerfd_create(0x0, 0x2) unshare(0x400) timerfd_settime(r0, 0x0, &(0x7f00000a5ff0), 0x0) 13:18:38 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffb000/0x2000)=nil) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x18000, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000600)={0xa6, 0x29, 0x2, {0x2, [{{0x1, 0x1, 0x7}, 0xffff, 0x5, 0x7, './file0'}, {{0x0, 0x4, 0x7}, 0x1, 0x1, 0x7, './file0'}, {{0x20, 0x3, 0x3}, 0x7, 0x3b, 0x7, './file0'}, {{0x44, 0x1, 0x5}, 0x0, 0x4, 0x7, './file0'}, {{0x1, 0x4, 0x5}, 0xc4bf, 0x4970b9e, 0x7, './file0'}]}}, 0xa6) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = socket$inet(0x2, 0x80003, 0xab) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000740)=@broute={'broute\x00', 0x20, 0x2, 0x238, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x5, 0x800, 'bond0\x00', 'vlan0\x00', 'gre0\x00', 'gretap0\x00', @link_local, [], @broadcast, [], 0xb8, 0xb8, 0x100, [@ip={'ip\x00', 0x20}]}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}, {{{0x11, 0x0, 0x0, 'bond0\x00', 'ipddp0\x00', 'yam0\x00', 'eql\x00', @local, [], @broadcast, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@local}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x2b0) r3 = syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000003c0)={0x2, [0x7, 0x200]}, &(0x7f0000000400)=0x8) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x100) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20\x00', 0x600000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000300)=""/100) recvmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000040)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/75, 0x4b}, {&(0x7f0000000200)=""/118, 0x76}], 0x3}, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/70) [ 568.415953] FAULT_INJECTION: forcing a failure. [ 568.415953] name failslab, interval 1, probability 0, space 0, times 0 [ 568.427773] CPU: 1 PID: 24393 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 568.434814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.444189] Call Trace: [ 568.446797] dump_stack+0x138/0x19c [ 568.450533] should_fail.cold+0x10f/0x159 [ 568.454701] should_failslab+0xdb/0x130 [ 568.458698] kmem_cache_alloc_trace+0x2ec/0x790 [ 568.463474] btrfs_mount+0x1069/0x2b14 [ 568.467536] ? lock_downgrade+0x6e0/0x6e0 [ 568.471709] ? find_held_lock+0x35/0x130 [ 568.475755] ? pcpu_alloc+0x3af/0x1060 [ 568.479629] ? btrfs_remount+0x11f0/0x11f0 [ 568.483855] ? rcu_read_lock_sched_held+0x110/0x130 [ 568.488966] ? __lockdep_init_map+0x10c/0x570 [ 568.493465] mount_fs+0x9d/0x2a7 [ 568.496842] vfs_kern_mount.part.0+0x5e/0x3d0 [ 568.501576] ? find_held_lock+0x35/0x130 [ 568.505641] vfs_kern_mount+0x40/0x60 [ 568.509598] btrfs_mount+0x3ce/0x2b14 13:18:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/70) [ 568.513412] ? lock_downgrade+0x6e0/0x6e0 [ 568.517562] ? find_held_lock+0x35/0x130 [ 568.521625] ? pcpu_alloc+0x3af/0x1060 [ 568.525516] ? btrfs_remount+0x11f0/0x11f0 [ 568.530440] ? rcu_read_lock_sched_held+0x110/0x130 [ 568.535462] ? __lockdep_init_map+0x10c/0x570 [ 568.540581] ? __lockdep_init_map+0x10c/0x570 [ 568.545106] mount_fs+0x9d/0x2a7 [ 568.548628] vfs_kern_mount.part.0+0x5e/0x3d0 [ 568.553128] do_mount+0x417/0x27d0 [ 568.556675] ? copy_mount_options+0x5c/0x2f0 [ 568.561111] ? rcu_read_lock_sched_held+0x110/0x130 [ 568.566847] ? copy_mount_string+0x40/0x40 [ 568.571108] ? copy_mount_options+0x1fe/0x2f0 [ 568.575727] SyS_mount+0xab/0x120 [ 568.579169] ? copy_mnt_ns+0x8c0/0x8c0 [ 568.583071] do_syscall_64+0x1eb/0x630 [ 568.586947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 568.591898] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 568.597093] RIP: 0033:0x45b69a [ 568.600273] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 568.607983] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a 13:18:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/70) 13:18:38 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x242500) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000000c0)={0x1, 0x20, 0x8}) r1 = socket(0xc, 0x802, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) write(r1, &(0x7f00000002c0)="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", 0xfc) 13:18:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000a10008001b00000000000800110000000000"], 0x30}}, 0x0) [ 568.615275] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 568.622551] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 568.629928] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 568.637302] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:38 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800, 0x8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000080)={@empty, 0x0}, &(0x7f0000000140)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @multicast1, @loopback}, &(0x7f00000003c0)=0xc) sendmsg$nl_route(r1, &(0x7f0000000480)={&(0x7f0000000040), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@mpls_getnetconf={0x3c, 0x52, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x61}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_IFINDEX={0x8, 0x1, r3}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x20008001) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x2ad, 0x6) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/70) 13:18:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f0000000000)="0adcffff00003f319b0000000000007fff5a17b470") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 568.710478] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:18:39 executing program 1 (fault-call:2 fault-nth:77): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:39 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x4, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x5, 0x80000000, 0xae406c134af349c0, 0x0, 0x2707b1b9, 0x4, 0x0, 0xfffffffffffffff8, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000140)=r3, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 13:18:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='gretap0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x185000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x30000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x5c, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9a5c}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffff801}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x4008000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto(r0, &(0x7f0000000100)='s', 0x1, 0x0, 0x0, 0x0) r3 = dup(r0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000140), 0x4) close(r0) 13:18:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f00000000c0)={0x3ffff}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:18:39 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x52370696, 0x6}) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000080)="e56ea87e94d41d29dadfc21cb58cedf38311ea821a61d72c814706aecc7db0208c765bc02646eb55a5257eb75ec1794e670f90f457b8169e707a09388337a9846e3d70b5f6abafa85a25441278d318ee5caa18734a4a154d997113f657d0a1050dc822850c8a6c", 0x67) r1 = dup(r0) socket$key(0xf, 0x3, 0x2) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000100)={0x3, 0xddc9}) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000140)=0x5, 0x4) ioctl$KDSETMODE(r1, 0x4b3a, 0x2a4a) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x8000, @mcast2, 0x1ff}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0x4, 0x1, 0x7, 0x9, r2}, 0x10) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000002c0)=""/244) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000003c0)={0x1, 0x20}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r2, 0xa6, 0x7, 0x3, 0x1ff, 0x6}, &(0x7f0000000440)=0x14) ioctl$TIOCSCTTY(r1, 0x540e, 0x1f) setsockopt$inet_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000480)="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", 0xff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000580)={'vlan0\x00', {0x2, 0x4e23, @multicast2}}) write$tun(r1, &(0x7f00000005c0)={@void, @val={0x3, 0x84, 0x200, 0x10001, 0xffffffffffffffc1, 0x2}, @x25={0x3, 0x101, 0x0, "1a017e2a2002e12d61fdfeb8d878d02c9f73d092c6834a23ba1076f8a4dcd54793adf383fd6d0ba1ea7fb445af76c1b892be7b61633c5f26e8e375ce18be1748dfde22a5c632534e872ecaadddef5209f9464a4163ec723615d73d266ce91d76e7dfa014417051b961ec8d6c00f958a4d7ac5a7edb73e59945890bf1bcf2793cd46df6225584"}}, 0x93) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x68, r5, 0x108, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x21}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004050}, 0x8004) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000800)={0xf845, 0x9, 0x8204, 0xdd2, 0x1, 0x4, 0x2bc9e3f9, 0xffffffff, r3}, 0x20) ioctl$TIOCNOTTY(r0, 0x5422) r6 = syz_open_procfs(0x0, &(0x7f0000000840)='net/udplite6\x00') ioctl$TCGETA(r6, 0x5405, &(0x7f0000000880)) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f00000008c0)) bind$bt_l2cap(r0, &(0x7f0000000900)={0x1f, 0x401, {0x900, 0x66ee, 0x0, 0x3a1da1c3, 0x6, 0x1}, 0x5d, 0x3ff}, 0xe) syz_genetlink_get_family_id$net_dm(&(0x7f0000000940)='NET_DM\x00') r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000980)='/dev/autofs\x00', 0xb0000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r7, 0xc0206434, &(0x7f00000009c0)={0x8000, 0x0, 0x10000}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000a00)={r8, 0xffffffff}) 13:18:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 568.862383] FAULT_INJECTION: forcing a failure. [ 568.862383] name failslab, interval 1, probability 0, space 0, times 0 [ 568.901394] CPU: 0 PID: 24446 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 568.909600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.919449] Call Trace: [ 568.922133] dump_stack+0x138/0x19c [ 568.925993] should_fail.cold+0x10f/0x159 [ 568.930138] should_failslab+0xdb/0x130 [ 568.934114] kmem_cache_alloc_trace+0x2ec/0x790 [ 568.938778] ? __kmalloc_node+0x51/0x80 [ 568.942756] btrfs_mount+0x1001/0x2b14 [ 568.946632] ? lock_downgrade+0x6e0/0x6e0 [ 568.950780] ? find_held_lock+0x35/0x130 [ 568.954829] ? pcpu_alloc+0x3af/0x1060 [ 568.958711] ? btrfs_remount+0x11f0/0x11f0 [ 568.962940] ? rcu_read_lock_sched_held+0x110/0x130 [ 568.967951] ? __lockdep_init_map+0x10c/0x570 [ 568.972444] mount_fs+0x9d/0x2a7 [ 568.975885] vfs_kern_mount.part.0+0x5e/0x3d0 [ 568.980365] ? find_held_lock+0x35/0x130 [ 568.984444] vfs_kern_mount+0x40/0x60 [ 568.988255] btrfs_mount+0x3ce/0x2b14 [ 568.992076] ? lock_downgrade+0x6e0/0x6e0 [ 568.996232] ? find_held_lock+0x35/0x130 [ 569.000292] ? pcpu_alloc+0x3af/0x1060 [ 569.004263] ? btrfs_remount+0x11f0/0x11f0 [ 569.008497] ? rcu_read_lock_sched_held+0x110/0x130 [ 569.013504] ? __lockdep_init_map+0x10c/0x570 [ 569.018016] ? __lockdep_init_map+0x10c/0x570 [ 569.022692] mount_fs+0x9d/0x2a7 [ 569.026085] vfs_kern_mount.part.0+0x5e/0x3d0 [ 569.030577] do_mount+0x417/0x27d0 [ 569.034105] ? copy_mount_options+0x5c/0x2f0 [ 569.038561] ? rcu_read_lock_sched_held+0x110/0x130 [ 569.043588] ? copy_mount_string+0x40/0x40 [ 569.047933] ? copy_mount_options+0x1fe/0x2f0 [ 569.052696] SyS_mount+0xab/0x120 [ 569.056157] ? copy_mnt_ns+0x8c0/0x8c0 [ 569.060085] do_syscall_64+0x1eb/0x630 [ 569.064077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.082087] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 569.096240] RIP: 0033:0x45b69a [ 569.099450] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 569.107248] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 569.114522] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 569.121875] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 569.129396] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 569.136859] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x2) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000fddfff)) r2 = syz_open_pts(r0, 0x0) exit(0x3f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x0, 0xfffffffffffffffe, 0x80000001, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) 13:18:39 executing program 1 (fault-call:2 fault-nth:78): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000140)={0x8000, 0x0, [], {0x0, @reserved}}) ioctl(r1, 0xc6, &(0x7f00000002c0)="a96d18693878a4b9a0590d938c8d990f351c6c4a6fe1f79f2d06da84b0b804bb23dc0ce83c5ed8d2fb3aef4506d6bb668598b2210aa35b29a50520ba718d5a6f80eb9a1f52c0d049d953f28ba6bda35800f4600f624cbc0265593489a4baad9d15953decd151cef03cb11c73") getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e21, 0x2, @local, 0xfffffffffffffffc}}, 0x0, 0x80000001, 0xaf83, 0x2, 0x30}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x12}}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e20, 0x41, @empty, 0x1f}, @in6={0xa, 0x4e22, 0x7f, @loopback, 0x1f}], 0x74) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 569.319218] FAULT_INJECTION: forcing a failure. [ 569.319218] name failslab, interval 1, probability 0, space 0, times 0 [ 569.333448] CPU: 0 PID: 24472 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 569.340507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.349869] Call Trace: [ 569.352466] dump_stack+0x138/0x19c [ 569.356111] should_fail.cold+0x10f/0x159 [ 569.360279] should_failslab+0xdb/0x130 [ 569.364271] kmem_cache_alloc_trace+0x2ec/0x790 [ 569.364293] btrfs_mount+0x1069/0x2b14 [ 569.364313] ? lock_downgrade+0x6e0/0x6e0 [ 569.372842] ? find_held_lock+0x35/0x130 [ 569.372858] ? pcpu_alloc+0x3af/0x1060 [ 569.372876] ? btrfs_remount+0x11f0/0x11f0 [ 569.389742] ? rcu_read_lock_sched_held+0x110/0x130 [ 569.394881] ? __lockdep_init_map+0x10c/0x570 [ 569.399397] mount_fs+0x9d/0x2a7 [ 569.402793] vfs_kern_mount.part.0+0x5e/0x3d0 [ 569.407345] ? find_held_lock+0x35/0x130 [ 569.411440] vfs_kern_mount+0x40/0x60 [ 569.415262] btrfs_mount+0x3ce/0x2b14 [ 569.419178] ? lock_downgrade+0x6e0/0x6e0 [ 569.423451] ? find_held_lock+0x35/0x130 [ 569.427630] ? pcpu_alloc+0x3af/0x1060 [ 569.431544] ? btrfs_remount+0x11f0/0x11f0 [ 569.435806] ? rcu_read_lock_sched_held+0x110/0x130 [ 569.440860] ? __lockdep_init_map+0x10c/0x570 [ 569.445731] ? __lockdep_init_map+0x10c/0x570 [ 569.450794] mount_fs+0x9d/0x2a7 [ 569.454166] vfs_kern_mount.part.0+0x5e/0x3d0 [ 569.458663] do_mount+0x417/0x27d0 [ 569.462210] ? copy_mount_options+0x5c/0x2f0 [ 569.466650] ? rcu_read_lock_sched_held+0x110/0x130 [ 569.471677] ? copy_mount_string+0x40/0x40 [ 569.475920] ? copy_mount_options+0x1fe/0x2f0 [ 569.480538] SyS_mount+0xab/0x120 [ 569.484007] ? copy_mnt_ns+0x8c0/0x8c0 [ 569.487906] do_syscall_64+0x1eb/0x630 [ 569.491888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.496824] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 569.502011] RIP: 0033:0x45b69a [ 569.505191] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 569.512895] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 569.520400] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 569.527681] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 569.534956] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 569.542344] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffff9, 0x8000000000010003}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x100011) tkill(r1, 0x15) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff7, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000040)={0xc7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ptrace$cont(0x1f, r1, 0x0, 0x0) 13:18:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x74}, 0xb) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, 0x0, 0x14, 0x0, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000100)="0ad9535800d7922cdea92422404c60ca192daa8f1aee21fd41588108b3aaf434eb8fda546db562b695b1b365e0388e067bd7be5454f8698a3432f63b410212e6bf4868b9ecf5d089fe432d6bc6e36eda80e6d332628044a41302b9649422c41877e07fd8825d98746b813889f9fd92caa8c96a2ce442d7196031779583a4938ccf57c209ae77fc552dfd27127a0a90a21c750f70") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@nat={'nat\x00', 0x1b, 0x5, 0x5e8, 0x160, 0x2a0, 0x0, 0x160, 0x0, 0x518, 0x518, 0x518, 0x518, 0x518, 0x5, &(0x7f0000000040), {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@mh={0x28, 'mh\x00', 0x0, {0x20, 0x1f, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x8, @ipv4=@remote, @ipv6=@dev={0xfe, 0x80, [], 0x19}, @port=0x80000000, @port=0x4e24}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x4, 0x6, 0xffffffffcc5ae8bb, 0x2a, 0x2}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x10, @ipv6=@loopback, @ipv4=@multicast1, @port=0x4e21, @port=0x4e24}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1e}, @loopback, [0x0, 0xff000000, 0xff000000, 0xff0000ff], [0xffffffff, 0xffffffff, 0xffffff00, 0xff], 'ifb0\x00', 'bond_slave_1\x00', {0xff}, {0xff}, 0x3c, 0x1, 0x7, 0x40}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x4, 0xfffffffffffffffb}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x8, 0x3, 0x1, [0x0, 0x1400, 0x327, 0x6, 0x5, 0x3ff, 0xffffffff, 0x9, 0x80000000, 0x275, 0x1f, 0x9, 0x40, 0x3d9, 0x5, 0xc013], 0xa}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0xc0, 0xc8, 0x1}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x7f}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x648) 13:18:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) 13:18:41 executing program 1 (fault-call:2 fault-nth:79): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400041, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x2, 0x8, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="4cee43c47eb55337a9373748aaa14cb7"}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:41 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x8000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r2, 0x600, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x8, 0x7}}, 0x10) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x6, 0xfa00, {0xffffffffffffffff, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x3, @mcast1}, {0xa, 0x4e24, 0xd3, @mcast1, 0x1}, r4, 0x1}}, 0x48) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000200)={0x0, 0xfffffffffffffffa, 0x4, &(0x7f00000001c0)=0xf4}) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000040)={r3}) 13:18:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100)=0x10001, 0x4) [ 571.811832] FAULT_INJECTION: forcing a failure. [ 571.811832] name failslab, interval 1, probability 0, space 0, times 0 [ 571.841690] CPU: 1 PID: 24493 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 571.848848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.858212] Call Trace: [ 571.860825] dump_stack+0x138/0x19c [ 571.864491] should_fail.cold+0x10f/0x159 [ 571.868665] should_failslab+0xdb/0x130 [ 571.872675] kmem_cache_alloc_trace+0x2ec/0x790 [ 571.877359] btrfs_mount+0x1069/0x2b14 [ 571.881250] ? lock_downgrade+0x6e0/0x6e0 [ 571.885414] ? btrfs_remount+0x11f0/0x11f0 [ 571.889660] ? rcu_read_lock_sched_held+0x110/0x130 [ 571.894700] ? __lockdep_init_map+0x10c/0x570 [ 571.899231] mount_fs+0x9d/0x2a7 [ 571.902704] vfs_kern_mount.part.0+0x5e/0x3d0 [ 571.907209] ? find_held_lock+0x35/0x130 [ 571.911368] vfs_kern_mount+0x40/0x60 [ 571.915178] btrfs_mount+0x3ce/0x2b14 [ 571.918987] ? lock_downgrade+0x6e0/0x6e0 [ 571.923244] ? find_held_lock+0x35/0x130 [ 571.927309] ? pcpu_alloc+0x3af/0x1060 [ 571.931409] ? btrfs_remount+0x11f0/0x11f0 [ 571.935755] ? rcu_read_lock_sched_held+0x110/0x130 [ 571.940899] ? __lockdep_init_map+0x10c/0x570 [ 571.945417] ? __lockdep_init_map+0x10c/0x570 [ 571.949975] mount_fs+0x9d/0x2a7 [ 571.953351] vfs_kern_mount.part.0+0x5e/0x3d0 [ 571.957866] do_mount+0x417/0x27d0 13:18:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100)=0x10001, 0x4) 13:18:42 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x200240, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001900)=""/4096}) r1 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) r2 = gettid() accept(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000000c0)=0x80) ioctl$sock_ax25_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@default, @bcast, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) timer_create(0x0, &(0x7f00000018c0)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) dup2(r4, r1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") tkill(r2, 0x15) [ 571.961417] ? copy_mount_options+0x5c/0x2f0 [ 571.965836] ? rcu_read_lock_sched_held+0x110/0x130 [ 571.971090] ? copy_mount_string+0x40/0x40 [ 571.975440] ? copy_mount_options+0x1fe/0x2f0 [ 571.979931] SyS_mount+0xab/0x120 [ 571.979939] ? copy_mnt_ns+0x8c0/0x8c0 [ 571.979951] do_syscall_64+0x1eb/0x630 [ 571.979959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.979975] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.979982] RIP: 0033:0x45b69a [ 571.979987] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 571.979999] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 571.987350] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 571.987357] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 571.987363] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 571.987368] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:42 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x62102) r1 = dup(r0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x40141042, 0x0) ftruncate(r2, 0x27fff) sendfile(r1, r2, 0x0, 0x8000fffffffd) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0xfffffffffffffbff, 0x6f, 0x4, 0x3, 0x6}) 13:18:42 executing program 1 (fault-call:2 fault-nth:80): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100)=0x10001, 0x4) [ 572.206816] FAULT_INJECTION: forcing a failure. [ 572.206816] name failslab, interval 1, probability 0, space 0, times 0 [ 572.233309] CPU: 0 PID: 24531 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 572.240471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.249942] Call Trace: [ 572.252979] dump_stack+0x138/0x19c [ 572.256622] should_fail.cold+0x10f/0x159 [ 572.260780] ? __lock_is_held+0xb6/0x140 [ 572.264860] ? mempool_free+0x1d0/0x1d0 [ 572.268846] should_failslab+0xdb/0x130 [ 572.272977] kmem_cache_alloc+0x47/0x780 [ 572.277045] ? mempool_free+0x1d0/0x1d0 [ 572.281115] mempool_alloc_slab+0x47/0x60 [ 572.285265] mempool_alloc+0x13a/0x300 [ 572.289337] ? __find_get_block+0x5c6/0xb10 [ 572.293664] ? remove_element.isra.0+0x1b0/0x1b0 [ 572.298434] ? mark_held_locks+0xb1/0x100 [ 572.302587] ? save_trace+0x290/0x290 [ 572.306425] ? trace_hardirqs_on_caller+0x400/0x590 [ 572.311455] bio_alloc_bioset+0x368/0x680 [ 572.315616] ? bvec_alloc+0x2e0/0x2e0 [ 572.319426] ? __getblk_gfp+0x5c/0x710 [ 572.323510] submit_bh_wbc+0xf6/0x720 [ 572.327326] __bread_gfp+0x106/0x290 [ 572.331047] btrfs_read_dev_one_super+0x9f/0x270 [ 572.335825] btrfs_read_dev_super+0x5d/0xb0 [ 572.340150] ? btrfs_read_dev_one_super+0x270/0x270 [ 572.345162] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 572.345175] __btrfs_open_devices+0x194/0xab0 [ 572.345188] ? check_preemption_disabled+0x3c/0x250 [ 572.345203] ? find_device+0x100/0x100 [ 572.345215] ? btrfs_mount+0x1069/0x2b14 [ 572.371640] ? rcu_read_lock_sched_held+0x110/0x130 [ 572.376664] btrfs_open_devices+0xa4/0xb0 [ 572.380916] btrfs_mount+0x11b4/0x2b14 [ 572.384806] ? lock_downgrade+0x6e0/0x6e0 [ 572.388958] ? find_held_lock+0x35/0x130 [ 572.393021] ? pcpu_alloc+0x3af/0x1060 [ 572.396920] ? btrfs_remount+0x11f0/0x11f0 [ 572.401167] ? rcu_read_lock_sched_held+0x110/0x130 [ 572.406367] ? __lockdep_init_map+0x10c/0x570 [ 572.410965] mount_fs+0x9d/0x2a7 [ 572.414358] vfs_kern_mount.part.0+0x5e/0x3d0 [ 572.419008] ? find_held_lock+0x35/0x130 [ 572.423183] vfs_kern_mount+0x40/0x60 [ 572.426995] btrfs_mount+0x3ce/0x2b14 [ 572.430805] ? lock_downgrade+0x6e0/0x6e0 [ 572.435095] ? find_held_lock+0x35/0x130 [ 572.439156] ? pcpu_alloc+0x3af/0x1060 [ 572.443050] ? btrfs_remount+0x11f0/0x11f0 [ 572.447281] ? rcu_read_lock_sched_held+0x110/0x130 [ 572.452300] ? __lockdep_init_map+0x10c/0x570 [ 572.456888] ? __lockdep_init_map+0x10c/0x570 [ 572.461466] mount_fs+0x9d/0x2a7 [ 572.464909] vfs_kern_mount.part.0+0x5e/0x3d0 [ 572.469666] do_mount+0x417/0x27d0 [ 572.473201] ? copy_mount_options+0x5c/0x2f0 [ 572.477711] ? rcu_read_lock_sched_held+0x110/0x130 [ 572.482717] ? copy_mount_string+0x40/0x40 [ 572.486973] ? copy_mount_options+0x1fe/0x2f0 [ 572.491639] SyS_mount+0xab/0x120 [ 572.495096] ? copy_mnt_ns+0x8c0/0x8c0 [ 572.498980] do_syscall_64+0x1eb/0x630 [ 572.502852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.507709] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.513007] RIP: 0033:0x45b69a [ 572.516240] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 572.523943] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 572.531227] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 572.538667] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 572.545932] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 572.553196] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:44 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f0000000080)={0x5d4, 0x7}, 0x0, 0x0, &(0x7f0000000140)={0x9, 0x9, 0x9, 0xcb01}, &(0x7f0000000180)=0x8000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x9}}, 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x20) getsockopt$inet_int(r1, 0x0, 0x1f, &(0x7f0000000340), &(0x7f0000000380)=0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="008168311e97f13ba3d55d7b4286000000f119ce5eb0da20c5b47c57726b1c16368e4b5b9b422be50d58fbe933001010747b5168d5dc5af2419a5f90", @ANYRES16=r2, @ANYBLOB="000229bd7000fedbdf2514000000040002001800060008000100070000000400020004000200040002001800050008000100696200000c00020008000200080000003c000600080001000100010008000100018000000800010008000000080001009def0000080001000200000004000200040002000800010009000000180007000c00040008000000000000000800010002000000440001002c0004001400010002004e23ac1414aa00000000000000001400020002004e20000000000000000000000000040002001000010069623a687773696d300000002400090008000100030000000800020002000000080002000800000008000200070000003c0009000800020000800000080002000400000008000200ce110000080001000300000008000200ffffffff080001002000000008000100fdffffff04000500"], 0x144}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100)=0x10001, 0x4) 13:18:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) 13:18:44 executing program 1 (fault-call:2 fault-nth:81): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="ab4f4bcf6b655f6f0b34fa0cc6d6dc374737adc6de5e9d05690100844f"], &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0xf00) [ 574.827547] FAULT_INJECTION: forcing a failure. [ 574.827547] name failslab, interval 1, probability 0, space 0, times 0 [ 574.838781] CPU: 1 PID: 24549 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 574.845809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.855358] Call Trace: [ 574.858056] dump_stack+0x138/0x19c [ 574.861784] should_fail.cold+0x10f/0x159 [ 574.865952] should_failslab+0xdb/0x130 [ 574.869945] kmem_cache_alloc+0x47/0x780 [ 574.874024] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 574.879661] __radix_tree_create+0x337/0x4d0 [ 574.884083] page_cache_tree_insert+0xa7/0x2d0 [ 574.888682] ? file_check_and_advance_wb_err+0x380/0x380 [ 574.894140] ? debug_smp_processor_id+0x1c/0x20 [ 574.898825] __add_to_page_cache_locked+0x2a7/0x7e0 [ 574.904136] ? find_lock_entry+0x3f0/0x3f0 [ 574.908374] ? lock_downgrade+0x6e0/0x6e0 [ 574.912540] add_to_page_cache_lru+0xf4/0x310 [ 574.917056] ? add_to_page_cache_locked+0x40/0x40 [ 574.921908] ? __page_cache_alloc+0xdd/0x3e0 [ 574.926327] pagecache_get_page+0x1f5/0x750 [ 574.930663] __getblk_gfp+0x24b/0x710 [ 574.934476] ? lru_add_drain_all+0x18/0x20 [ 574.934497] __bread_gfp+0x2e/0x290 [ 574.934512] btrfs_read_dev_one_super+0x9f/0x270 [ 574.934523] btrfs_read_dev_super+0x5d/0xb0 [ 574.942596] ? btrfs_read_dev_one_super+0x270/0x270 [ 574.942611] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 574.942622] __btrfs_open_devices+0x194/0xab0 [ 574.942633] ? check_preemption_disabled+0x3c/0x250 [ 574.942645] ? find_device+0x100/0x100 [ 574.942659] ? btrfs_mount+0x1069/0x2b14 [ 574.979215] ? rcu_read_lock_sched_held+0x110/0x130 [ 574.984220] btrfs_open_devices+0xa4/0xb0 [ 574.988362] btrfs_mount+0x11b4/0x2b14 [ 574.992240] ? lock_downgrade+0x6e0/0x6e0 [ 574.996375] ? find_held_lock+0x35/0x130 [ 575.000433] ? pcpu_alloc+0x3af/0x1060 [ 575.004413] ? btrfs_remount+0x11f0/0x11f0 [ 575.008639] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.013650] ? __lockdep_init_map+0x10c/0x570 [ 575.018165] mount_fs+0x9d/0x2a7 [ 575.021542] vfs_kern_mount.part.0+0x5e/0x3d0 [ 575.026053] ? find_held_lock+0x35/0x130 [ 575.030105] vfs_kern_mount+0x40/0x60 [ 575.033892] btrfs_mount+0x3ce/0x2b14 [ 575.037674] ? lock_downgrade+0x6e0/0x6e0 [ 575.041802] ? find_held_lock+0x35/0x130 [ 575.045852] ? pcpu_alloc+0x3af/0x1060 [ 575.049725] ? btrfs_remount+0x11f0/0x11f0 [ 575.053948] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.059031] ? __lockdep_init_map+0x10c/0x570 [ 575.063699] ? __lockdep_init_map+0x10c/0x570 [ 575.068187] mount_fs+0x9d/0x2a7 [ 575.071579] vfs_kern_mount.part.0+0x5e/0x3d0 [ 575.076077] do_mount+0x417/0x27d0 [ 575.079791] ? copy_mount_options+0x5c/0x2f0 [ 575.084187] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.089189] ? copy_mount_string+0x40/0x40 [ 575.093672] ? copy_mount_options+0x1fe/0x2f0 [ 575.098166] SyS_mount+0xab/0x120 [ 575.101611] ? copy_mnt_ns+0x8c0/0x8c0 [ 575.105493] do_syscall_64+0x1eb/0x630 [ 575.109392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.114266] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.119563] RIP: 0033:0x45b69a 13:18:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 575.122774] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 575.130479] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 575.137892] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 575.145175] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 575.152607] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 575.159874] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:45 executing program 1 (fault-call:2 fault-nth:82): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 575.354013] FAULT_INJECTION: forcing a failure. [ 575.354013] name failslab, interval 1, probability 0, space 0, times 0 [ 575.366336] CPU: 1 PID: 24581 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 575.373370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.382920] Call Trace: [ 575.385511] dump_stack+0x138/0x19c [ 575.389160] should_fail.cold+0x10f/0x159 [ 575.393439] should_failslab+0xdb/0x130 [ 575.397778] kmem_cache_alloc+0x2d9/0x780 [ 575.401951] ? save_stack_trace+0x16/0x20 [ 575.406111] ? save_stack+0x45/0xd0 [ 575.409761] ? kasan_kmalloc+0xce/0xf0 [ 575.413638] ? kmem_cache_alloc_trace+0x152/0x790 [ 575.418590] ? btrfs_mount+0x1069/0x2b14 [ 575.422636] ? mount_fs+0x9d/0x2a7 [ 575.426160] getname_kernel+0x53/0x350 [ 575.430041] kern_path+0x20/0x40 [ 575.433492] lookup_bdev.part.0+0x63/0x160 [ 575.437902] ? blkdev_open+0x260/0x260 [ 575.441781] ? btrfs_open_devices+0x27/0xb0 [ 575.446109] blkdev_get_by_path+0x76/0xf0 [ 575.450253] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 575.454732] __btrfs_open_devices+0x194/0xab0 [ 575.459213] ? check_preemption_disabled+0x3c/0x250 [ 575.464213] ? find_device+0x100/0x100 [ 575.468085] ? btrfs_mount+0x1069/0x2b14 [ 575.472128] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.477237] btrfs_open_devices+0xa4/0xb0 [ 575.481374] btrfs_mount+0x11b4/0x2b14 [ 575.485259] ? lock_downgrade+0x6e0/0x6e0 [ 575.489451] ? find_held_lock+0x35/0x130 [ 575.493499] ? pcpu_alloc+0x3af/0x1060 [ 575.497463] ? btrfs_remount+0x11f0/0x11f0 [ 575.501699] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.506807] ? __lockdep_init_map+0x10c/0x570 [ 575.511300] mount_fs+0x9d/0x2a7 [ 575.514739] vfs_kern_mount.part.0+0x5e/0x3d0 [ 575.519220] ? find_held_lock+0x35/0x130 [ 575.523302] vfs_kern_mount+0x40/0x60 [ 575.527096] btrfs_mount+0x3ce/0x2b14 [ 575.530884] ? lock_downgrade+0x6e0/0x6e0 [ 575.535105] ? find_held_lock+0x35/0x130 [ 575.539180] ? pcpu_alloc+0x3af/0x1060 [ 575.543067] ? btrfs_remount+0x11f0/0x11f0 [ 575.547289] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.552302] ? __lockdep_init_map+0x10c/0x570 [ 575.556893] ? __lockdep_init_map+0x10c/0x570 [ 575.561384] mount_fs+0x9d/0x2a7 [ 575.564732] vfs_kern_mount.part.0+0x5e/0x3d0 [ 575.569299] do_mount+0x417/0x27d0 [ 575.572815] ? copy_mount_options+0x5c/0x2f0 [ 575.577551] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.582742] ? copy_mount_string+0x40/0x40 [ 575.587242] ? copy_mount_options+0x1fe/0x2f0 [ 575.591726] SyS_mount+0xab/0x120 [ 575.595171] ? copy_mnt_ns+0x8c0/0x8c0 [ 575.599097] do_syscall_64+0x1eb/0x630 [ 575.602972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.607801] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.612971] RIP: 0033:0x45b69a [ 575.616162] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 575.623861] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 575.631118] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 575.638387] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 575.645645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 13:18:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) [ 575.652923] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:47 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x3ff, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000140)=""/56) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000040)={0x2}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x3f) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000180)) 13:18:47 executing program 1 (fault-call:2 fault-nth:83): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 577.898163] FAULT_INJECTION: forcing a failure. [ 577.898163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 577.910105] CPU: 0 PID: 24610 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 577.917123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.927099] Call Trace: [ 577.929699] dump_stack+0x138/0x19c [ 577.933348] should_fail.cold+0x10f/0x159 [ 577.937607] __alloc_pages_nodemask+0x1d6/0x7a0 [ 577.942389] ? __alloc_pages_slowpath+0x2930/0x2930 [ 577.947513] cache_grow_begin+0x80/0x410 [ 577.951593] kmem_cache_alloc+0x6a8/0x780 [ 577.955752] getname_kernel+0x53/0x350 [ 577.959643] kern_path+0x20/0x40 [ 577.963045] lookup_bdev.part.0+0x63/0x160 [ 577.967305] ? blkdev_open+0x260/0x260 [ 577.971203] blkdev_get_by_path+0x76/0xf0 [ 577.975371] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 577.979884] __btrfs_open_devices+0x194/0xab0 [ 577.984388] ? check_preemption_disabled+0x3c/0x250 [ 577.989416] ? find_device+0x100/0x100 [ 577.993309] ? btrfs_mount+0x1069/0x2b14 [ 577.997489] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.002516] btrfs_open_devices+0xa4/0xb0 [ 578.006671] btrfs_mount+0x11b4/0x2b14 [ 578.010563] ? lock_downgrade+0x6e0/0x6e0 [ 578.014717] ? find_held_lock+0x35/0x130 [ 578.020176] ? pcpu_alloc+0x3af/0x1060 [ 578.024081] ? btrfs_remount+0x11f0/0x11f0 [ 578.028330] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.033453] ? __lockdep_init_map+0x10c/0x570 [ 578.037961] mount_fs+0x9d/0x2a7 [ 578.041334] vfs_kern_mount.part.0+0x5e/0x3d0 [ 578.045946] ? find_held_lock+0x35/0x130 [ 578.050018] vfs_kern_mount+0x40/0x60 [ 578.053831] btrfs_mount+0x3ce/0x2b14 [ 578.057639] ? lock_downgrade+0x6e0/0x6e0 [ 578.061805] ? find_held_lock+0x35/0x130 [ 578.065883] ? pcpu_alloc+0x3af/0x1060 [ 578.069790] ? btrfs_remount+0x11f0/0x11f0 [ 578.074042] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.079087] ? __lockdep_init_map+0x10c/0x570 [ 578.083603] ? __lockdep_init_map+0x10c/0x570 [ 578.088289] mount_fs+0x9d/0x2a7 [ 578.091756] vfs_kern_mount.part.0+0x5e/0x3d0 [ 578.096269] do_mount+0x417/0x27d0 [ 578.099903] ? copy_mount_options+0x5c/0x2f0 [ 578.104330] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.109364] ? copy_mount_string+0x40/0x40 [ 578.113620] ? copy_mount_options+0x1fe/0x2f0 [ 578.118130] SyS_mount+0xab/0x120 [ 578.121594] ? copy_mnt_ns+0x8c0/0x8c0 [ 578.125477] do_syscall_64+0x1eb/0x630 [ 578.129369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 578.134231] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 578.139592] RIP: 0033:0x45b69a 13:18:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 578.142868] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 578.150586] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 578.157864] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 578.165138] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 578.172688] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 578.180087] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:48 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:48 executing program 1 (fault-call:2 fault-nth:84): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$void(r0, 0xc0045c78) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 578.400132] FAULT_INJECTION: forcing a failure. [ 578.400132] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 578.412328] CPU: 1 PID: 24644 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 578.419351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.428885] Call Trace: [ 578.431483] dump_stack+0x138/0x19c [ 578.435128] should_fail.cold+0x10f/0x159 [ 578.439384] __alloc_pages_nodemask+0x1d6/0x7a0 [ 578.444082] ? __alloc_pages_slowpath+0x2930/0x2930 [ 578.449239] cache_grow_begin+0x80/0x410 [ 578.453329] kmem_cache_alloc+0x6a8/0x780 [ 578.457576] getname_kernel+0x53/0x350 [ 578.461474] kern_path+0x20/0x40 [ 578.464846] lookup_bdev.part.0+0x63/0x160 [ 578.469082] ? blkdev_open+0x260/0x260 [ 578.472979] blkdev_get_by_path+0x76/0xf0 [ 578.477137] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 578.481661] __btrfs_open_devices+0x194/0xab0 [ 578.486159] ? check_preemption_disabled+0x3c/0x250 [ 578.491208] ? find_device+0x100/0x100 [ 578.495095] ? btrfs_mount+0x1069/0x2b14 [ 578.499185] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.504225] btrfs_open_devices+0xa4/0xb0 [ 578.508396] btrfs_mount+0x11b4/0x2b14 [ 578.512299] ? lock_downgrade+0x6e0/0x6e0 [ 578.516454] ? find_held_lock+0x35/0x130 [ 578.520535] ? pcpu_alloc+0x3af/0x1060 [ 578.524438] ? btrfs_remount+0x11f0/0x11f0 [ 578.529121] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.529142] ? __lockdep_init_map+0x10c/0x570 [ 578.529166] mount_fs+0x9d/0x2a7 [ 578.542052] vfs_kern_mount.part.0+0x5e/0x3d0 [ 578.546667] ? find_held_lock+0x35/0x130 [ 578.546684] vfs_kern_mount+0x40/0x60 [ 578.546699] btrfs_mount+0x3ce/0x2b14 [ 578.558334] ? lock_downgrade+0x6e0/0x6e0 [ 578.562491] ? find_held_lock+0x35/0x130 [ 578.566558] ? pcpu_alloc+0x3af/0x1060 [ 578.570596] ? btrfs_remount+0x11f0/0x11f0 [ 578.574929] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.579953] ? __lockdep_init_map+0x10c/0x570 [ 578.584462] ? __lockdep_init_map+0x10c/0x570 [ 578.588966] mount_fs+0x9d/0x2a7 [ 578.592324] vfs_kern_mount.part.0+0x5e/0x3d0 [ 578.596832] do_mount+0x417/0x27d0 [ 578.600363] ? copy_mount_options+0x5c/0x2f0 [ 578.604766] ? rcu_read_lock_sched_held+0x110/0x130 [ 578.609777] ? copy_mount_string+0x40/0x40 [ 578.614060] ? copy_mount_options+0x1fe/0x2f0 [ 578.618561] SyS_mount+0xab/0x120 [ 578.621998] ? copy_mnt_ns+0x8c0/0x8c0 [ 578.625873] do_syscall_64+0x1eb/0x630 [ 578.629746] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 578.634655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 578.639828] RIP: 0033:0x45b69a [ 578.642999] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 578.650690] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 578.657949] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 578.665205] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 578.672469] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 578.679739] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:51 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x121000, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0xeefd) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) 13:18:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:51 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:51 executing program 1 (fault-call:2 fault-nth:85): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 580.956656] FAULT_INJECTION: forcing a failure. [ 580.956656] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 580.968833] CPU: 1 PID: 24663 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 580.975856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.985304] Call Trace: [ 580.987906] dump_stack+0x138/0x19c [ 580.991555] should_fail.cold+0x10f/0x159 [ 580.995735] __alloc_pages_nodemask+0x1d6/0x7a0 [ 581.000436] ? __alloc_pages_slowpath+0x2930/0x2930 [ 581.005486] cache_grow_begin+0x80/0x410 [ 581.009666] kmem_cache_alloc+0x6a8/0x780 [ 581.013830] getname_kernel+0x53/0x350 [ 581.017817] kern_path+0x20/0x40 [ 581.021194] lookup_bdev.part.0+0x63/0x160 [ 581.025487] ? blkdev_open+0x260/0x260 [ 581.029639] blkdev_get_by_path+0x76/0xf0 [ 581.033799] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 581.038311] __btrfs_open_devices+0x194/0xab0 [ 581.042880] ? check_preemption_disabled+0x3c/0x250 [ 581.047911] ? find_device+0x100/0x100 [ 581.051816] ? btrfs_mount+0x1069/0x2b14 [ 581.051832] ? rcu_read_lock_sched_held+0x110/0x130 [ 581.051848] btrfs_open_devices+0xa4/0xb0 [ 581.051859] btrfs_mount+0x11b4/0x2b14 [ 581.051869] ? lock_downgrade+0x6e0/0x6e0 [ 581.051877] ? find_held_lock+0x35/0x130 [ 581.051893] ? pcpu_alloc+0x3af/0x1060 [ 581.060987] ? btrfs_remount+0x11f0/0x11f0 [ 581.061006] ? rcu_read_lock_sched_held+0x110/0x130 [ 581.061026] ? __lockdep_init_map+0x10c/0x570 [ 581.061043] mount_fs+0x9d/0x2a7 [ 581.098182] vfs_kern_mount.part.0+0x5e/0x3d0 [ 581.102663] ? find_held_lock+0x35/0x130 [ 581.107114] vfs_kern_mount+0x40/0x60 [ 581.110933] btrfs_mount+0x3ce/0x2b14 [ 581.114740] ? lock_downgrade+0x6e0/0x6e0 [ 581.118877] ? find_held_lock+0x35/0x130 [ 581.123033] ? pcpu_alloc+0x3af/0x1060 [ 581.126930] ? btrfs_remount+0x11f0/0x11f0 [ 581.131170] ? rcu_read_lock_sched_held+0x110/0x130 [ 581.136183] ? __lockdep_init_map+0x10c/0x570 [ 581.140778] ? __lockdep_init_map+0x10c/0x570 [ 581.146062] mount_fs+0x9d/0x2a7 [ 581.149425] vfs_kern_mount.part.0+0x5e/0x3d0 [ 581.153917] do_mount+0x417/0x27d0 [ 581.157473] ? copy_mount_options+0x5c/0x2f0 [ 581.161962] ? rcu_read_lock_sched_held+0x110/0x130 [ 581.166998] ? copy_mount_string+0x40/0x40 [ 581.171227] ? copy_mount_options+0x1fe/0x2f0 [ 581.175812] SyS_mount+0xab/0x120 [ 581.179472] ? copy_mnt_ns+0x8c0/0x8c0 [ 581.183358] do_syscall_64+0x1eb/0x630 [ 581.187498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.192773] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 581.197957] RIP: 0033:0x45b69a 13:18:51 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)=0xd) readv(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5437, 0x0) 13:18:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 581.201263] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 581.208965] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 581.216228] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 581.223683] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 581.230961] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 581.238223] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:51 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)=0xd) readv(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5437, 0x0) 13:18:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=""/192, 0x10e2, 0xc0}, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0xce, @mcast1, 0x8000}}, 0x8001, 0x2, 0x3, 0xa2d, 0x6}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}}, [0x82, 0x5, 0x8001, 0x100, 0x3, 0xfff00000000000, 0x7fff, 0x3, 0x3, 0x1ff, 0x3ff, 0x28, 0x8000000, 0x7, 0xfffffffffffffffe]}, &(0x7f00000003c0)=0x100) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:54 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='asymmetric\x00', &(0x7f00000001c0)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:54 executing program 1 (fault-call:2 fault-nth:86): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:54 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x80}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:54 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)=0xd) readv(0xffffffffffffffff, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(0xffffffffffffffff, 0x5437, 0x0) 13:18:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 584.038529] FAULT_INJECTION: forcing a failure. [ 584.038529] name failslab, interval 1, probability 0, space 0, times 0 [ 584.050294] CPU: 0 PID: 24712 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 584.057313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.066675] Call Trace: [ 584.069287] dump_stack+0x138/0x19c [ 584.073110] should_fail.cold+0x10f/0x159 [ 584.077275] should_failslab+0xdb/0x130 [ 584.081283] kmem_cache_alloc+0x47/0x780 [ 584.085364] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 584.091209] __radix_tree_create+0x337/0x4d0 [ 584.095642] page_cache_tree_insert+0xa7/0x2d0 [ 584.100250] ? file_check_and_advance_wb_err+0x380/0x380 [ 584.105723] ? debug_smp_processor_id+0x1c/0x20 [ 584.110500] __add_to_page_cache_locked+0x2a7/0x7e0 [ 584.115552] ? find_lock_entry+0x3f0/0x3f0 [ 584.119800] ? lock_downgrade+0x6e0/0x6e0 [ 584.123967] add_to_page_cache_lru+0xf4/0x310 [ 584.128557] ? add_to_page_cache_locked+0x40/0x40 [ 584.133408] ? __page_cache_alloc+0xdd/0x3e0 13:18:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) 13:18:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 584.137828] pagecache_get_page+0x1f5/0x750 [ 584.142343] __getblk_gfp+0x24b/0x710 [ 584.146295] ? lru_add_drain_all+0x18/0x20 [ 584.150557] __bread_gfp+0x2e/0x290 [ 584.154221] btrfs_read_dev_one_super+0x9f/0x270 [ 584.158983] btrfs_read_dev_super+0x5d/0xb0 [ 584.158994] ? btrfs_read_dev_one_super+0x270/0x270 [ 584.159011] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 584.159022] __btrfs_open_devices+0x194/0xab0 [ 584.168332] ? check_preemption_disabled+0x3c/0x250 [ 584.168344] ? find_device+0x100/0x100 [ 584.168353] ? btrfs_mount+0x1069/0x2b14 [ 584.168365] ? rcu_read_lock_sched_held+0x110/0x130 [ 584.168378] btrfs_open_devices+0xa4/0xb0 [ 584.168387] btrfs_mount+0x11b4/0x2b14 [ 584.168397] ? lock_downgrade+0x6e0/0x6e0 [ 584.168404] ? find_held_lock+0x35/0x130 [ 584.168416] ? pcpu_alloc+0x3af/0x1060 [ 584.168432] ? btrfs_remount+0x11f0/0x11f0 [ 584.220228] ? rcu_read_lock_sched_held+0x110/0x130 [ 584.225239] ? __lockdep_init_map+0x10c/0x570 [ 584.229746] mount_fs+0x9d/0x2a7 [ 584.233099] vfs_kern_mount.part.0+0x5e/0x3d0 [ 584.237661] ? find_held_lock+0x35/0x130 [ 584.241719] vfs_kern_mount+0x40/0x60 [ 584.245506] btrfs_mount+0x3ce/0x2b14 [ 584.249288] ? lock_downgrade+0x6e0/0x6e0 [ 584.254372] ? find_held_lock+0x35/0x130 [ 584.258524] ? pcpu_alloc+0x3af/0x1060 [ 584.262401] ? btrfs_remount+0x11f0/0x11f0 [ 584.266632] ? rcu_read_lock_sched_held+0x110/0x130 [ 584.271647] ? __lockdep_init_map+0x10c/0x570 [ 584.276142] ? __lockdep_init_map+0x10c/0x570 [ 584.280625] mount_fs+0x9d/0x2a7 [ 584.283976] vfs_kern_mount.part.0+0x5e/0x3d0 [ 584.288458] do_mount+0x417/0x27d0 [ 584.292040] ? copy_mount_options+0x5c/0x2f0 [ 584.296501] ? rcu_read_lock_sched_held+0x110/0x130 [ 584.301510] ? copy_mount_string+0x40/0x40 [ 584.305731] ? copy_mount_options+0x1fe/0x2f0 [ 584.310212] SyS_mount+0xab/0x120 [ 584.313659] ? copy_mnt_ns+0x8c0/0x8c0 [ 584.317555] do_syscall_64+0x1eb/0x630 [ 584.321424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.326342] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 584.331633] RIP: 0033:0x45b69a [ 584.334805] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 584.342528] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 584.349903] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 584.357166] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 584.364566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 584.371818] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 13:18:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) 13:18:54 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) 13:18:57 executing program 3: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x1d6a, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x5, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x11b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:18:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0xaaaaaaaaaaaab32, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfffffffffffffca4, 0x7}], 0x0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) 13:18:57 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) r1 = socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:57 executing program 1 (fault-call:2 fault-nth:87): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) 13:18:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 587.078444] FAULT_INJECTION: forcing a failure. [ 587.078444] name failslab, interval 1, probability 0, space 0, times 0 [ 587.138765] CPU: 0 PID: 24759 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 587.145831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.155205] Call Trace: [ 587.157813] dump_stack+0x138/0x19c [ 587.161464] should_fail.cold+0x10f/0x159 [ 587.165625] should_failslab+0xdb/0x130 [ 587.169613] kmem_cache_alloc_trace+0x2ec/0x790 [ 587.174293] ? mutex_trylock+0x1c0/0x1c0 [ 587.178366] ? btrfs_close_devices+0x21/0x140 [ 587.182866] btrfs_alloc_device+0xa4/0x6a0 [ 587.187101] ? btrfs_find_device_by_devspec+0xf0/0xf0 [ 587.192385] __btrfs_close_devices+0x2c6/0xa90 [ 587.196995] ? __mutex_unlock_slowpath+0x71/0x800 [ 587.201916] ? btrfs_alloc_device+0x6a0/0x6a0 [ 587.206442] btrfs_close_devices+0x29/0x140 [ 587.210793] btrfs_mount+0x1fc5/0x2b14 [ 587.214704] ? lock_downgrade+0x6e0/0x6e0 [ 587.218884] ? find_held_lock+0x35/0x130 [ 587.223888] ? pcpu_alloc+0x3af/0x1060 [ 587.227801] ? btrfs_remount+0x11f0/0x11f0 [ 587.232049] ? rcu_read_lock_sched_held+0x110/0x130 [ 587.237469] ? __lockdep_init_map+0x10c/0x570 [ 587.241978] mount_fs+0x9d/0x2a7 [ 587.245343] vfs_kern_mount.part.0+0x5e/0x3d0 [ 587.249936] ? find_held_lock+0x35/0x130 [ 587.253989] vfs_kern_mount+0x40/0x60 [ 587.257790] btrfs_mount+0x3ce/0x2b14 [ 587.261593] ? lock_downgrade+0x6e0/0x6e0 [ 587.265748] ? find_held_lock+0x35/0x130 [ 587.269827] ? pcpu_alloc+0x3af/0x1060 [ 587.273823] ? btrfs_remount+0x11f0/0x11f0 [ 587.278112] ? rcu_read_lock_sched_held+0x110/0x130 [ 587.283165] ? __lockdep_init_map+0x10c/0x570 [ 587.287678] ? __lockdep_init_map+0x10c/0x570 [ 587.292188] mount_fs+0x9d/0x2a7 [ 587.295694] vfs_kern_mount.part.0+0x5e/0x3d0 [ 587.300195] do_mount+0x417/0x27d0 [ 587.303726] ? copy_mount_options+0x5c/0x2f0 [ 587.308253] ? rcu_read_lock_sched_held+0x110/0x130 [ 587.313264] ? copy_mount_string+0x40/0x40 [ 587.317483] ? copy_mount_options+0x1fe/0x2f0 [ 587.322055] SyS_mount+0xab/0x120 [ 587.325498] ? copy_mnt_ns+0x8c0/0x8c0 [ 587.329381] do_syscall_64+0x1eb/0x630 [ 587.333290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.338133] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.343321] RIP: 0033:0x45b69a [ 587.346496] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 587.355372] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 587.362721] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 587.369990] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 587.377353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 13:18:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0xffffffffffffff68}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc025, 0x3}) openat$tun(0xffffffffffffff9c, 0x0, 0x410880, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 13:18:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000400)=0xd) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 587.384633] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 587.407870] ------------[ cut here ]------------ [ 587.412823] kernel BUG at fs/btrfs/volumes.c:890! [ 587.442667] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 587.448146] Modules linked in: [ 587.451449] CPU: 0 PID: 24759 Comm: syz-executor.1 Not tainted 4.14.111 #1 [ 587.458501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.468126] task: ffff88805b464340 task.stack: ffff88807f478000 [ 587.474181] RIP: 0010:__btrfs_close_devices+0x7d8/0xa90 [ 587.480814] RSP: 0018:ffff88807f47f700 EFLAGS: 00010246 13:18:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 587.486264] RAX: 0000000000040000 RBX: ffff8880a5e3db40 RCX: ffffc90008c44000 [ 587.493765] RDX: 0000000000040000 RSI: ffffffff82655c28 RDI: 0000000000000282 [ 587.501126] RBP: ffff88807f47f7c8 R08: ffff88805b464340 R09: ffff88805b464c08 [ 587.505560] kobject: 'loop0' (ffff8880646a2360): kobject_uevent_env [ 587.508403] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a4f37ac0 [ 587.514808] kobject: 'loop0' (ffff8880646a2360): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 587.522042] R13: ffff8880a5e3dc08 R14: fffffffffffffff4 R15: dffffc0000000000 [ 587.522048] FS: 00007f2d39cac700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 587.522053] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 587.522057] CR2: 00000000004e6460 CR3: 0000000089999000 CR4: 00000000001406f0 [ 587.522064] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 587.522069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 587.522072] Call Trace: [ 587.522088] ? __mutex_unlock_slowpath+0x71/0x800 [ 587.522101] ? btrfs_alloc_device+0x6a0/0x6a0 [ 587.522112] btrfs_close_devices+0x29/0x140 13:18:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 587.522124] btrfs_mount+0x1fc5/0x2b14 [ 587.522134] ? lock_downgrade+0x6e0/0x6e0 [ 587.522140] ? find_held_lock+0x35/0x130 [ 587.522151] ? pcpu_alloc+0x3af/0x1060 [ 587.522163] ? btrfs_remount+0x11f0/0x11f0 [ 587.522174] ? rcu_read_lock_sched_held+0x110/0x130 [ 587.522186] ? __lockdep_init_map+0x10c/0x570 [ 587.522197] mount_fs+0x9d/0x2a7 [ 587.522207] vfs_kern_mount.part.0+0x5e/0x3d0 [ 587.522214] ? find_held_lock+0x35/0x130 [ 587.522224] vfs_kern_mount+0x40/0x60 [ 587.613311] kobject: 'loop0' (ffff8880646a2360): kobject_uevent_env [ 587.617787] btrfs_mount+0x3ce/0x2b14 [ 587.617797] ? lock_downgrade+0x6e0/0x6e0 [ 587.617804] ? find_held_lock+0x35/0x130 [ 587.617814] ? pcpu_alloc+0x3af/0x1060 [ 587.617824] ? btrfs_remount+0x11f0/0x11f0 [ 587.617837] ? rcu_read_lock_sched_held+0x110/0x130 [ 587.625782] kobject: 'loop0' (ffff8880646a2360): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 587.630359] ? __lockdep_init_map+0x10c/0x570 [ 587.630367] ? __lockdep_init_map+0x10c/0x570 [ 587.630386] mount_fs+0x9d/0x2a7 13:18:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000100)=""/107, 0x6b}], 0x1) ioctl$TCSETA(r0, 0x5437, 0x0) [ 587.630398] vfs_kern_mount.part.0+0x5e/0x3d0 [ 587.630407] do_mount+0x417/0x27d0 [ 587.630414] ? copy_mount_options+0x5c/0x2f0 [ 587.630424] ? rcu_read_lock_sched_held+0x110/0x130 [ 587.630435] ? copy_mount_string+0x40/0x40 [ 587.712976] kobject: 'loop0' (ffff8880646a2360): kobject_uevent_env [ 587.713869] ? copy_mount_options+0x1fe/0x2f0 [ 587.722656] kobject: 'loop0' (ffff8880646a2360): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 587.724878] SyS_mount+0xab/0x120 [ 587.724888] ? copy_mnt_ns+0x8c0/0x8c0 [ 587.741650] do_syscall_64+0x1eb/0x630 [ 587.745545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.750414] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.755686] RIP: 0033:0x45b69a [ 587.758857] RSP: 002b:00007f2d39caba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 587.766553] RAX: ffffffffffffffda RBX: 00007f2d39cabb40 RCX: 000000000045b69a [ 587.773823] RDX: 00007f2d39cabae0 RSI: 0000000020000100 RDI: 00007f2d39cabb00 [ 587.781079] RBP: 0000000000000001 R08: 00007f2d39cabb40 R09: 00007f2d39cabae0 [ 587.788658] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 587.796032] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000004 [ 587.803338] Code: c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 59 02 00 00 48 8b 45 80 c7 80 10 01 00 00 00 00 00 00 e9 e2 f8 ff ff e8 28 7b f7 fe <0f> 0b e8 21 7b f7 fe 0f 0b 48 89 f7 e8 77 e2 20 ff e9 ad f8 ff [ 587.809622] kobject: 'loop0' (ffff8880646a2360): kobject_uevent_env [ 587.822735] RIP: __btrfs_close_devices+0x7d8/0xa90 RSP: ffff88807f47f700 [ 587.833913] ---[ end trace a7b3602c903be63a ]--- [ 587.837402] kobject: 'loop0' (ffff8880646a2360): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 587.843393] Kernel panic - not syncing: Fatal exception [ 587.854632] kobject: 'loop4' (ffff8880a4a53360): kobject_uevent_env [ 587.863766] Kernel Offset: disabled [ 587.867387] Rebooting in 86400 seconds..