] RIP: 0033:0x457c97 [ 1375.686735] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1375.705637] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1375.713348] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1375.720619] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1375.727887] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 06:45:53 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r2) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x36, "41e53952cdd3b593364d332a04059a0f33bbf74c9431c92723c1aba5a547a9daa7b30d8a95bb9d21443fcc9adca4aa25b634f0270e18"}, &(0x7f0000000400)=0x3e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000440)={r7, @in={{0x2, 0x4e23, @rand_addr=0x9}}, 0x0, 0x1, 0x100000001, 0x2, 0x3}, &(0x7f0000000500)=0x98) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000540)=0x8b) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) sendto$inet(r1, &(0x7f0000000100)="f3b7b32dacc4330439cfd84c00b7a72cbf8fd047589696debf0dd57c10506740240a77f7631f0096706a6815464e78ac85ca8a9b71e11f9a3e294972b64222778062f5ad87e606ae6a6d3012b1ac885df287ab48561c7faf15f91a33f88df89281dd2755a10a0339bb23e13ad239c98aa29a9143bfb84760deb9", 0x7a, 0x11, &(0x7f0000000240)={0x2, 0x4e24, @rand_addr=0xde}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f00000000c0)={r3}) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) [ 1375.735158] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1375.742433] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:45:53 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x3}, &(0x7f0000000200), 0x0) 06:45:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5450, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1375.775852] gfs2: commit mount option requires a positive numeric argument [ 1375.800999] gfs2: can't parse mount arguments 06:45:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xedc000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1375.925342] XFS (loop2): Invalid superblock magic number [ 1376.088957] gfs2: commit mount option requires a positive numeric argument [ 1376.118076] gfs2: can't parse mount arguments 06:45:54 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 06:45:54 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x9}, &(0x7f0000000200), 0x0) 06:45:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5451, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:45:54 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:45:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x4000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1376.239645] FAULT_INJECTION: forcing a failure. [ 1376.239645] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.271558] CPU: 1 PID: 30000 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1376.279227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.289022] Call Trace: [ 1376.291631] dump_stack+0x172/0x1f0 [ 1376.295623] should_fail.cold+0xa/0x1b [ 1376.299997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1376.305111] ? lock_downgrade+0x810/0x810 [ 1376.309258] ? ___might_sleep+0x163/0x280 [ 1376.313420] __should_failslab+0x121/0x190 [ 1376.317662] should_failslab+0x9/0x14 [ 1376.321475] kmem_cache_alloc+0x2be/0x710 [ 1376.325635] ? lock_downgrade+0x810/0x810 [ 1376.330063] ? kasan_check_read+0x11/0x20 [ 1376.334227] __kernfs_new_node+0xef/0x690 [ 1376.338389] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1376.343168] ? wait_for_completion+0x440/0x440 [ 1376.347765] ? mutex_unlock+0xd/0x10 [ 1376.351486] ? kernfs_activate+0x192/0x1f0 [ 1376.355726] kernfs_new_node+0x99/0x130 [ 1376.359723] __kernfs_create_file+0x51/0x340 [ 1376.364137] sysfs_add_file_mode_ns+0x222/0x560 [ 1376.368833] internal_create_group+0x35b/0xc40 [ 1376.373418] ? bd_set_size+0x89/0xb0 [ 1376.377600] ? remove_files.isra.0+0x190/0x190 [ 1376.382193] sysfs_create_group+0x20/0x30 [ 1376.386347] lo_ioctl+0xf8f/0x20d0 [ 1376.389901] ? lo_rw_aio+0x1530/0x1530 [ 1376.393794] blkdev_ioctl+0xee8/0x1c40 [ 1376.397685] ? blkpg_ioctl+0xa90/0xa90 [ 1376.401579] ? find_held_lock+0x35/0x130 [ 1376.405649] ? debug_check_no_obj_freed+0x200/0x464 [ 1376.410936] ? __fget+0x340/0x540 [ 1376.414547] ? ___might_sleep+0x163/0x280 [ 1376.418709] block_ioctl+0xee/0x130 [ 1376.422339] ? blkdev_fallocate+0x410/0x410 [ 1376.426677] do_vfs_ioctl+0xd6e/0x1390 [ 1376.430575] ? selinux_file_ioctl+0x46f/0x5e0 [ 1376.435098] ? selinux_file_ioctl+0x125/0x5e0 [ 1376.439605] ? ioctl_preallocate+0x210/0x210 [ 1376.444024] ? selinux_file_mprotect+0x620/0x620 [ 1376.448821] ? iterate_fd+0x360/0x360 [ 1376.452630] ? do_sys_open+0x31d/0x5d0 [ 1376.457151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.462956] ? security_file_ioctl+0x93/0xc0 [ 1376.467385] ksys_ioctl+0xab/0xd0 [ 1376.470848] __x64_sys_ioctl+0x73/0xb0 [ 1376.475007] do_syscall_64+0x103/0x610 [ 1376.478902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.484096] RIP: 0033:0x457c97 [ 1376.487293] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1376.507670] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1376.515385] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1376.522667] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1376.529951] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 06:45:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5452, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:45:54 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x10}, &(0x7f0000000200), 0x0) 06:45:54 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x4000) write$sndseq(r0, &(0x7f0000000080), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x113, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x1, {0xa, 0x4e20, 0x14, @loopback, 0xf2}, r1}}, 0x38) fadvise64(r0, 0x0, 0xfffffffffffffffd, 0x0) read$alg(r0, &(0x7f0000000200)=""/228, 0xe4) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_settime(0x7, &(0x7f00000001c0)={r3, r4+30000000}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000300), r2}}, 0x18) write$sndseq(r5, &(0x7f0000000000)=[{0x0, 0x0, 0x8000000000, 0x4, @tick, {0x0, 0x3}, {}, @note={0xffffffff, 0x409}}], 0x6) [ 1376.537244] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1376.544516] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1376.673433] gfs2: commit mount option requires a positive numeric argument [ 1376.713996] gfs2: can't parse mount arguments [ 1376.734279] XFS (loop2): Invalid superblock magic number [ 1376.849695] gfs2: commit mount option requires a positive numeric argument [ 1376.857240] gfs2: can't parse mount arguments [ 1379.180338] IPVS: ftp: loaded support on port[0] = 21 [ 1379.809188] chnl_net:caif_netlink_parms(): no params data found [ 1380.115643] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.130024] bridge0: port 1(bridge_slave_0) entered disabled state [ 1380.138570] device bridge_slave_0 entered promiscuous mode [ 1380.409564] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.423504] bridge0: port 2(bridge_slave_1) entered disabled state [ 1380.434999] device bridge_slave_1 entered promiscuous mode [ 1380.445348] device bridge_slave_1 left promiscuous mode [ 1380.455162] bridge0: port 2(bridge_slave_1) entered disabled state [ 1380.511721] device bridge_slave_0 left promiscuous mode [ 1380.517261] bridge0: port 1(bridge_slave_0) entered disabled state [ 1384.001609] audit: type=1400 audit(4294968362.150:126): avc: denied { map } for pid=30033 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 1387.373411] device hsr_slave_1 left promiscuous mode [ 1387.415551] device hsr_slave_0 left promiscuous mode [ 1387.526695] team0 (unregistering): Port device team_slave_1 removed [ 1387.546576] team0 (unregistering): Port device team_slave_0 removed [ 1387.566412] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1387.656174] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1387.814037] bond0 (unregistering): Released all slaves [ 1387.958611] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1387.975947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1388.008701] team0: Port device team_slave_0 added [ 1388.018363] team0: Port device team_slave_1 added [ 1388.133730] device hsr_slave_0 entered promiscuous mode [ 1388.171030] device hsr_slave_1 entered promiscuous mode [ 1388.305800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1388.343767] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1388.374062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1388.386414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1388.409661] 8021q: adding VLAN 0 to HW filter on device team0 [ 1388.419795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1388.433774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1388.445221] bridge0: port 1(bridge_slave_0) entered blocking state [ 1388.451615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1388.475941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1388.486895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1388.497049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1388.508845] bridge0: port 2(bridge_slave_1) entered blocking state [ 1388.515235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1388.529218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1388.556675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1388.570231] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1388.578449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1388.597099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1388.621600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1388.644484] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1388.664080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1388.714235] 8021q: adding VLAN 0 to HW filter on device batadv0 06:46:07 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f00000000c0)=0x9, 0x4) 06:46:07 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) getpeername$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) 06:46:07 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x300}, &(0x7f0000000200), 0x0) 06:46:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x545d, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:07 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x40000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1389.844183] FAULT_INJECTION: forcing a failure. [ 1389.844183] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.896847] CPU: 0 PID: 30052 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1389.904169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.913530] Call Trace: [ 1389.916137] dump_stack+0x172/0x1f0 [ 1389.919794] should_fail.cold+0xa/0x1b [ 1389.923703] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1389.928830] ? lock_downgrade+0x810/0x810 [ 1389.932993] ? ___might_sleep+0x163/0x280 [ 1389.937163] __should_failslab+0x121/0x190 [ 1389.941412] should_failslab+0x9/0x14 [ 1389.945223] kmem_cache_alloc_trace+0x2d1/0x760 [ 1389.949915] kobject_uevent_env+0x2fb/0x1030 [ 1389.954342] kobject_uevent+0x20/0x26 [ 1389.958158] lo_ioctl+0x100b/0x20d0 [ 1389.961800] ? lo_rw_aio+0x1530/0x1530 [ 1389.965699] blkdev_ioctl+0xee8/0x1c40 [ 1389.969597] ? blkpg_ioctl+0xa90/0xa90 [ 1389.973503] ? find_held_lock+0x35/0x130 [ 1389.977572] ? debug_check_no_obj_freed+0x200/0x464 [ 1389.982603] ? __fget+0x340/0x540 [ 1389.986064] ? ___might_sleep+0x163/0x280 [ 1389.990226] block_ioctl+0xee/0x130 [ 1389.993948] ? blkdev_fallocate+0x410/0x410 [ 1389.998282] do_vfs_ioctl+0xd6e/0x1390 [ 1390.002179] ? selinux_file_ioctl+0x46f/0x5e0 [ 1390.006680] ? selinux_file_ioctl+0x125/0x5e0 [ 1390.011184] ? ioctl_preallocate+0x210/0x210 [ 1390.015597] ? selinux_file_mprotect+0x620/0x620 [ 1390.020367] ? iterate_fd+0x360/0x360 [ 1390.024176] ? do_sys_open+0x31d/0x5d0 [ 1390.028076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1390.033622] ? security_file_ioctl+0x93/0xc0 [ 1390.038036] ksys_ioctl+0xab/0xd0 [ 1390.041502] __x64_sys_ioctl+0x73/0xb0 [ 1390.045400] do_syscall_64+0x103/0x610 [ 1390.049305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.054498] RIP: 0033:0x457c97 [ 1390.057700] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1390.076609] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1390.084320] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 06:46:08 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400000000001, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8004}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x917, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x841) write$sndseq(r0, &(0x7f0000000000)=[{0x5, 0x1000, 0x0, 0x0, @tick, {0x101}, {0xa36, 0x400000007}, @ext={0xbb, &(0x7f0000000040)="4a6b1aac1973c5f22ecdde5f88106dd23c4715ea511107e3bf5a37b2a00e85387fa7a1b616f271869b46015a62624773f59d1f75dd378e9559bfb095a757eadfc02af6fef90ad9e99f19d000c31443477a81b5e4331063e7135f0c166efe89b04de0d91e724cc09d60889b8cce7f966118223a0c03333bc96aa624d16500b15b35b47d6c22da16e65bd37a8504a7c9d22cf41231b75e339815644250360b4b62ebaae3f842bc4681f346a53fde7fd1663640b8568144f22a32a6ce"}}], 0x30) 06:46:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5460, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:08 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x900}, &(0x7f0000000200), 0x0) [ 1390.091590] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1390.099208] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1390.106492] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1390.113770] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1390.151384] gfs2: commit mount option requires a positive numeric argument [ 1390.164218] gfs2: can't parse mount arguments 06:46:08 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000100)={'mangle\x00', 0x8e, "5032d3c7abd8a8751dd54409df28785459cb1cdc7867e935095c37a38c60b628cdcc40d299f4250c7ca75dd0c644d4e998e1324c1449b6d9822358a039811af63f17e5420ad0badd95e3bd39677754ff524cae8f2d8de32d0e41a4285e953de928da62e0c750cd696bab77807dc0f66a8a3166e35634f9c47d860e9060c1f7280cb32b76089ce6a83fca036939b5"}, &(0x7f00000001c0)=0xb2) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}}, 0x88) 06:46:08 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) r2 = getuid() r3 = getpgid(0xffffffffffffffff) ptrace$getregset(0x4204, r3, 0x200, &(0x7f0000000b40)={&(0x7f0000000ac0)=""/90, 0x5a}) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff, 0x7, &(0x7f0000000700)=[{&(0x7f0000000180)="f94aae469455588da441f0f75d3f043e5438c04956455322bd34f88c7cd3bf2bffedea8801466c7a7afe32971a7271248e36ec2f09d0e04183b0a983851f062898232dc058aeeb63e4d2c6", 0x4b, 0x101}, {&(0x7f0000000200)="eb367b65c3bf55b42e7f24ec5c86547f396f3121ba75d9637397bd78b550027ba068aab0e3edba99a446905bc4388e6657680420947a035585e3ccba1d9ab6b45509f904d7dc9bde1a2d268fa506671b44d76428ffe40ef9406291238682e6d7ce5296641ccae510350eac2861edd7af3d6cc3f9d75c6a5ce937c16a88908b370dc0afbba9becea2f799e26cc9d332b0e5f1129d48badf0f6e29a2a067f6f119ab96361b182e8283956c34fef0efbbdb847ac884bd09c5a10062cb99ad0121efb4074356d705415c94e9e8b4cd41947c9a2309", 0xd3, 0x401}, {&(0x7f0000000300)="1b8d53d87e553287460d355ec7dbe12f4c50da538cc0c0325b28801456d27647996150e6d3141cd4e0118e5f277c73a1834723b3aa8b619861b3312278901b8965c7b76adf9e254999b3fdd62ddcdc874b383f5f96f0bc8d7b07e9c932faa26c739b3f2b4ad78d7cafe4acd61d30bc75303b6ffabd3532725930a8b7bb93940f", 0x80, 0x1f}, {&(0x7f0000000380)="cdb14fcbd957b72f032a44a894966a4db5ab175d4a576302e3112f4f77eddef016744f9ff3077c471d744871743704bbfb0a7c322526c59ad814d7d944865087719541ef367a700ad2a2699929572d86a3", 0x51, 0x5}, {&(0x7f0000000480)="6e75c96ce53cc0accabcf01708feb141eccb2558edbdbb7f3a1f5b6d9b7c7b2e27a5409c0d391ddae8e5a5374e867e4696320f05814e90b40956612d9933ed508c3782f92a6afb46fae2b2fb231e6f9248a7e43c2ba2c115d108ec9e2cbac7d9449179f9fead1ecd593faef637bc1a764f50b9b04b189f48cb4a18499e016bbd3868482f77313f3e258b6fe838233a8fa05b97da353b714f75e77fb86b1414c5470e5b31389bf632afe5d637e07ff196192e9c0feff3f3912b3024e788520c07317eca", 0xc3, 0x3}, {&(0x7f0000000580)="505eeda61c9b9149689753988258f36cf9336bae2416fed1c9526b780ee156da25aa58b5cccc01f359af3e6d8534956ad5a4815901f2f0aa70bb2f8d74f76bb395f61314011c9a1db33630df131c", 0x4e, 0x3e1f}, {&(0x7f0000000600)="e508a866794edd16f44f07464e61d88a31afaa82d8b9f853ced9efed7437afdda63b9c67bf368cebcd629724dc0b68bcfdc1ae28050b9be214c6bdcb71b4375bec7f8279c6572d9dd587e188086dc02b9d03c82d4035d91b503fb8d8a8ca28cf0ee3d25fad7e2a11f32ace4dbb988cf409f0a98d67bf39e1415f7fbc9ce0872facf60a1c82ddd50ffc2b0d985ce8fbb9e693d1fda963d25d675269e5b94e840d3a34398ca68e015d01c3109d45479014bb69e0bf8242d1814b015a19b7dabc934024d0476705ca8a2aefe0de6086f98ffe84ded23f890d95", 0xd8, 0x4}], 0x40000, &(0x7f0000000a00)={[{@rtdev={'rtdev', 0x3d, './file0'}}, {@qnoenforce='qnoenforce'}, {@nolazytime='nolazytime'}, {@biosize={'biosize', 0x3d, 0x1d1}}], [{@uid_lt={'uid<', r0}}, {@euid_gt={'euid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0'}}, {@uid_lt={'uid<', r2}}, {@measure='measure'}]}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) r6 = geteuid() getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) fchown(r5, r6, r7) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x6b6b6b00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1390.300928] XFS (loop2): Invalid superblock magic number [ 1390.458390] gfs2: commit mount option requires a positive numeric argument [ 1390.486150] gfs2: can't parse mount arguments 06:46:09 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x9, &(0x7f0000000100)=0x2) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r3) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) r7 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r7, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:09 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x34000}, &(0x7f0000000200), 0x0) 06:46:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x40049409, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:09 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x10001) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @bt={0xfffffffffffffffd, 0x800, 0x1, 0x1, 0x8, 0xffffffff, 0x2, 0x3, 0x20, 0x1, 0x5, 0x7fff, 0x8, 0x0, 0x1d, 0x1d}}) 06:46:09 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x100000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1391.097308] FAULT_INJECTION: forcing a failure. [ 1391.097308] name failslab, interval 1, probability 0, space 0, times 0 06:46:09 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000200)={0x4}, 0x4) getpeername$inet6(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x1c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000001c0)) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x4000000000, 0x0, 0x0, @time={0x77359400}, {0xffffffffffffffff}, {0x2}, @note={0xffffffff, 0x409}}], 0x30) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) 06:46:09 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x400300}, &(0x7f0000000200), 0x0) 06:46:09 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0xffffffffffffff72) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x2, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r2) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xa1bcfa3) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000240)={0x9, 0x3ff, 0x0, 0x100000001}, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x9, 0x2, 0x4, 0x0, 0x1, 0x0, 0xd49, 0x716, 0x2, 0xd18, 0x3f, 0x81, 0x1, 0x7, 0x4, 0x6, 0x3, 0x7, 0x206, 0x0, 0x759, 0x1, 0x625b, 0x5, 0x1ff, 0x1, 0x8, 0x5, 0x991, 0x8, 0x7fffffff, 0x3]}) 06:46:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x40086602, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1391.200756] CPU: 0 PID: 30115 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1391.208074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.217433] Call Trace: [ 1391.220040] dump_stack+0x172/0x1f0 [ 1391.223682] should_fail.cold+0xa/0x1b [ 1391.227564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.232675] ? lock_downgrade+0x810/0x810 [ 1391.236835] ? ___might_sleep+0x163/0x280 [ 1391.240999] __should_failslab+0x121/0x190 [ 1391.245241] should_failslab+0x9/0x14 06:46:09 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000426bd7000fedbdf250200000008000100000000000c00020000100000000000000c00020000000000000000000c0002003f000000000000000c0008000080000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) write$sndseq(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x4000000000000000, @time, {}, {0x9}, @note={0xffffffff, 0x409}}], 0x30) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000)=0x7fff, 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x2, 0x400000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) kcmp(r2, r3, 0x0, r0, r0) [ 1391.249045] kmem_cache_alloc+0x2be/0x710 [ 1391.253208] ? lock_downgrade+0x810/0x810 [ 1391.257384] ? kasan_check_read+0x11/0x20 [ 1391.261549] __kernfs_new_node+0xef/0x690 [ 1391.265705] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1391.270476] ? wait_for_completion+0x440/0x440 [ 1391.275092] ? mutex_unlock+0xd/0x10 [ 1391.278812] ? kernfs_activate+0x192/0x1f0 [ 1391.283053] kernfs_new_node+0x99/0x130 [ 1391.287040] __kernfs_create_file+0x51/0x340 [ 1391.291459] sysfs_add_file_mode_ns+0x222/0x560 [ 1391.296141] internal_create_group+0x35b/0xc40 [ 1391.300731] ? bd_set_size+0x89/0xb0 [ 1391.304461] ? remove_files.isra.0+0x190/0x190 [ 1391.309058] sysfs_create_group+0x20/0x30 [ 1391.313212] lo_ioctl+0xf8f/0x20d0 [ 1391.316762] ? lo_rw_aio+0x1530/0x1530 [ 1391.320669] blkdev_ioctl+0xee8/0x1c40 [ 1391.324564] ? blkpg_ioctl+0xa90/0xa90 [ 1391.328462] ? find_held_lock+0x35/0x130 [ 1391.332530] ? debug_check_no_obj_freed+0x200/0x464 [ 1391.337558] ? __fget+0x340/0x540 [ 1391.341110] ? ___might_sleep+0x163/0x280 [ 1391.345269] block_ioctl+0xee/0x130 [ 1391.348902] ? blkdev_fallocate+0x410/0x410 [ 1391.353232] do_vfs_ioctl+0xd6e/0x1390 [ 1391.357129] ? selinux_file_ioctl+0x46f/0x5e0 [ 1391.361646] ? selinux_file_ioctl+0x125/0x5e0 [ 1391.366147] ? ioctl_preallocate+0x210/0x210 [ 1391.370561] ? selinux_file_mprotect+0x620/0x620 [ 1391.375334] ? iterate_fd+0x360/0x360 [ 1391.379161] ? do_sys_open+0x31d/0x5d0 [ 1391.383065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1391.388613] ? security_file_ioctl+0x93/0xc0 [ 1391.393035] ksys_ioctl+0xab/0xd0 [ 1391.396495] __x64_sys_ioctl+0x73/0xb0 [ 1391.400403] do_syscall_64+0x103/0x610 [ 1391.404301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.409496] RIP: 0033:0x457c97 [ 1391.412697] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1391.431608] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1391.439327] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1391.446611] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1391.453897] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1391.461169] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1391.468714] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1391.493448] gfs2: commit mount option requires a positive numeric argument [ 1391.500490] gfs2: can't parse mount arguments 06:46:09 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000000040400, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x200000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:09 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x2000000}, &(0x7f0000000200), 0x0) [ 1391.621537] XFS (loop2): Invalid superblock magic number 06:46:09 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x12802, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) [ 1391.716768] gfs2: commit mount option requires a positive numeric argument 06:46:09 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1391.778667] gfs2: can't parse mount arguments 06:46:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x40087602, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1391.852474] FAULT_INJECTION: forcing a failure. [ 1391.852474] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.876582] CPU: 0 PID: 30163 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1391.883902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.893265] Call Trace: [ 1391.895877] dump_stack+0x172/0x1f0 [ 1391.899524] should_fail.cold+0xa/0x1b [ 1391.903427] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.908542] ? lock_downgrade+0x810/0x810 [ 1391.912698] ? ___might_sleep+0x163/0x280 [ 1391.916860] __should_failslab+0x121/0x190 [ 1391.921107] should_failslab+0x9/0x14 [ 1391.924912] kmem_cache_alloc_trace+0x2d1/0x760 [ 1391.929599] kobject_uevent_env+0x2fb/0x1030 [ 1391.934020] kobject_uevent+0x20/0x26 [ 1391.937834] lo_ioctl+0x100b/0x20d0 [ 1391.941473] ? lo_rw_aio+0x1530/0x1530 [ 1391.945367] blkdev_ioctl+0xee8/0x1c40 [ 1391.949264] ? blkpg_ioctl+0xa90/0xa90 [ 1391.953153] ? find_held_lock+0x35/0x130 [ 1391.957222] ? debug_check_no_obj_freed+0x200/0x464 [ 1391.962249] ? __fget+0x340/0x540 [ 1391.965712] ? ___might_sleep+0x163/0x280 [ 1391.969870] block_ioctl+0xee/0x130 [ 1391.973497] ? blkdev_fallocate+0x410/0x410 [ 1391.977823] do_vfs_ioctl+0xd6e/0x1390 [ 1391.981722] ? selinux_file_ioctl+0x46f/0x5e0 [ 1391.986229] ? selinux_file_ioctl+0x125/0x5e0 [ 1391.990743] ? ioctl_preallocate+0x210/0x210 [ 1391.995156] ? selinux_file_mprotect+0x620/0x620 [ 1391.999922] ? iterate_fd+0x360/0x360 [ 1392.003734] ? do_sys_open+0x31d/0x5d0 [ 1392.007631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.013173] ? security_file_ioctl+0x93/0xc0 [ 1392.017597] ksys_ioctl+0xab/0xd0 [ 1392.021061] __x64_sys_ioctl+0x73/0xb0 [ 1392.024958] do_syscall_64+0x103/0x610 [ 1392.028858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.034052] RIP: 0033:0x457c97 06:46:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x300000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:10 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x430000, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:10 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x3000000}, &(0x7f0000000200), 0x0) [ 1392.037250] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.056337] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1392.064133] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1392.071404] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1392.078852] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1392.086124] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1392.093398] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1392.145595] gfs2: commit mount option requires a positive numeric argument [ 1392.162011] gfs2: can't parse mount arguments [ 1392.247204] XFS (loop2): Invalid superblock magic number 06:46:10 executing program 0: syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x3ffffffffffffe, 0xfffffffffffffffe) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f00000000c0)={0x20, 0x2, 0x8000, 0xfffffffffffffffb, 0x1, 0x1, 0x8}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x400000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:10 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) timer_create(0x3, &(0x7f0000000040)={0x0, 0x5, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) sendmsg(r0, &(0x7f00000019c0)={&(0x7f0000000240)=@pptp={0x18, 0x2, {0x2, @loopback}}, 0x80, &(0x7f0000001680)=[{&(0x7f00000002c0)="d70c479ae5cffe0edcf56606ab33e414257753f3a4e224d0420162d57b035213f6f2ce1acf90a9827121ddf4d87a140bb970124aa650d1b6f049732909910fafe4910a2aabe186ca72932942d540ddababf960e53b723defd133dd51f2329d8e07f1f0b08af6948d4d0c1cd39e6598a91b1c6576332d8dc0936064db6c332f0f60d2a0a18a4f9f76e2e30737301281e7", 0x90}, {&(0x7f0000000380)="c8fdf78288a707f41536bf7010738c92f00c83136e8d9a2d8daa8c212788d54eb77f29106cbc40497a36c26c", 0x2c}, {&(0x7f00000003c0)="02b8779c3f5367ef0f5f1f620b1e12e82365e9196cafcc69643d0b3c5e8475b9ada861a705d59eb0ba590a04830c4cd98aebd7f70b9c787e8860eb35ad5abb72bd1acded456f4a9e9b68af8b626e139fa327b8cf1c16c6e2da42b12daccff532062292f3696f", 0x66}, {&(0x7f0000000480)="e8deca38070d35d526b9f17d0e4548a76efee6e6a22c6ff924715a4484bd6f3652c17408d6814646da950ff2ca8f5a63723d665b89409d95035189cc5dac5ee1eec08e36ae5d9b566eb3dfd054", 0x4d}, {&(0x7f0000000500)="3024149470891d6e498f739e6f33f63d0830df6d4bb199959f8342044aafe97c134c7d7adadf9449611b82415aee6587c62406124df939a7db8feacb13", 0x3d}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="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", 0xff}, {&(0x7f0000001640)="6da19599cdb25cd436cb5741fb1e", 0xe}], 0x8, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x298}, 0x5) timer_settime(r1, 0x1, &(0x7f0000000140)={{r2, r3+10000000}, {r4, r5+30000000}}, &(0x7f0000000180)) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) bind$bt_l2cap(r0, &(0x7f00000001c0)={0x1f, 0x2, {0x7, 0x4, 0x0, 0x4, 0xfff, 0x6}, 0x9, 0x8001}, 0xe) 06:46:10 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x9000000}, &(0x7f0000000200), 0x0) 06:46:10 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x4020940d, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1392.460451] FAULT_INJECTION: forcing a failure. [ 1392.460451] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.486877] CPU: 1 PID: 30196 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1392.494196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.503563] Call Trace: [ 1392.506169] dump_stack+0x172/0x1f0 [ 1392.509825] should_fail.cold+0xa/0x1b [ 1392.513735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1392.518856] ? lock_downgrade+0x810/0x810 [ 1392.523023] ? ___might_sleep+0x163/0x280 [ 1392.527191] __should_failslab+0x121/0x190 [ 1392.531450] should_failslab+0x9/0x14 [ 1392.535270] kmem_cache_alloc_node_trace+0x270/0x720 [ 1392.540495] ? __alloc_skb+0xd5/0x5e0 [ 1392.544727] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1392.550202] __kmalloc_node_track_caller+0x3d/0x70 [ 1392.555165] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1392.559858] __alloc_skb+0x10b/0x5e0 [ 1392.563585] ? skb_scrub_packet+0x440/0x440 [ 1392.567927] ? kasan_check_read+0x11/0x20 [ 1392.572099] alloc_uevent_skb+0x83/0x1e2 [ 1392.576178] kobject_uevent_env+0xa63/0x1030 [ 1392.580607] kobject_uevent+0x20/0x26 [ 1392.584423] lo_ioctl+0x100b/0x20d0 [ 1392.588066] ? lo_rw_aio+0x1530/0x1530 [ 1392.591971] blkdev_ioctl+0xee8/0x1c40 [ 1392.595870] ? blkpg_ioctl+0xa90/0xa90 [ 1392.599765] ? find_held_lock+0x35/0x130 [ 1392.603841] ? debug_check_no_obj_freed+0x200/0x464 [ 1392.608873] ? __fget+0x340/0x540 [ 1392.612338] ? ___might_sleep+0x163/0x280 [ 1392.616498] block_ioctl+0xee/0x130 [ 1392.620132] ? blkdev_fallocate+0x410/0x410 [ 1392.624472] do_vfs_ioctl+0xd6e/0x1390 [ 1392.628379] ? selinux_file_ioctl+0x46f/0x5e0 [ 1392.632887] ? selinux_file_ioctl+0x125/0x5e0 [ 1392.637402] ? ioctl_preallocate+0x210/0x210 [ 1392.641828] ? selinux_file_mprotect+0x620/0x620 [ 1392.646622] ? iterate_fd+0x360/0x360 [ 1392.650436] ? do_sys_open+0x31d/0x5d0 [ 1392.654345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1392.659897] ? security_file_ioctl+0x93/0xc0 [ 1392.664332] ksys_ioctl+0xab/0xd0 [ 1392.667886] __x64_sys_ioctl+0x73/0xb0 [ 1392.671787] do_syscall_64+0x103/0x610 [ 1392.675695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.680890] RIP: 0033:0x457c97 [ 1392.684132] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.703051] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:46:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x80045432, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:10 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) getsockopt$sock_int(r0, 0x1, 0x1, &(0x7f00000001c0), &(0x7f0000000140)=0x4) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000180)={0x1, 0x6ee0}) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) accept4$nfc_llcp(r0, 0x0, &(0x7f0000000100), 0x800) 06:46:10 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x10000000}, &(0x7f0000000200), 0x0) [ 1392.711422] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1392.718753] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1392.726044] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1392.733322] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1392.740600] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:10 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x40040) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x59094a2a35fdb9e, 0x1, 0x6, [@bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) r3 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@rand_addr="34dae1b2307a82c91ce31446cfe87797", @mcast2, @rand_addr="11de942598c77368cb761cd0dfaf4e6f", 0xa001, 0x6, 0x80000000, 0x500, 0x0, 0x2, r4}) ptrace$getregs(0xe, r3, 0x80000000, &(0x7f0000000480)=""/4096) 06:46:11 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) [ 1392.781204] gfs2: commit mount option requires a positive numeric argument [ 1392.808803] gfs2: can't parse mount arguments 06:46:11 executing program 5: write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) [ 1392.880598] XFS (loop2): Invalid superblock magic number 06:46:11 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000003c0)={0x1000, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}}}, 0x108) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x80045440, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x500000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:11 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 06:46:11 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x200000101880, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:11 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1393.691101] FAULT_INJECTION: forcing a failure. [ 1393.691101] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.714758] CPU: 1 PID: 30244 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1393.722344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.731716] Call Trace: [ 1393.734329] dump_stack+0x172/0x1f0 [ 1393.737980] should_fail.cold+0xa/0x1b [ 1393.741891] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1393.747027] ? lock_downgrade+0x810/0x810 [ 1393.751205] ? ___might_sleep+0x163/0x280 [ 1393.755369] __should_failslab+0x121/0x190 [ 1393.759619] should_failslab+0x9/0x14 [ 1393.763435] kmem_cache_alloc_node_trace+0x270/0x720 [ 1393.768550] ? __alloc_skb+0xd5/0x5e0 [ 1393.772632] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1393.778098] __kmalloc_node_track_caller+0x3d/0x70 [ 1393.783090] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1393.787772] __alloc_skb+0x10b/0x5e0 [ 1393.791510] ? skb_scrub_packet+0x440/0x440 [ 1393.795845] ? kasan_check_read+0x11/0x20 [ 1393.800030] alloc_uevent_skb+0x83/0x1e2 [ 1393.804117] kobject_uevent_env+0xa63/0x1030 [ 1393.808691] kobject_uevent+0x20/0x26 [ 1393.812660] lo_ioctl+0x100b/0x20d0 [ 1393.816387] ? lo_rw_aio+0x1530/0x1530 [ 1393.820289] blkdev_ioctl+0xee8/0x1c40 [ 1393.824202] ? blkpg_ioctl+0xa90/0xa90 [ 1393.828098] ? find_held_lock+0x35/0x130 [ 1393.832172] ? debug_check_no_obj_freed+0x200/0x464 [ 1393.837226] ? __fget+0x340/0x540 [ 1393.840689] ? ___might_sleep+0x163/0x280 [ 1393.844848] block_ioctl+0xee/0x130 [ 1393.848479] ? blkdev_fallocate+0x410/0x410 [ 1393.852825] do_vfs_ioctl+0xd6e/0x1390 [ 1393.856721] ? selinux_file_ioctl+0x46f/0x5e0 [ 1393.861232] ? selinux_file_ioctl+0x125/0x5e0 [ 1393.865742] ? ioctl_preallocate+0x210/0x210 [ 1393.870158] ? selinux_file_mprotect+0x620/0x620 [ 1393.874956] ? iterate_fd+0x360/0x360 [ 1393.878770] ? do_sys_open+0x31d/0x5d0 [ 1393.882675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1393.888234] ? security_file_ioctl+0x93/0xc0 [ 1393.892656] ksys_ioctl+0xab/0xd0 [ 1393.896121] __x64_sys_ioctl+0x73/0xb0 [ 1393.900282] do_syscall_64+0x103/0x610 [ 1393.904193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.909390] RIP: 0033:0x457c97 [ 1393.912594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1393.931517] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:46:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x80086601, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:12 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x3, 0x0, 0x0, @tick, {0x0, 0x800}, {}, @note={0xffffffff, 0x409}}], 0xfffffffffffffcac) 06:46:12 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), 0x0) [ 1393.939248] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1393.946522] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1393.953800] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1393.962383] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1393.969759] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:12 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x5, 0x2000) r1 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x200, 0x100) sendmsg$nfc_llcp(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x27, 0x0, 0x0, 0x6, 0x7fff, 0xffffffff, "ae1f7735c0c21b3a15532da9e3d415770df4037591722a0ad0d1469a0d94eeb273f73fe81c956b69c70acab62fa24b5345c22e724001279dbce92665c14ba4", 0xa}, 0x60, &(0x7f00000001c0)=[{&(0x7f0000000100)="24b529982fbaf35a57b35f023f1e9e9f6ce2864f49e6aff3944d97ca5e72f1d81b126a7488928878e818ae97d3c61aa79a935ee73a2f5d30f0c961b8fcfd7d67be11c216b952f87e3e5013e4db1997fcfdea2354e59e1aebe068fe3e46ba778ff8030cc5728bb85adf46118a6bd42d37b49b842395ee1bb191ec8c85bdddac73364934fc4a36dc8ae34e8138fa8be737529e689ce9e52a8ad623c7db07ce72efd887bbd207", 0xa5}], 0x1, &(0x7f0000000200)={0xe0, 0x105, 0x101, "a7203219a7de35fc15dbd547ee8066a532d223831c2cd78a35f81ef46048835577ce93bdd1713fb363549fce4d9c96120d450812e839e9e00cddffa809c47da7f3f295c2a846a5f4a5296915d506c25679f17fa27aa46ec5b0fefc2725625ee3dce14baa696cbc3c30731274e9cbd82e271211800bd21eddf3c7d349a4bbce8cc415c81df3904904409d71b776732e0a17d5c87db7b1e894108e4653365ade2cbac4f45b21f29429892e0eeccfb13f15259b670bc95443c76c3a8c9593d2c8c090b1e58de547fb8e71242959dd2b"}, 0xe0, 0x80c0}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) clock_gettime(0x7, &(0x7f0000000040)) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) [ 1394.016138] gfs2: commit mount option requires a positive numeric argument [ 1394.028562] gfs2: can't parse mount arguments 06:46:12 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x40030000000000}, &(0x7f0000000200), 0x0) 06:46:12 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10003c, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffffffffffffffe, @tick, {0x0, 0x7fff}, {}, @queue={0x3, {0x1, 0x9b174a5}}}], 0x30) [ 1394.154785] XFS (loop2): Invalid superblock magic number 06:46:13 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xffffffff00000001, 0x200000) connect$caif(r0, &(0x7f0000000100)=@dbg={0x25, 0x0, 0x100000000}, 0x18) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r3) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x600000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x80087601, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:13 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) fcntl$getflags(r0, 0x40b) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x3, 0x5, 0x8, 0x100000001, 0xfffffffffffffffe, 0x4, 0x0, 0x81, 0x1000, 0x7, 0x5, 0x4, 0x1f, 0x40, 0x80000001, 0x7, 0x100000000, 0x2, 0xc4, 0x2964, 0x10000, 0x6, 0x0, 0x9252, 0x8, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x80000001, 0x6]}) semget(0x2, 0x0, 0x1a0) 06:46:13 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:13 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000200), 0x0) [ 1394.982506] FAULT_INJECTION: forcing a failure. [ 1394.982506] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.002171] CPU: 0 PID: 30292 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1395.009504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.018873] Call Trace: [ 1395.021483] dump_stack+0x172/0x1f0 [ 1395.025141] should_fail.cold+0xa/0x1b 06:46:13 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200), 0x0) 06:46:13 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0x3, {0x5, 0x1ff, 0x4, 0x101}, {0x8, 0x100000000, 0x1, 0xd4d}, {0x9, 0xfffffffffffffffd}}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) [ 1395.029048] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1395.034166] ? lock_downgrade+0x810/0x810 [ 1395.038330] ? ___might_sleep+0x163/0x280 [ 1395.042506] __should_failslab+0x121/0x190 [ 1395.046756] should_failslab+0x9/0x14 [ 1395.050568] kmem_cache_alloc+0x2be/0x710 [ 1395.054727] ? refcount_add_not_zero_checked+0x240/0x240 [ 1395.060291] ? lock_downgrade+0x810/0x810 [ 1395.064455] skb_clone+0x150/0x3b0 [ 1395.068002] netlink_broadcast_filtered+0x870/0xb20 [ 1395.073037] netlink_broadcast+0x3a/0x50 [ 1395.077936] kobject_uevent_env+0xa94/0x1030 [ 1395.082385] kobject_uevent+0x20/0x26 [ 1395.086200] lo_ioctl+0x100b/0x20d0 [ 1395.089849] ? lo_rw_aio+0x1530/0x1530 [ 1395.093748] blkdev_ioctl+0xee8/0x1c40 [ 1395.097648] ? blkpg_ioctl+0xa90/0xa90 [ 1395.101549] ? find_held_lock+0x35/0x130 [ 1395.105619] ? debug_check_no_obj_freed+0x200/0x464 [ 1395.110654] ? __fget+0x340/0x540 [ 1395.114136] ? ___might_sleep+0x163/0x280 [ 1395.118301] block_ioctl+0xee/0x130 [ 1395.121933] ? blkdev_fallocate+0x410/0x410 [ 1395.126264] do_vfs_ioctl+0xd6e/0x1390 06:46:13 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x0, 0x80000) [ 1395.130169] ? selinux_file_ioctl+0x46f/0x5e0 [ 1395.134845] ? selinux_file_ioctl+0x125/0x5e0 [ 1395.139353] ? ioctl_preallocate+0x210/0x210 [ 1395.143781] ? selinux_file_mprotect+0x620/0x620 [ 1395.148549] ? iterate_fd+0x360/0x360 [ 1395.152375] ? do_sys_open+0x31d/0x5d0 [ 1395.156284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1395.161831] ? security_file_ioctl+0x93/0xc0 [ 1395.166256] ksys_ioctl+0xab/0xd0 [ 1395.169727] __x64_sys_ioctl+0x73/0xb0 [ 1395.173630] do_syscall_64+0x103/0x610 [ 1395.177535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1395.182762] RIP: 0033:0x457c97 [ 1395.185960] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1395.204877] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1395.212619] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457c97 [ 1395.220090] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:46:13 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x480082) 06:46:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0xc0045878, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1395.227497] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1395.234785] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1395.242071] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1395.293098] gfs2: commit mount option requires a positive numeric argument [ 1395.304820] gfs2: can't parse mount arguments 06:46:13 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200), 0x0) [ 1395.409630] XFS (loop2): Invalid superblock magic number 06:46:14 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0xfffffffffffffffc, 0x10800) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x8, 0xa, 0x1, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:14 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) write$sndseq(r0, &(0x7f0000000040)=[{0x9, 0xe6d, 0x2, 0x24000000, @tick=0x3c8, {0x8, 0xaaf3}, {0x101, 0x7}, @ext={0x1000, &(0x7f0000000480)="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"}}], 0x30) getsockopt$inet_buf(r0, 0x0, 0x24, &(0x7f0000000100)=""/122, &(0x7f0000000180)=0x7a) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x100000001) 06:46:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x700000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0xc0045878, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:14 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:14 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200), 0x0) [ 1395.941623] FAULT_INJECTION: forcing a failure. [ 1395.941623] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.963348] gfs2: commit mount option requires a positive numeric argument [ 1395.999770] CPU: 1 PID: 30348 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1396.007107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.010803] gfs2: can't parse mount arguments [ 1396.016471] Call Trace: [ 1396.016509] dump_stack+0x172/0x1f0 [ 1396.016529] should_fail.cold+0xa/0x1b [ 1396.016551] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1396.036210] ? lock_downgrade+0x810/0x810 [ 1396.040365] ? ___might_sleep+0x163/0x280 [ 1396.044521] __should_failslab+0x121/0x190 [ 1396.048767] should_failslab+0x9/0x14 [ 1396.052570] kmem_cache_alloc+0x2be/0x710 [ 1396.056731] getname_flags+0xd6/0x5b0 [ 1396.060545] do_mkdirat+0xa0/0x2a0 [ 1396.064094] ? __ia32_sys_mknod+0xb0/0xb0 [ 1396.068250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1396.073008] ? do_syscall_64+0x26/0x610 [ 1396.076988] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.082353] ? do_syscall_64+0x26/0x610 [ 1396.086331] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1396.090931] __x64_sys_mkdir+0x5c/0x80 [ 1396.094838] do_syscall_64+0x103/0x610 [ 1396.098737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.103925] RIP: 0033:0x457247 [ 1396.107122] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1396.126026] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1396.133747] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1396.141019] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 06:46:14 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000040)) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:14 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) [ 1396.148296] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1396.155565] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1396.162852] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0xc0189436, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:14 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000080)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000040)={0x3}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f00000000c0)=0x2) 06:46:14 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x800000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1396.363881] FAULT_INJECTION: forcing a failure. [ 1396.363881] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.414299] gfs2: commit mount option requires a positive numeric argument [ 1396.421892] CPU: 1 PID: 30373 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1396.429182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.429189] Call Trace: [ 1396.429213] dump_stack+0x172/0x1f0 [ 1396.429233] should_fail.cold+0xa/0x1b [ 1396.447148] gfs2: can't parse mount arguments [ 1396.448657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1396.448674] ? security_compute_sid.part.0+0xbcb/0x1600 [ 1396.448694] ? ___might_sleep+0x163/0x280 [ 1396.458275] __should_failslab+0x121/0x190 [ 1396.458297] should_failslab+0x9/0x14 [ 1396.475828] kmem_cache_alloc+0x2be/0x710 [ 1396.479988] ? security_compute_sid.part.0+0xbea/0x1600 [ 1396.485371] ? rcu_read_lock_sched_held+0x110/0x130 [ 1396.490391] ? ebitmap_destroy+0xba/0xf0 [ 1396.494463] ? ratelimit_state_init+0xb0/0xb0 [ 1396.498967] ext4_alloc_inode+0x1f/0x640 [ 1396.503037] ? ratelimit_state_init+0xb0/0xb0 [ 1396.507538] alloc_inode+0x66/0x190 [ 1396.511174] new_inode_pseudo+0x19/0xf0 [ 1396.515152] new_inode+0x1f/0x40 [ 1396.518520] __ext4_new_inode+0x3cb/0x52c0 [ 1396.522765] ? kasan_check_read+0x11/0x20 [ 1396.526922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1396.532469] ? ext4_free_inode+0x1470/0x1470 [ 1396.536884] ? dquot_get_next_dqblk+0x180/0x180 [ 1396.541565] ? selinux_determine_inode_label+0x1b1/0x360 [ 1396.547031] ext4_mkdir+0x3d5/0xdf0 [ 1396.550670] ? ext4_init_dot_dotdot+0x520/0x520 [ 1396.555349] ? selinux_inode_mkdir+0x23/0x30 [ 1396.559756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1396.565296] ? security_inode_mkdir+0xee/0x120 [ 1396.569882] vfs_mkdir+0x433/0x690 [ 1396.573434] do_mkdirat+0x234/0x2a0 [ 1396.577068] ? __ia32_sys_mknod+0xb0/0xb0 [ 1396.581221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1396.585978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.591354] ? do_syscall_64+0x26/0x610 [ 1396.595333] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1396.599923] __x64_sys_mkdir+0x5c/0x80 [ 1396.603815] do_syscall_64+0x103/0x610 [ 1396.607711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.612897] RIP: 0033:0x457247 [ 1396.616088] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1396.635018] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1396.642729] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1396.650008] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1396.657279] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1396.664550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1396.671822] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:15 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0xa000) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000500)) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r2) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000003c0)={0xfffffffffffffffb, 0x1, 0x8000, 0x0, 0x0, [], [], [], 0x8, 0x2940}) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0xc020660b, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:15 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) fcntl$setpipe(r0, 0x407, 0xd9) 06:46:15 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0) 06:46:15 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x900000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:15 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200), 0x0) 06:46:15 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000180)) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xffffffffffffffff, @time={r1, r2+30000000}, {0x0, 0x2}, {0x0, 0xfffffffffffff5be}, @ext={0xe2, &(0x7f0000000040)="0d04f3d63f5d541c65a6c2e86397860d537dc951e7eb822aa1cc2320be136a52c7685e2f285c1fa05817ee89bf0faac57209e81daa70b305953a14e2aeef35cc48c03e2462cd11707298203ab7ec435252cc5510fc7235dbd5a6915720aa2f432565c7a4bddab7f75082ba6e2ca8966ef546466827e986ca8aad7664c7a5f48d8355f1a8c8278b5e980c9ed0e86916b7dc09825f82a0f2c12998e47538ded1187dd305004503d80f9227c2dda8fcb44fe601500bc74f4a0e21360a0511bb597add07643f1721d34eba79a432eae0846801e8fda2c64accab81911f2e732c43ca131a"}}], 0x29f) [ 1396.927545] FAULT_INJECTION: forcing a failure. [ 1396.927545] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.987343] gfs2: commit mount option requires a positive numeric argument [ 1396.995455] CPU: 1 PID: 30392 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1397.002760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.012120] Call Trace: [ 1397.012147] dump_stack+0x172/0x1f0 [ 1397.012167] should_fail.cold+0xa/0x1b [ 1397.012185] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1397.012202] ? lock_downgrade+0x810/0x810 [ 1397.012221] ? ___might_sleep+0x163/0x280 [ 1397.012240] __should_failslab+0x121/0x190 [ 1397.012258] should_failslab+0x9/0x14 [ 1397.012274] kmem_cache_alloc+0x2be/0x710 [ 1397.027446] ? __d_lookup+0x433/0x760 [ 1397.027461] ? lookup_dcache+0x23/0x140 [ 1397.027475] ? d_lookup+0xf9/0x260 [ 1397.039999] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1397.040022] __d_alloc+0x2e/0x8c0 [ 1397.040038] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1397.072285] d_alloc+0x4d/0x2b0 [ 1397.075711] __lookup_hash+0xcd/0x190 [ 1397.079637] filename_create+0x1a7/0x4f0 [ 1397.083719] ? kern_path_mountpoint+0x40/0x40 [ 1397.088226] ? strncpy_from_user+0x2a8/0x380 [ 1397.092648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1397.098373] ? getname_flags+0x277/0x5b0 [ 1397.102451] do_mkdirat+0xb5/0x2a0 [ 1397.106015] ? __ia32_sys_mknod+0xb0/0xb0 [ 1397.110258] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1397.115025] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.120393] ? do_syscall_64+0x26/0x610 [ 1397.124374] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1397.128973] __x64_sys_mkdir+0x5c/0x80 [ 1397.131115] gfs2: can't parse mount arguments [ 1397.132867] do_syscall_64+0x103/0x610 [ 1397.141234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.146534] RIP: 0033:0x457247 [ 1397.149736] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1397.168768] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1397.176701] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 06:46:15 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x3}, 0x10) 06:46:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) write$binfmt_elf32(r0, 0x0, 0x0) [ 1397.183999] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1397.191375] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1397.198664] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1397.205950] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xa00000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:15 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x100000000000, 0x101000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x3fffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x800) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) [ 1397.355679] gfs2: commit mount option requires a positive numeric argument [ 1397.386643] gfs2: can't parse mount arguments 06:46:16 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = epoll_create1(0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000240)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x14}, 0x2669f49}}, 0x0, 0x1ff, 0x0, "6c6a5240bdcda346d44b4ce3e6d0282e943ebbbc8b662aabb135b1ad8576bae2e6039193af6682f39d51b35a85ff85c92fc615f2194384bf2372b8de7b88d586efa21f149e2ba4fce1472fdd77c0c5db"}, 0xd8) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f00000000c0)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, 'syz1\x00', @bcast, 0xe1e2, 0x0, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = dup2(r6, r3) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r6, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000140)="006ae4ac39dcd8e2bb6efef95e7f4deba4b6432d574ba717d32bc487eba2", 0x1e) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x1, 0x4, &(0x7f0000ffc000/0x4000)=nil, 0x101}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x802, 0x0) 06:46:16 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200), 0x0) 06:46:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) r3 = semget$private(0x0, 0x3, 0x101) semctl$GETVAL(r3, 0x6, 0xc, &(0x7f0000000180)=""/69) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:16 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x9, 0x0, 0x0, @tick, {0xffffffffffffffff, 0x1000000000000000}, {0x100000, 0x9}, @control={0x1cd1, 0x8, 0x8}}], 0x30) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2040800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000140)=@getlink={0x264, 0x12, 0x4, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r2, 0x200, 0x11000}, [@IFLA_WEIGHT={0x8, 0xf, 0xc2bb}, @IFLA_VFINFO_LIST={0x1b4, 0x16, [{0x74, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x7, 0x5}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x101}}, @IFLA_VF_TRUST={0xc, 0x9, {0x8, 0x6}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xc5}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x3ed, 0xd816}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x0, 0x9}}, @IFLA_VF_TRUST={0xc, 0x9, {0xa0, 0x9}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x5, 0x3}}]}, {0x70, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x1f, 0x0, 0x3}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x7f}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x2e1, 0x1}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x4, 0x9}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7, 0xc5}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xa8b, 0x8}}, @IFLA_VF_VLAN={0x10, 0x2, {0x9, 0xfda, 0xcb7}}]}, {0x78, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x1000, 0xb561}}, @IFLA_VF_VLAN={0x10, 0x2, {0x100000001, 0x744, 0x2}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x5, 0x2543}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x9, 0x200}}, @IFLA_VF_VLAN={0x10, 0x2, {0x80000001, 0x670, 0x8}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x4, 0x9}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x67f7, 0x9}}]}, {0x40, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1, 0x400}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x33bb, 0xfffffffffffffffc}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x7, 0x2}}, @IFLA_VF_VLAN={0x10, 0x2, {0xffffffff80000000, 0x54f, 0x7b5}}]}, {0x14, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x3f, 0x2, 0xffffffffffff2bb5}}]}]}, @IFLA_LINKINFO={0x68, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x5c, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xf}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={[], [], @broadcast}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @ipv4={[], [], @multicast2}}]}}}, @IFLA_BROADCAST={0xc, 0x2, @broadcast}, @IFLA_LINKMODE={0x8, 0x11, 0x5}, @IFLA_ADDRESS={0xc}]}, 0x264}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000000) r3 = getpid() r4 = getuid() r5 = getgid() r6 = gettid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000540)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000640)=0xe8) getgroups(0x6, &(0x7f0000000680)=[0xee01, 0x0, 0xffffffffffffffff, 0xee00, 0x0, 0x0]) r9 = getpid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) r11 = getgid() fcntl$getownex(r1, 0x10, &(0x7f0000001bc0)={0x0, 0x0}) getresuid(&(0x7f0000001c00)=0x0, &(0x7f0000001c40), &(0x7f0000001c80)) stat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001d80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@broadcast, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000001ec0)=0xe8) r17 = getgid() fcntl$getownex(r1, 0x10, &(0x7f0000001f00)={0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001f40)={0x0, 0x0}, &(0x7f0000001f80)=0xc) getgroups(0x3, &(0x7f0000001fc0)=[0x0, 0xffffffffffffffff, 0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000021c0)={0x0}, &(0x7f0000002200)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002240)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000002340)=0xe8) getgroups(0x7, &(0x7f0000002380)=[0xee00, 0xee01, 0xee00, 0xee00, 0x0, 0xee00, 0xffffffffffffffff]) sendmmsg$unix(r0, &(0x7f0000002400)=[{&(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500), 0x0, &(0x7f0000000740)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x78, 0x40}, {&(0x7f00000007c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000000840)="021c31cd4849b648adcd913d8219777d80d6010b1c8417fa2dd6721154ba4f6ae06e4fd32feea665563b22bb64802a823e554a4fc1c864e127f3eff2d103405642722d9eba81ddded27c4ab07e1f2ab5e44713f1ce130fce372b10d75f21fc1532ac280e6c96ec7e85355942bb50e269d8fdc51af940eb10250342dfa7bfece44eec7011954c48ba5c9bd9e658b2d5e2a8107758b2d4a6e34a48bd2fc55bca2225025f6412763f73b1bd3b4e701475a84886cc6a7b16d05decf70644016fb72192f14acf19231fef03949c5356092ae478cb63ec572cd4427a9f5a", 0xdb}, {&(0x7f0000000940)="50a3104b3d7320e26827589dc0a147ee801989f5c81de5ecf8dd9bd270e51af0308ce6194f2688eb68082a0321b453b4271c5e8935e617b2da698b2ee043420d85e79365a1c7f2169b39b9abc36d035df4ed6443a372c145a9a97787e2c2ccfa892d610c929514df1662d4bbf7d633b6dddcdf6522cd0cd66474c78fd27958d87c5e89efe0b9c4dbdb751a5c76d68ba8adc96adaa304ae730b6802800f98baa9d01ca06da6503b414eb71f3b3082a5472d69eb23bef9380fcc6fbe62626326053805e1e500372d78b29a47b5ff915935be66351163c9c3d3d53d557afdafce4cad5ad5366d1b60780f7d7b296884572279ecf9e03a9d8a8150b0070022676376aae4a448100ecef9e127b128f49dd5257a63078bb151b503618e5b6ed86319d12bc41441a8ae4f5b17914dbf7f32f27fcc1440e653e5db15d745edf4a03e5ecb3d5716c9e7bb4fe683ca4661b22646ddc0f454051ecd4e2328d397b62b5e4c9ccb10782f8b7c6952d338e9508af916a67535918c7b750ba809f930fd3600fa4f92e0f911326a16c31e124158cc5592cf56fc348bfbfd3edbd6094b8d6dcb91da128e37baadd3f354d862a3243b7319e52b0f72ebbd6718a02276ab0f2e0185e69d6fdb18c2787a16ed9eeb0812e08350bb1c4df5d6ce4b3c47e9c6578c5fb2564bf1135d20cf60b0525b72aebdb8ffb1b686589a51675b4c893581bd080f444307c8d96af1cfe9d23cad4ce1e67a1a385852f51ca1c3e375dc2b6f6f58baf9a047a06566f0c4c7f576134c97bd49788e7a744ae1ab24c51fb90388540381a1a9a05f058ab56d08fb05dad98a47f74888b0b6227ab53fe72429fe69a0958fae9780d14092783fafb64a80715857724ccdb65505414d706961306e0a5a35a5e947335b4fe0b2046073b134fc52b289b4216bf0692ff74a1df12daa40219c0f6217b7ea61d652ed14d9148fb50ffb712886c877d2da2c6f189dfe50ea85e7076da3128d1b0580d1462f02f731a3e561b862c37dd4fde6ce4fdf8ab42dbe816ab9ffae450b2eaf9baa27b161453d2e1707601fb6cbb662ce426c1854db81477862d0ce56f3ffeb8ca8aa04a870b13fae5771acf2ec97632adfb541fa10ae440c80523e3a38f553ce3b960f24e06f00b2efb7077cb2c830b4979d32cc8d4a468b9525e950abb8fc0b9dd49c342df1d85ba31b969a403f2840ef59ab0ddbfbf1ab6df26d54ff33888438c94bda275e3e6bb429fa875df1e32e421145a6ef4abc70447891ca96aeef9ccc80f37d2e8a8c2724b65b7341a3c58e1a37b89e289d911055f27982b951ea4731a1bb730cf247e3ec230b0bef80a3a0103cadac46e06d470df49741a65d5796c2ebd6e8a1747ffeaee3d8a419977a8b7a502833f467a3e0b04a42bd8e0768fd926ef1cc0dfa13133a0ffce3d0062ced768030fdeeb308bff219ee5670798a55231bcebc7816f5605d8ee04041b066032ccb20afb79eb3c595f5e0880bae10de40cc542d02238fc75d3b6e8b2f0fc49f0a827fd57b6dcfb3083aa91bdad3979164eaf8a47a4b02463d4cac42ebfc1f585826091df236011c9eabe36f05310f12132b06f8eec1760be4c6456270a0f66cf915f5bb498018370cfcc95fee4eb6ab23b924913eac9334ffbfeddcab41d2b5bb85847bd2320b2ed1c51561fef710cd8a201291287094d99805a89bfc6f90d16b5aa02414a182f67a6df54c9e68bf52575bbc1f049d53ba15c3499d82f3cdc0f7f25ae142d61a6845e13e2884cc9cdbfe2b852586a6f157011c3bacec865186eebf1932eeaa0a752bf1f95eb922f440c78b10e50ce9243046bb90c0319de8a2f3216cb942601e6303701bfb46c282ad322fc252529d006c275973b486f27d5fbdcb8182eb848d48c70c807abadeaa6ec6bbe4c513a984d71327f075d13ca2dafe7d3ed426c1c365170ba29f41d689c8035ccf7acf31e4588d4b9ecf07685beec7552617a732cef65d22007d58c46e32020839d62b4a3207ef13787c271f024d485585b2db8538295ae90f9894a84d708957bab16daa8daf4a685f55a02738ff27352ded8d1a1c01cb055aa8ce85f3c99bb735c882520d371f74f5533e829602639c01ac69c00e9733a78edf4b728f9a41ea70886ccffe3e1fa15580cc495bb713b7c9aec217b6464a7a9ff5fdd6ce8228aa332525368df79937fde9df5cc3047d753756c57a313125ddfc371d8833aa8ec90a0d2ec15ecc46dc143593c04dfcfe5b63b6b9f57db1b66a1602bbefef0fceaf978f7dfe97c858c4ef5081e6cc21eff7b9d3781b6977f1027e61ee5c92c5f5cd39b7ea1b2220f3f74ce450a8dab693230b861882f67a4e6ed4a97e17469cbb1c82283a36f92c31ccae308c1c6478b582deb543fbfd3a42992e534fbfb1663841fa00fddecc7575062bfa95b400a5969275ace76ec72c5b2ed76487af394b2b2e2e1baf032500c71068cb48c4f2ecde90727e489b8a1934e8d4e3a1f42dbabc882e4058fcf40e56208339211e274b1fc56642ba77fed00334025478dc17e5d72549f21f56f04f4cf2169b658ea839ddc8cf47c6a72c08648e839b519fae1a6039943cf4193446f56e7a7f2beb482b9de8ab4ce4482aa4ae840598012f9c4c278480e95daa4c7fcdf21703890d75decee7e185398874c2ba5222a873752793acffdcc5bc9c4caf3282c2b0fed7fe85e762867c17097e25910ef392a6d2560de555765d2418ee1ed3c1225a9bfb7704683c9f6eacc87fc038b246690e378a2a349947f15ec7d21162330e008ff199afe4761521c2c044e38117a56cd11e7c0301650c45deccc65578f9fddfcde39e01a05145d54d7df98323c88ec18fb7f7f4f518669ec97ba37a2cad65fc03a3427610423a0ac591254ff766b918e16f8eb1a3d977d3ed48274838638aa37bb0dc3e1b0413d60d3b58bc55a69be520585743f11291529ad4df4b7d5ae1c11de8a212b762e6fdfd02b068ee834ec6f2bb858a150d71171be28649450305d1e25de7af03f132420114f197fa6de715d9578f9e89010c06bbc67f0ef9b73b0205377aa409e455a240eece718d2ebae03832828d4ff16fb43e75d6c401a5438653f4ce5468490c2f52a2caa589e9c3de4a8b0a45b4ffcb1d6d4490d7852803c84fda587a21ee6cc00dc73fc413e094fd5c21b78f7c1d2d003de4e137dbcdfcf514abd410270dec25c7d44615c34ca27cf71480591e237a7f0b47a92b50d2f81bddf330ac77d4cda999c7b5e5135b00b4bbb40a7ab70b4338e991069b5522614ecce214254418865e42b474827610c71252b4fc076c4920c2d9333c20ccbd71e4aa124536d46391d9ed25ed1334513e83b54ba25e9ae5a23efaf211078971bd6fe41a06a54f7c502c8f19b3897e48577dadfa43bed54ce45299f1633e8a11084ca382916c675849d3aee7cfe49c7d538da2b352dade9d214abb7435c4df07aee5cb815d1f76fa3e53fc681a8449073e45b6ef40f6d8e8326ada9f219898a0ec4cebbf6ad92c968505a5e1074a2aa8d1763d776e0579feb4295d59777246d69193d55ba79ef1029a4509bb097246ce5fa2c86ab8ba669d6a103eb6f31ad6e6a73e776f19e895bd9126478a08e2dd963b0652681e6545bec62b716bd81818225c8fa55463eef0cc2c05f82d7588b3fa8f326c49e6168b515d642b080aec7b74ef95f5f0b59d58b21e6e40d3b660e85a7e019ca1073b4f3a015a54909f19c0994e4126f7c1b2a1d5ef68d02041086e428a9fde73cba97fc6503d74b662ebed09ebd32d8a395fc3e823f18df1aeb9e525f629a5fbc6827ef8aae3a78d334c3e7e3e717544c6093dc49b1e4d6cdd23482dcea0a0510b732de7115a3683b260884ed820a39d9f44e70b2b347fcc361c057fb5c6a47b5ef3db399c41cc24ef000265aad6aeb81b77e9cfa1f4172cca04a000b7c9c657e8f79060b7d8bbe0800b188955b39696bf200373cdbdb2085c7c049ac4f1ca81b4cde761dafe6bd8628d0ae05f8be1abe23f53b27ed3f3b02fecf8ad1fb9b15ce3df0c1ecd69e9da645055aff0a3dd41590d2377762539721dcd391ef0e7a9754ad3c0d2312ab6e9ff0632e0755cf5cc4d7e0f1ce39b210a75b375c04d09f5307179bde40dd8f9d6bb962acf915681f3980fc2052592f2e939d8fbb41b3e872a91a6a9e3abfc24ca117a765709a03ceb319ae610d2970894a1679e7c01f3bd17a361eedf0395105e746694059db2baa7f75bf07d14a074e90d30a8e0cb861be65c7490cc5dc425e30ac02d0dcc594935e8c54b240c4b299b098c7e56f34c8a0093fa150b195c694cf0aa0c4fe5824b23775ff1ceb4b441d565ca1256cf0ca2d78c980836dda85dd4a0f41df1e6b0b1355be1646d667fe072228d35dc579d024fb05c3e07dbdc2c6a2276c28a41f41458fbd4e2a663d725f34daa1fb551b80e95fbc0ab8e88b5dc2c8cf4b3e15d6756c35edf9152f978b5beccdd9d6ee7c8c41332933dd5485407fa228ed5d150f35e591f6246e9ea06056e5e6e91b901fea0670923602069509bfcd5b54ceb4a112e3dc7e958c851ecd0db2bfad5f558a541432680d5e86a2628a8ae6101ecbd28eb7fca4536de47d3b55166e2a91fa47c268650762140ba8957d6d5fa3993b3f91054451f5db3bdebb6d39cefe62337725410b767bdf608b4d95ce8470bbcc868915009d0beb02966c9466f38d8daef86d45797a5470328eb37f335ed18eb7672aa421b74a4346a5d7594f0a574d2b88b2c0f28361b01ae33a4d07325f2e0b205551ec79a2bdffcf208f76ec3767953074cfd4f8c359a7f1eb7a6ff65347568e84fceb5ff33794b3abd38a9918e78d228e90b9045416b506450174cd7bdfdfac873a7538545bca83b0537e61b3cf48a015042392b801353d3e16abfb41d825dde3ffa752d9bd745a2c3b9c90fd43dd2f387781187bc89f207d6d0e25dda4b514d728fc2369db8838c319d5b24224ef6b3595cf8872944b641aa71e891b13a76266fbe95137c46d3ac7291aed1af55d13b23a1faef0309b0e2b6c84e1246f0c3735d86aa9e778f8d11497ac486c30db0857f35b2f7b0c24639c43dad043e768daa2dcbb287225ba49cd54424ddcee471915806b6ab4001f890407f551db3412b01c014d4745b274cd7cead5cf17be52d3d05e918dca5443c653ff8a17b125cfc9f2bc45c415ae94ec0f31c7012bb03810bbfdc66be351121a90f5d2cc6827529845d45ecf5b2a8eb31d673a482b3159afd182403918d2098d5a628ada9a57ee99f5a4c171cd2e3ea78c72e15de696f3b6c733bba21bb238c22cf4fad7df031a428b7e558a2dab502a8c6a2ad80ccc1131661a422000be60d8a86532c30f67242540d78bf3e71134abcb009df7a4ab238168e79e2f633e6976ea94846fbbcf9660078eb8b53b755f581bde1c224089f9505b784077f86e2b6b5b9f7dcc57281359b04497ae8d6f895fc8b2b205623e3f2b3307e42d4c8dde4fb73aa3f5e7181de81e69e26135ffeedae64dc6f3b41eab38011787b926a64dc2633b6f568ad444ebf8d0eb9d78dcfab05acae317a5502e3d1f6c369a34483d585b4290a89fd32762c4dda510bf29f6e963dff03a1993a005594857c07f661db90014a999763661bef1be0bf2e718a13a0cc15eb2423f986359ca9d84cb65102a11ec7944953d2578a3a293aee9a075e4a5a79e13cf5c3598e33472a9a0e2b1a53c013796b7dc68a87bdb52a67bcb42213c16c6f69258174939646a43f51c5e72b266fbdfdfca891781103a77ece79895a2872571a388e", 0x1000}, {&(0x7f0000001940)="8a7347dda95dcb519f3f9c6f59ed08947abaa438096ee753151bff1468358ef8fdd1a32d8d39406d74bcd19099096272c691bf1b9c8a578d227beeb342bc0223e18d291d10e0a376b2eeb62b045e1106bc16f222f87525a1f83cb8755dc9cdf43f066a99d309704359b370f0e2ad119da94a8bffe920aacad8", 0x79}, {&(0x7f00000019c0)="6fc4ce330386910ceb2fae16931db6e2c53cc16969fad72f4238a93e5e3b157d90a320d834bc6573adef52996e90fe802099b2faf9eb33360412f5be8ed94f4dd5dd1667a1e870ffbcb16da8874063b21e47b6d3203ddd42fa5cf1c765952d8017c3a3abc147b8875589c83b6e", 0x6d}, {&(0x7f0000001a40)="0f20cedfad6276233c3daf5a3b4d276c371405b3cb2563a15b9b59aad6ef484cddb7a4d2d12d4dfddf52236dfe1f0b5e82704facb77ac58a4594f43b8046127257bd4207b73b42b77749ea494dee0684c9b097db54bcc5a5b20a33a0d31d38e8194235edae34447e12929d8439d6f756c10a15950d3c9cd4d8ae2f1c7dbdaf3aaaf9ce176e28dd622fcf949b63afd753e295dd90df7d1369e4e593540936775a4bf1aa6d5917e590fa9a938a86ce5ea196454e3ae5fb653c0c696c6033c6e859cc4f312f920c49341fb39b01cbe8e60164f18f75639d30b60b89c61ec918d782c3012af0b8acdb", 0xe7}], 0x5, &(0x7f0000002000)=[@cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x28, 0x1, 0x1, [r1, r0, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x20, 0x1, 0x1, [r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}], 0xa8, 0x4014}, {&(0x7f00000020c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002180)=[{&(0x7f0000002140)='E8', 0x2}], 0x1, &(0x7f00000023c0)=[@cred={0x20, 0x1, 0x2, r21, r22, r23}], 0x20, 0x4001}], 0x3, 0x4) 06:46:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xb00000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:16 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1397.904624] FAULT_INJECTION: forcing a failure. [ 1397.904624] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.930482] gfs2: commit mount option requires a positive numeric argument [ 1397.947881] CPU: 1 PID: 30436 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1397.955211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.955455] gfs2: can't parse mount arguments [ 1397.964587] Call Trace: [ 1397.964617] dump_stack+0x172/0x1f0 [ 1397.964637] should_fail.cold+0xa/0x1b [ 1397.964656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1397.964672] ? lock_downgrade+0x810/0x810 [ 1397.964694] ? ___might_sleep+0x163/0x280 [ 1397.975399] __should_failslab+0x121/0x190 [ 1397.975420] should_failslab+0x9/0x14 06:46:16 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8200, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000000001, 0x0) [ 1397.975435] kmem_cache_alloc+0x2be/0x710 [ 1397.975451] ? __d_lookup+0x433/0x760 [ 1397.975465] ? lookup_dcache+0x23/0x140 [ 1397.975474] ? d_lookup+0xf9/0x260 [ 1397.975489] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1397.975502] __d_alloc+0x2e/0x8c0 [ 1397.975513] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1397.975527] d_alloc+0x4d/0x2b0 [ 1397.975542] __lookup_hash+0xcd/0x190 [ 1397.975558] filename_create+0x1a7/0x4f0 [ 1397.997474] ? kern_path_mountpoint+0x40/0x40 [ 1397.997493] ? strncpy_from_user+0x2a8/0x380 [ 1397.997513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1397.997531] ? getname_flags+0x277/0x5b0 [ 1398.024775] do_mkdirat+0xb5/0x2a0 [ 1398.024797] ? __ia32_sys_mknod+0xb0/0xb0 [ 1398.024814] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1398.024833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.024847] ? do_syscall_64+0x26/0x610 [ 1398.033143] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1398.033161] __x64_sys_mkdir+0x5c/0x80 [ 1398.033176] do_syscall_64+0x103/0x610 [ 1398.033195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.033207] RIP: 0033:0x457247 [ 1398.033222] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1398.033229] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1398.033244] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1398.033253] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1398.033260] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 06:46:16 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x40002, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0}, &(0x7f00000006c0)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000700)=r1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xfd3) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000040), 0x4) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) creat(&(0x7f0000000600)='./file0\x00', 0x10) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) sendto$ax25(r2, &(0x7f00000003c0)="ace2fc5817fc065aa7f9273c769c070b1c81ea2cdf4e605470929a1ab26d18f0b376be8973199f36284a2f0ea9daf5c884d11c6bca170ae355adf4a17d240d67c76795aa903eed9b37011ff2a354af27ce79bcd3f658c158f8ccd56ba7eecc76222e567b3ec8f0be6aacb9a9c0e7af5c4eed", 0x72, 0x80, &(0x7f0000000480)={{0x3, @bcast, 0x1}, [@bcast, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x30) ioctl$int_in(r2, 0x0, &(0x7f00000005c0)=0x5) write$sndseq(r2, &(0x7f00000001c0)=[{0x8, 0x5, 0x1, 0x7, @tick=0x4, {0x1, 0x8}, {0x69, 0x101}, @queue={0x9, {0x7, 0x1000}}}, {0x401, 0x7, 0x100, 0x1, @tick=0x100000001, {0x100000000, 0xb9}, {0x1, 0x100000000}, @quote={{0x200, 0x965}, 0x8, &(0x7f00000000c0)={0x1, 0x7, 0x0, 0xaca, @time={r3, r4+30000000}, {0xec, 0x6}, {0x6, 0x4}, @raw32={[0x8, 0x57, 0x5]}}}}, {0x1ab4764e, 0x7ff, 0x5, 0xffffffffffffff50, @time, {0x400, 0x5}, {0x20000007, 0xf673}, @queue={0x0, {0x1, 0x2a}}}, {0x7, 0x7, 0x1, 0x47a5699, @time={0x0, 0x1c9c380}, {0x1ff, 0x6}, {0xffff, 0x2}, @connect={{0x2, 0x33c}, {0xfffffffffffffffc, 0x1}}}, {0x3, 0xffffffffffffffff, 0x2, 0x400, @tick=0x100000000, {0x6, 0x9fd}, {0xffffffffffffffe1}, @time=@tick=0x8c4}, {0x80, 0x8, 0x100, 0x2, @time={r5, r6+30000000}, {0x5, 0x3}, {0x4, 0x3}, @addr={0x0, 0xa7a2}}, {0x799, 0x0, 0x93, 0x6, @tick=0x80, {0x2, 0x20000462}, {0x1}, @addr={0xfffffffffffffff8, 0x5}}, {0x8, 0x8, 0x6, 0xffffffff, @time={r7, r8+30000000}, {0x0, 0x81}, {0x2, 0x7fff}, @quote={{0x10000, 0xfffffffffffff000}, 0x3, &(0x7f0000000180)={0x6, 0xdd, 0x5aa3, 0xfff, @tick=0xd2, {0x100000000, 0x7}, {0x100000001, 0x9}, @raw32={[0x6, 0xffff, 0x1000]}}}}], 0x180) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000340)={{0x32, 0x8, 0x400, 0x0, 0x7fffffff, 0x4}, 0xf44, 0x3, 0x5}) sendfile(r2, r2, &(0x7f0000000380), 0xffffffffffffffc0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/mls\x00', 0x0, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000500)=0x8, 0x4) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000000)=0x4, 0x4) [ 1398.033269] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1398.033277] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:16 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000200), 0x0) 06:46:16 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x1000000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:16 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200), 0x0) [ 1398.361693] FAULT_INJECTION: forcing a failure. [ 1398.361693] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.378580] gfs2: commit mount option requires a positive numeric argument [ 1398.387332] CPU: 1 PID: 30469 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1398.394636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.394641] Call Trace: [ 1398.394675] dump_stack+0x172/0x1f0 [ 1398.394695] should_fail.cold+0xa/0x1b [ 1398.394713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1398.394729] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1398.394747] ? ___might_sleep+0x163/0x280 [ 1398.423864] __should_failslab+0x121/0x190 [ 1398.423889] should_failslab+0x9/0x14 [ 1398.436185] kmem_cache_alloc+0x2be/0x710 [ 1398.440337] ? map_id_range_down+0x1ee/0x370 [ 1398.444776] ? __put_user_ns+0x70/0x70 [ 1398.448674] ? ext4_alloc_inode+0x1f/0x640 [ 1398.452921] selinux_inode_alloc_security+0xb6/0x2a0 [ 1398.458303] security_inode_alloc+0x90/0xe0 [ 1398.462634] inode_init_always+0x56e/0xb40 [ 1398.466893] alloc_inode+0x83/0x190 [ 1398.470520] new_inode_pseudo+0x19/0xf0 [ 1398.474503] new_inode+0x1f/0x40 [ 1398.477878] __ext4_new_inode+0x3cb/0x52c0 [ 1398.482118] ? kasan_check_read+0x11/0x20 [ 1398.486272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1398.491815] ? ext4_free_inode+0x1470/0x1470 [ 1398.496235] ? dquot_get_next_dqblk+0x180/0x180 [ 1398.500916] ? selinux_determine_inode_label+0x1b1/0x360 [ 1398.506376] ext4_mkdir+0x3d5/0xdf0 [ 1398.510017] ? ext4_init_dot_dotdot+0x520/0x520 [ 1398.514694] ? selinux_inode_mkdir+0x23/0x30 [ 1398.519110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1398.521093] gfs2: can't parse mount arguments [ 1398.524657] ? security_inode_mkdir+0xee/0x120 [ 1398.533714] vfs_mkdir+0x433/0x690 [ 1398.537267] do_mkdirat+0x234/0x2a0 [ 1398.540917] ? __ia32_sys_mknod+0xb0/0xb0 [ 1398.545161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1398.549926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.555378] ? do_syscall_64+0x26/0x610 [ 1398.559355] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1398.563948] __x64_sys_mkdir+0x5c/0x80 [ 1398.567839] do_syscall_64+0x103/0x610 [ 1398.571742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.576931] RIP: 0033:0x457247 [ 1398.580129] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1398.599054] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1398.606773] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1398.614043] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1398.621319] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1398.628591] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1398.635868] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:16 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x7, 0x900) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0xb8, r4, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5016}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x48000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = dup2(r6, r3) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r6, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:16 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000040)={"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"}) 06:46:16 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000200), 0x0) 06:46:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10001, 0xc400) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/4096) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x1a0f000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:16 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1398.842895] FAULT_INJECTION: forcing a failure. [ 1398.842895] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.854225] CPU: 1 PID: 30488 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1398.854235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.854240] Call Trace: [ 1398.854267] dump_stack+0x172/0x1f0 [ 1398.877169] should_fail.cold+0xa/0x1b [ 1398.881070] ? security_compute_sid.part.0+0xbea/0x1600 [ 1398.886445] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1398.891566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1398.897119] __should_failslab+0x121/0x190 [ 1398.901495] should_failslab+0x9/0x14 [ 1398.905301] __kmalloc+0x71/0x740 [ 1398.908774] ? context_struct_to_string+0x428/0x880 [ 1398.913806] context_struct_to_string+0x428/0x880 [ 1398.918663] ? dump_masked_av_helper+0xa0/0xa0 [ 1398.923260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1398.928809] ? sidtab_search_core+0x164/0x210 [ 1398.933333] security_sid_to_context_core.isra.0+0x244/0x320 [ 1398.939155] security_sid_to_context_force+0x38/0x50 [ 1398.944277] selinux_inode_init_security+0x3b6/0x7a0 [ 1398.949394] ? selinux_inode_create+0x30/0x30 [ 1398.949412] ? lock_downgrade+0x810/0x810 [ 1398.949434] ? kasan_check_read+0x11/0x20 [ 1398.949454] security_inode_init_security+0x1b3/0x3c0 [ 1398.967401] ? ext4_init_acl+0x290/0x290 [ 1398.971480] ? security_kernel_load_data+0xb0/0xb0 [ 1398.976424] ? posix_acl_create+0x11a/0x430 [ 1398.980769] ? lock_downgrade+0x810/0x810 [ 1398.980797] ? ext4_set_acl+0x4f0/0x4f0 06:46:17 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0xfffffff, 0x80, 0x2, [], &(0x7f00000001c0)={0xe327260beab6ad41, 0xfa3, [], @p_u16=&(0x7f0000000180)=0x1f}}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) getsockopt$netlink(r0, 0x10e, 0x7, &(0x7f0000000040)=""/235, &(0x7f0000000140)=0xeb) 06:46:17 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x34000}, &(0x7f0000000200), 0x0) [ 1398.980811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1398.980826] ? check_preemption_disabled+0x48/0x290 [ 1398.980852] ext4_init_security+0x34/0x40 [ 1398.980870] __ext4_new_inode+0x3b23/0x52c0 [ 1398.980898] ? ext4_free_inode+0x1470/0x1470 [ 1398.980918] ? dquot_get_next_dqblk+0x180/0x180 [ 1398.980938] ? selinux_determine_inode_label+0x1b1/0x360 [ 1399.008021] ext4_mkdir+0x3d5/0xdf0 [ 1399.008052] ? ext4_init_dot_dotdot+0x520/0x520 [ 1399.018623] gfs2: commit mount option requires a positive numeric argument [ 1399.022559] ? selinux_inode_mkdir+0x23/0x30 06:46:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xe3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1399.022578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1399.022592] ? security_inode_mkdir+0xee/0x120 [ 1399.022617] vfs_mkdir+0x433/0x690 [ 1399.022636] do_mkdirat+0x234/0x2a0 [ 1399.022653] ? __ia32_sys_mknod+0xb0/0xb0 [ 1399.022671] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1399.052454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.052470] ? do_syscall_64+0x26/0x610 [ 1399.052487] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1399.059645] __x64_sys_mkdir+0x5c/0x80 [ 1399.059662] do_syscall_64+0x103/0x610 [ 1399.059681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.067670] gfs2: can't parse mount arguments [ 1399.068547] RIP: 0033:0x457247 [ 1399.068561] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1399.068572] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1399.122051] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 06:46:17 executing program 5: mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xfffffffffffffffc, 0x4000000000072, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x420000) epoll_pwait(r1, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x6, &(0x7f00000002c0)={0xb92}, 0x8) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000300)=""/185) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x8e) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000000c0)=""/218, &(0x7f00000001c0)=0xda) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000400)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x1ff, 0x0, 0xf000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1399.122059] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1399.122067] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1399.122075] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1399.122084] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:17 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x118, r3, 0x302, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="3ec3cb9ecb31a3e87c545bb393a74f23"}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffff4f8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xa0}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x12}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6dd4841c}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x10001}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3cbf3b07}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1d}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x24000000}, 0x80) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r6 = dup2(r5, r2) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x1f00000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:17 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x400300}, &(0x7f0000000200), 0x0) 06:46:17 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:17 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0xfff, 0x7, 0x7, 0x1, 0x7, 0x6, 0x39}, 0x1c) 06:46:17 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000200), 0x0) [ 1399.366273] gfs2: commit mount option requires a positive numeric argument [ 1399.390788] gfs2: can't parse mount arguments [ 1399.442378] FAULT_INJECTION: forcing a failure. [ 1399.442378] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.454515] CPU: 1 PID: 30530 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1399.461801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.471651] Call Trace: [ 1399.474269] dump_stack+0x172/0x1f0 [ 1399.477911] should_fail.cold+0xa/0x1b [ 1399.481829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1399.487042] ? save_stack+0xa9/0xd0 06:46:17 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) r1 = getpgrp(0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0xee01]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={r1, r2, r3}, 0xc) [ 1399.490685] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1399.495630] __should_failslab+0x121/0x190 [ 1399.499868] should_failslab+0x9/0x14 [ 1399.503693] kmem_cache_alloc+0x47/0x710 [ 1399.507763] ? ext4_es_scan+0x6f0/0x6f0 [ 1399.511753] ? do_raw_write_lock+0x124/0x290 [ 1399.516182] __es_insert_extent+0x2cc/0xf20 [ 1399.520535] ext4_es_insert_extent+0x2b7/0xa40 [ 1399.525134] ? ext4_es_scan_clu+0x50/0x50 [ 1399.529296] ? rcu_read_lock_sched_held+0x110/0x130 [ 1399.534317] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 06:46:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x2000000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1399.539865] ? ext4_es_find_extent_range+0xff/0x600 [ 1399.544897] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1399.549744] ? ext4_rereserve_cluster+0x240/0x240 [ 1399.549758] ? ext4_find_extent+0x76e/0x9d0 [ 1399.549774] ? ext4_find_extent+0x6a6/0x9d0 [ 1399.563250] ext4_ext_map_blocks+0x216a/0x4e50 [ 1399.567853] ? ext4_ext_release+0x10/0x10 [ 1399.572008] ? __lock_is_held+0xb6/0x140 [ 1399.576088] ? lock_acquire+0x16f/0x3f0 [ 1399.580073] ? ext4_map_blocks+0x424/0x1a20 [ 1399.584425] ext4_map_blocks+0xecb/0x1a20 [ 1399.588591] ? ext4_issue_zeroout+0x170/0x170 06:46:17 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000200), 0x0) [ 1399.593101] ? kasan_check_write+0x14/0x20 [ 1399.597346] ? __brelse+0x95/0xb0 [ 1399.600824] ext4_getblk+0xc4/0x510 [ 1399.604456] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1399.608791] ? ext4_free_inode+0x1470/0x1470 [ 1399.613223] ext4_bread+0x8f/0x230 [ 1399.616777] ? ext4_getblk+0x510/0x510 [ 1399.620683] ext4_append+0x155/0x370 [ 1399.624405] ext4_mkdir+0x61b/0xdf0 [ 1399.628045] ? ext4_init_dot_dotdot+0x520/0x520 [ 1399.632731] ? selinux_inode_mkdir+0x23/0x30 [ 1399.637241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1399.642786] ? security_inode_mkdir+0xee/0x120 [ 1399.647385] vfs_mkdir+0x433/0x690 [ 1399.647409] do_mkdirat+0x234/0x2a0 [ 1399.654572] ? __ia32_sys_mknod+0xb0/0xb0 [ 1399.658729] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1399.663493] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.668867] ? do_syscall_64+0x26/0x610 [ 1399.672848] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1399.677441] __x64_sys_mkdir+0x5c/0x80 [ 1399.681339] do_syscall_64+0x103/0x610 [ 1399.685245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.690440] RIP: 0033:0x457247 06:46:17 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e21, @local}, 0xfc, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)='nr0\x00', 0x1f, 0x1, 0x8}) [ 1399.693632] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1399.693641] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1399.693656] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1399.693665] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1399.693671] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 06:46:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x98, 0x5, {"c27e8059c3c6f918a30a8aa257c5306b81811a2384060000fa5813f239eaeca27fd54284cfc4f99c3b225fd84c02c8f3908cd7eae6f2d46b79407f8bac181414c34bf91670c3ba0aac05bf6e3cc8b0c7c3eb0fc7985ed4c5e3b7c19924e63db1ee00de830610c09d8836905f4bbc96db445bf4c422564c3c4fade4346e"}}, {0x0, "540cc2186955afe4706168a5285afe113de5fd2cc2d4f1a6b0db7d2c9651ab04d9bc55b75afd474b9c9836af68550bb0f510907c1d6e719f70e28fc765e8c931bcdc8f74917cffea7f66d2defa06b89669f75bc41d5abadf85e69d0da6af4a200606c0c2958de01d7c62cb504a48289d6ea24ab9a96a9cf2c6356f5d7f3ddc5cc42797a58dd8483bf10c112a41f1854d19671c760584a7e3d231b02b3e2c67ad56e56e03e173dbeeb84f5ea35f3a5e838ca796f76e8cab79557257ec796d66840552be088887684c95c57115b1bd3845ada1ac25bb12b15d53ee0063ee6cf8f6ae9d1ceb86d38cb8d220b531f63f5da460b75a528c200af7ca5b54199edf63e3a4e61421033dd7449bdf884e04f1959591278283709c0034712e66a47cb7822a29217f27e789c1eeb214d1a2bdb20424b6d5423b78bfe7bc7e4fb577a94ae560aaf7f43f16c505481ab6fccb31149c35288f7c26ade545e2eb50f44bedabda376fdd9e87f02ad71d47b4e41d28cf6b9c9d5941bf8431c968d2f82b61280f6981793889b219b9f4d5a30859abaf8921953ba56796841ffb477fc761f707dd84007fa3bb608fc2d6c2e9077e8bd3a73333c66e3a94bdf7a4b12677cbaf7125ec3bf1010e1ed97f0321809b9e300396b4af9456f35edca9ff7f5065db5b855a01b5082c2205e9810bca015e79a2bab49d637830b73f6f8cd38db32a33a86ae12bff2435fadf21511aa733ecba2d65a1a7577430beff07f51243bedb5f13fa1c06aa58dc2099f334570ae177edd4e0446849ee153146c0465d86d169d66bc6a4efb513b6b4c54289808545b5df15c366e1c1a406ecb8626c114197c89a303a24bcf042eaa8e57b5cc9b64353f61ca5ecbc171d6d0a605be2d188f8c5e17b6fd3d44558f3109cbdcb7c650108a793b733bf5f920ab4a7208a5865b733d0be9479bbdd72cb19f813830a7aae52a55bfec073eef7db68d9bb49a25ca98615253a1ec73a3a8630d0219e152013f2c716f799c35bdd3cbab7897571ca57f0f91d6ddff278d72bfc803724e4f18b62901d4c0aa71b1d24a2288a9065ddfcb18ab7cf2161f449e63399b24a7b8cdd11cd93e3c964b8a7bb2d686bccca6f198ad8349acb25aca9333846867042a7082ff011d03362b44b0401dbaba592abf9e1dadb41d93b17e60a00b81a4dfe30a6879bcdaa2449506d6e0940e64c814be099ce7ef4274a85a7b927f0f639b1ad2120179f22cfba4d17c46d18827c903ae4aaf872d42817e6399c95f1e91cd0839cca679e2d73f78a1b9b2f895ca588fbb4b67f51de9d936a56864aca6c25d2721bb3fe01d330aee36deef1c7de5866f6caa39d9207d8f8e2cc956259039267ea108ea43df4a6ba65937c46b401eb06e7183e53ef26611b3d9367eed4717d4a15d3b19ca8a78e752e1d3ec280a0326c64b8ed5a98fad10a27bed88531eb60534ee57b3d5e5f03552763847af09056fba203a9c13fb8d00455b9b6da06e76fee4b0bb7bbdbca4e7bb9039d9114ef85ef920de48a766bd2e96ae06e0aea5db76f94097384958fdf3db4479e497045eedbb25ada3006aed5236d85674d2b9200f3b4389bc733209c7ebeb565b82fe5087d7088803311bc2879122a385d614dda8672b1d17fd9b73d7105fb6be3553747a2a2ed72352e431d280a41cf617113dd2aceb194cc43b7bf5e3770433fac377e676a3bb6e439269021f0ce15d36d23a70fa949c0c0427fc4f01550d6f6bd3bd51b60aff1091310c8eb1358a41903807e5007f0c0d20b23e6c0ae47480e0e5ec9e30248a46f3022626ce7f93737d504abad1ab65d4958586dc0020227b1407b8dbdfcd4faa0777c263d8fae94549c8ea5770f94cbc0b9d97b2be291746e637b593a453c05d528bbbdc753e5ff1ec839d4767bf59d01d78113ee068f8297947bc2946c46942a53b6f1d4869a7b38fcbac17ab8c4286e13cf128ecb28b3d0b9f85c6f0d3f10cf61ff454927f2eeac3e9f28b0859f799104451edcc5172b140907df8580548cadc0b2f254580ffc23fda236774929883fe0528c6d96794a0f47be94280b687f13c06a014406f0973336e6e92b898a52560608e0dd38b53c2d56e9b4e1f3534233956b96ab2ab1e5c8e0da0b59b72a17903786075206af872e75a8097905be7011b0a8b750173492137b34313cffb647a64360d046d9d6eafe152e6aa177be54f0513151508c976580b5d3e378cd8b7837951e378bd10cf4495687958d8f4ee8bbe61af4b9bf497f48dfe1c66e0df6d8ad7db730ebe491a780bffaa5392f684f36fba88c3aacdf14b482f5ce117ae783f28a560c18370b156bc853b6647e62856726e3d468488103b9b728e6a87bc5faec9ab07bff4cc583039bc48fbabe6a2aeffdd72f89bc33221672c076748ff3d8213da0efa69bf7596c68ec7de9d1245a8eeeb676f9f3fdc675a147b24960a62fb3335de8c0fa6ba9c7193e635ab40abe64122e82f30871139d7b306f2793c5d21bead2dc9ba695953a00277dad462a6045d354af1293d610f94153d3d72b9a8ab3c97006efc15a733e4bfa9c9c77b69a80ccd382c114eea95722bc3d14eb387e976f152166a0638e23bc8bee4327bf958c475e0a4be47525f8cad4d89d7d5020f3dfccdaa30008578ea7a8c4c8b7b26609d0df2418e51cc97c856aa7c0f08cb2a78e68688e3dd491553010b2cbe57488fb6eb0949cc7cc5fb2fa6ecac6f849223e40a20fb6fabcef663511622be4809b23a85878cee54ce34c3d703b0ab05c6b017110c535183ecab6923555e3ba231e2bd72e747641162f5526296636adfa926d5e01444122a7cd7f6dfeb7bf89717691b379a60fb2e917e76641efe9f92e9cc3a9310b470b34861ca45bb5f07b1f7293cedd2634aaa2b892dd379fc6d7cf6a40975fc2458bdee557b7d67bde40aaad4b1dcab40ce0598ea92535262627c90ca089adb1bb77501c0041d79e31682d6c130205c04b18862b6efdc7e4a66e3f4fcc124fb110fa6ba39ba0d34ede5bed61d19c961df1d7931cd3c3d9e4c47ffe58a96aa125fdeed01adfabf00c1f7e447d03d8e0b9f526a2554728138880575eac1e19a63c65a8bb15b53990fc5a14e1050958355bceff7a05ce47fc807022bd2e18dbd8445d608ccda246e2aa6a73ff9267a9fd4b72152df34dac6146cfcb3d15a882e447ac815682f8a8dd8de5983261b95032698cc3256185a754a73285835e11412e79f3d435edb3acf6fcae54231e999bd8bbc77b2d4af9dd1bcf45e35341af34be84c22c040e217e5a2071eb315d58f60e59b6435253879e691fdc856f5ee1a8058baf788920a7e8898fdb30e52d1fcf0ba0b92c8aee9830b0fe32f63b4957e6dea167e1adc02c967a752bd0cf842321c26244e70a64e5ee74ab7978e6a12b42a285de4c4bd268cd60755b7a197f247dec633aec98283d9ce805f858fddbed19fa465958b4c511d21757b03feceaf47c24f120dacdb3df8a122d7aaa35d4e4d633d85cd75709ac770cc4372288c6fff8fff129792a09530deea29bf726a621d0128b8847a682235d5f2c2c445439845816800e78e1087d6773a3862fbb71a25c5fe86449b28c96970a808bb320a70669bafd5e3fb8822a24e800ac0abf248faa600ed30646e4dd2e32ff8968017e19dda935c5d95b59354ae590ce6b7d9ebb593b507b5d11d1c1865529a84dfc00115b4f153d99907187e9d8728909cda9d751da53abedb3a793f3e6a0795269cf18340d134c0a99409d6335414cfa3a0f1c82e408ee23cc621cbb6953eb242631bef6f7af6537daf5f79df4869c2587ba08d22ea7da8a099869143b196e26c510ddf3da465edf8323c3d9b7bdc6ef8fb8fd442d34eb8c7e6854b3d8f089680c07707af325b0eff42bcc855bd044367a3230a01efddffa9409b444190e21e075297f018907b22a9ceeab37e6e0838af072522a947c28c98e97420e63cdb86834c4cad7b82ee8de4e81d392177aa248e23982dfae175deb0d5ac80ccf5374ab9c27ce8cf5d32400f994903e7502cac67eaa01fd2556b71c5c530213d8cb2901cc37efeec3c713a1be9679162d88ae2cac0e4240d542ea7386441d7de586c6ad276644af0ca2cfd938ac84aec22b84cc931804d7b9cf3f5019babff884a72d7e5893062adc9a4b4077540086db46d95b8208dac381a628ee5782de802dcfb68252a6891473e8d46479a1c81a126d10a9701cf7bc9441270ca0b0b93d4ee38e9574b2dabfa6721bf6f06356c95e5169700937491300d272fbc15cf92cfab74b5db69faf1c0358e97822d1a69c4912661ebc62437a48e25f66f0adc1c28e96207075e4ef761cb557f67d6d21553cdd77ee3d199afdb015063fe7faf8e0574f9c2b0ee13182d0d79087f46068b7af6a4a9a52bef7e1187d1aca831df1f06ba1461fff0202177d33cf9825daba75b75ffae4726f934ed62710c52d552d8396b93ccfd4b278fc3d3382a2f5b069057d929186d2b611a5bee0a916bd15dbb6ae4b94864bacf6ad0c7ea99aaa4f05a4895312aa1c14ed417a58f75c1239db56af8394d65c93632ad9bf3fb95fdf6bb7f3b6d8842b29f764671ed5870b0c94aebb8bbf7979885004cfe04cc04c3e14ef7f9adec9a49135bec79496e8580d1fc01c4a758fa2c82e40c3650a4cf1b9faedb397dcd217bf71dec3dde3f2108ce5e1b6b7382b2f9a551dc0a6c2e38ab38678805586af2972291dab0841d55fd220f945c54683f5ae948e236005fa6bb48054b09b86165d3f82507fb0d22591a8a481c5d04ac0c4d2bf80e8caa8b6b92e54d7d0ef2c3691522d9794a6fd5d3068e81e436fc82fa93d464c7dbe055e4701e845fe39021f09569226149b1e90fdbebc3859f23e2eaea0430778e2e0a3aa4e5350b8781112304ca91b03c49b05eeac62de70b254dfe20c02b0088ef9b6f38b4f09df5eb040e49ed4386dc333c5fe7d5c513dba6300eb70d9040637f80e348fbb56da3f5853927d5f09d30f31657b0b369896ac18365cabbc115813d40d3d5993fa06f5a6f8977d8cafe7ec5461cfcf3927bd6a192f78a1d3e4c697425c94d9a6f84ec661a8482656ea5fe8b3639443f1d45c0eeafa610332cf90c7fe3239b59b7f4bae364fbb3fc19460955cc75664e17b0cfbf93cb50d5b85a96928f4f63745ee942cef0722074c0863483199647af1e36ef05fa11b81c9494deb9c7acb51bd24fcba5d0548443af76183feed593fe13f959a6411003ad962fea42213f165756ca3a38c91eca5815b8593ad64c09b3ebef2fe9711153364274fd25dc1e0a8221a3e6a97c74e755ad9d71953270b200fe6c31c2d84f25c9b116cf06628756783dae4cf4036b6fc1598e4af4db5230f4669a16ec5a400882b6c887daadbb481b0c0eca857354b49ec3769506fe74619b0427e9bcb028cfba7656f26a6b4403b862dde95ee455970063b039c1f4e68288761840e40db30982a26caaca9ffa1a833706f3ad78f8c97c1fa6426b0573f5876b7cac13ed817e97f85fa6ae24d8051519412e9cd11fb27eb1f638c5c3980dc18fca6cc571ea177250daf262bbb4cebf37138f5a08814449e75518ec0fb4cec4b03ea423e53b3ddd25e57667d69a1d99492db1cb1c250838b5813d0c9b4bb95e73a3dee645163ac266a262d49669315730fad1e35296443cbf8cd4c308d2ac8c6658a0699410495c1d898dd779b28f3660d1fc53b36db8483afad8b8063e7329fdccc22fdefd6fa038e7bc553f7037760ffe2b381f6f0aaa42e3024839887175f2073408839414efaf5c5620662"}}, &(0x7f0000000080)=""/35, 0x109a, 0x23, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) write$binfmt_elf32(r0, 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) [ 1399.693682] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1399.749410] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1399.823800] gfs2: commit mount option requires a positive numeric argument [ 1399.845011] gfs2: can't parse mount arguments [ 1399.901951] XFS (loop2): Invalid superblock magic number 06:46:18 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400000, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) epoll_create(0x8) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:18 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000200), 0x0) 06:46:18 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x2010000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:18 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:18 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000200), 0x0) [ 1400.205213] FAULT_INJECTION: forcing a failure. [ 1400.205213] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.219609] gfs2: commit mount option requires a positive numeric argument [ 1400.255818] CPU: 0 PID: 30576 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1400.263119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.263125] Call Trace: [ 1400.263152] dump_stack+0x172/0x1f0 [ 1400.263174] should_fail.cold+0xa/0x1b [ 1400.263193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1400.263215] ? ___might_sleep+0x163/0x280 [ 1400.263234] __should_failslab+0x121/0x190 [ 1400.287732] should_failslab+0x9/0x14 [ 1400.287759] kmem_cache_alloc+0x2be/0x710 [ 1400.287775] ? rcu_read_lock_sched_held+0x110/0x130 [ 1400.287791] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1400.314971] ? __mark_inode_dirty+0x241/0x1290 [ 1400.319647] ext4_mb_new_blocks+0x5a8/0x3c70 [ 1400.324058] ? ext4_find_extent+0x76e/0x9d0 [ 1400.328395] ext4_ext_map_blocks+0x3094/0x4e50 [ 1400.332985] ? ext4_ext_release+0x10/0x10 [ 1400.337150] ? __lock_is_held+0xb6/0x140 [ 1400.341238] ext4_map_blocks+0x8ec/0x1a20 [ 1400.345509] ? ext4_issue_zeroout+0x170/0x170 [ 1400.350022] ? kasan_check_write+0x14/0x20 [ 1400.354261] ? __brelse+0x95/0xb0 [ 1400.357730] ext4_getblk+0xc4/0x510 [ 1400.361388] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1400.365724] ? ext4_free_inode+0x1470/0x1470 [ 1400.370150] ext4_bread+0x8f/0x230 [ 1400.373707] ? ext4_getblk+0x510/0x510 [ 1400.377639] ext4_append+0x155/0x370 [ 1400.381371] ext4_mkdir+0x61b/0xdf0 [ 1400.385021] ? ext4_init_dot_dotdot+0x520/0x520 [ 1400.389793] ? selinux_inode_mkdir+0x23/0x30 [ 1400.394222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1400.399778] ? security_inode_mkdir+0xee/0x120 [ 1400.404371] vfs_mkdir+0x433/0x690 [ 1400.407931] do_mkdirat+0x234/0x2a0 [ 1400.411567] ? __ia32_sys_mknod+0xb0/0xb0 [ 1400.415723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1400.420494] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1400.425864] ? do_syscall_64+0x26/0x610 [ 1400.430104] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1400.434695] __x64_sys_mkdir+0x5c/0x80 [ 1400.438585] do_syscall_64+0x103/0x610 [ 1400.442486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1400.447680] RIP: 0033:0x457247 [ 1400.450875] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1400.469784] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1400.477583] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1400.484852] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1400.492123] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1400.499395] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 06:46:18 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x3, 0x100) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000001c0)={0x2, &(0x7f0000000140), 0xc, r1, 0x8}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x0, 0x10, 0x0, 0x1, "cb75a8ac5c27a7c69eb36deb4cf0cf17499f4ba14dd0c3523128f614c6a1b9c6"}) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000080)={0x3, 0xdea}) 06:46:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x4, 0x9, 0x7, 0x10000, 0x3, 0xebc, 0x9, 0x0, 0x8, 0x8, 0x401, 0x90}) 06:46:18 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000100)=@nfc, 0x80, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/110, 0x6e}, {&(0x7f0000000440)=""/188, 0xbc}], 0x2, &(0x7f0000000500)=""/232, 0xe8}, 0x7ff}, {{&(0x7f0000000600)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/160, 0xa0}, {&(0x7f0000001740)=""/26, 0x1a}], 0x3, &(0x7f00000017c0)=""/120, 0x78}, 0x1ff}, {{&(0x7f0000001840)=@pppol2tpin6, 0x80, &(0x7f0000001c40)=[{&(0x7f00000018c0)=""/136, 0x88}, {&(0x7f0000001980)=""/244, 0xf4}, {&(0x7f0000001a80)}, {&(0x7f0000001ac0)=""/63, 0x3f}, {&(0x7f0000001b00)=""/9, 0x9}, {&(0x7f0000001b40)=""/199, 0xc7}], 0x6, &(0x7f0000001cc0)=""/157, 0x9d}, 0x4d84}, {{&(0x7f0000001d80)=@hci, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001e00)=""/250, 0xfa}, {&(0x7f0000001f00)=""/250, 0xfa}, {&(0x7f0000002000)=""/185, 0xb9}], 0x3, &(0x7f0000002100)=""/213, 0xd5}, 0x1}], 0x4, 0x40010042, &(0x7f0000002300)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) [ 1400.506666] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1400.529745] gfs2: can't parse mount arguments 06:46:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x3f00000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:18 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) 06:46:18 executing program 5: setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:18 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 06:46:18 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) [ 1400.712705] gfs2: commit mount option requires a positive numeric argument [ 1400.738142] gfs2: can't parse mount arguments 06:46:18 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x4, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) write$sndseq(r0, &(0x7f0000000040)=[{0xfffffffffffffffc, 0xfff, 0x9d77, 0x8, @time={0x0, 0x1c9c380}, {0x2, 0xfffffffffffff800}, {0x7, 0x9}, @addr={0x2f0, 0x200}}, {0x75, 0x0, 0x8, 0x9, @tick=0x7, {0x6}, {0x100, 0x4}, @note={0x188, 0xffffffff, 0x1, 0x1, 0x81}}, {0x7, 0xb692, 0xe29e, 0x7, @tick=0x80f5, {0xfffffffffffffffb, 0x400}, {0x7, 0x9}, @raw8={"1f3c2790fec03de1fe065b7d"}}, {0x8, 0x6, 0xfffffffffffffbff, 0xe9, @tick=0xfffffffffffffffd, {0x7, 0x9}, {0xffffffffffffffff, 0xc636}, @raw32={[0x6, 0x8, 0x3]}}, {0xed26, 0x1f, 0x4, 0xfb, @time, {0x4, 0x3}, {0xffffffffffff7fff}, @time=@tick=0x81}, {0x9, 0x100, 0x0, 0xffffffffffffff1b, @tick=0x1, {0xbb, 0x400}, {0xb2}, @ext={0x1000, &(0x7f0000000480)="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"}}, {0x7, 0xbd, 0x9, 0x200, @time, {0xdb, 0x7}, {0x477, 0x40}, @time=@tick=0x3}], 0x150) 06:46:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x4000000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1400.875654] FAULT_INJECTION: forcing a failure. [ 1400.875654] name failslab, interval 1, probability 0, space 0, times 0 06:46:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x8, 0x941) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x50000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000240)) recvfrom$inet(r2, &(0x7f0000000080)=""/132, 0x84, 0x10000, &(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000340)={0x1, "e80be2853f8c225b96cbd1db0933fca884d73c71b4e78154cf9e71c85d9f4280", 0x4, 0x70, 0xfffffffffffffffb, 0x4, 0x8f93fd633cca1034, 0x3, 0x81, 0x6}) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000300)=0xff, 0x4) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x2) connect$bt_l2cap(r2, &(0x7f00000001c0)={0x1f, 0x1000, {0x6, 0x2, 0x2, 0x2, 0x8, 0xc0}, 0x20, 0x7}, 0xe) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x0, 0xe21, 0x0, 0xd6f, 0xfffffffffffffff8, 0x3, 0x100, 0x3f, 0xff, 0x81, 0x968}, 0xb) [ 1400.962110] CPU: 0 PID: 30621 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1400.969533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.978907] Call Trace: [ 1400.981509] dump_stack+0x172/0x1f0 [ 1400.981532] should_fail.cold+0xa/0x1b [ 1400.981550] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1400.981573] ? ___might_sleep+0x163/0x280 [ 1400.994167] __should_failslab+0x121/0x190 [ 1400.994187] should_failslab+0x9/0x14 [ 1400.994200] __kmalloc+0x2dc/0x740 [ 1400.994219] ? ext4_find_extent+0x76e/0x9d0 [ 1401.009934] ext4_find_extent+0x76e/0x9d0 [ 1401.009958] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1401.009979] ext4_ext_map_blocks+0x1cc/0x4e50 [ 1401.009999] ? ext4_ext_release+0x10/0x10 [ 1401.028399] ? __lock_is_held+0xb6/0x140 [ 1401.028424] ? lock_acquire+0x16f/0x3f0 [ 1401.028444] ? ext4_map_blocks+0x884/0x1a20 [ 1401.028474] ext4_map_blocks+0x8ec/0x1a20 [ 1401.049256] ? ext4_issue_zeroout+0x170/0x170 [ 1401.053776] ? kasan_check_write+0x14/0x20 [ 1401.058117] ? __brelse+0x95/0xb0 [ 1401.061586] ext4_getblk+0xc4/0x510 [ 1401.065230] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1401.069570] ? ext4_free_inode+0x1470/0x1470 [ 1401.073998] ext4_bread+0x8f/0x230 [ 1401.077544] ? ext4_getblk+0x510/0x510 [ 1401.081451] ext4_append+0x155/0x370 [ 1401.085178] ext4_mkdir+0x61b/0xdf0 [ 1401.088828] ? ext4_init_dot_dotdot+0x520/0x520 [ 1401.093518] ? selinux_inode_mkdir+0x23/0x30 [ 1401.097940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.103492] ? security_inode_mkdir+0xee/0x120 [ 1401.108090] vfs_mkdir+0x433/0x690 [ 1401.111651] do_mkdirat+0x234/0x2a0 [ 1401.115291] ? __ia32_sys_mknod+0xb0/0xb0 [ 1401.119449] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1401.124222] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.129597] ? do_syscall_64+0x26/0x610 [ 1401.133582] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1401.138176] __x64_sys_mkdir+0x5c/0x80 [ 1401.142078] do_syscall_64+0x103/0x610 [ 1401.145991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.151180] RIP: 0033:0x457247 [ 1401.154374] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1401.173459] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1401.181186] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1401.188458] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1401.195727] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1401.203138] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 06:46:19 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), 0x0) 06:46:19 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x40030000000000}, &(0x7f0000000200), 0x0) [ 1401.210414] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1401.233488] gfs2: commit mount option requires a positive numeric argument [ 1401.258868] gfs2: can't parse mount arguments 06:46:19 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) r3 = request_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='user!ppp0\\,%\x00', 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000600)={r3, 0x30f, 0xfffffffffffffffc}, &(0x7f0000000640)=ANY=[@ANYBLOB="656e633d706b63733120e86173683d736861332d3232342d63650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], &(0x7f00000006c0)="f1d48bf9d1dbdf3a460ff2df4d37003b659ff31e2324af149b84c66956df72144df37849cd295fccf318ac58ff95b672a31936e055e2b7fc7d15a35db7d6607fd158302f1612d1a86d7d232868ad2c086042f99f48f0ccfd2394f66578f48e5a0cdff388a2927236be75146f96cb0899926b280b90529852082bb3f178a747c86521b8d1ca99a3d0843dbc41499169b333243b2c153a910539af401190e226d5b5865299efa7c1", &(0x7f0000000780)="6d61a443432460e02f19dfe2370e704f826c2073913a35e33f95f731e0d07c13d77cfe944ecc730750ad14f2cfc57dc9a9312ad962fc3ba1d5becf478d8f317a5361c57404b3fccc0f4fa4aad0460dffa69ed2c43c4ff674") r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = dup2(r6, r4) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000480)={@xdp={0x2c, 0x6, r8, 0xa}, {&(0x7f00000003c0)=""/131, 0x83}, &(0x7f0000000140), 0x2}, 0xa0) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000240)={0x87, @multicast2, 0x4e24, 0x1, 'wrr\x00', 0x8, 0x800, 0x13}, 0x2c) 06:46:19 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80400, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x365, 0x7, 0x4, 0x20000, {0x77359400}, {0x5, 0xa, 0x0, 0x0, 0x9, 0x0, "2bc67d0a"}, 0x5, 0x1, @userptr=0x7, 0x4}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x8, 0x1, 0x32, 0x3, 0xa, 0x0, 0x101, 0x100000001, 0x10000, 0x400, 0x2, 0xffffffffffffff89}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:19 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x81}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:19 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000200), 0x0) 06:46:19 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x4400000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:19 executing program 5: r0 = getpgrp(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000380)='net/udplite6\x00') r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400100, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/current\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2, 0x3}}, 0x18) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) 06:46:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xfecd) [ 1401.594166] gfs2: commit mount option requires a positive numeric argument [ 1401.623317] FAULT_INJECTION: forcing a failure. [ 1401.623317] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.632580] gfs2: can't parse mount arguments [ 1401.634637] CPU: 0 PID: 30667 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1401.646765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.646771] Call Trace: [ 1401.646796] dump_stack+0x172/0x1f0 [ 1401.646814] should_fail.cold+0xa/0x1b [ 1401.646830] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1401.646844] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1401.646861] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1401.646880] __should_failslab+0x121/0x190 [ 1401.646897] should_failslab+0x9/0x14 [ 1401.646910] kmem_cache_alloc+0x47/0x710 [ 1401.646921] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1401.646938] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1401.646949] ? ext4_es_scan+0x6f0/0x6f0 [ 1401.646965] ? do_raw_write_lock+0x124/0x290 [ 1401.646981] __es_insert_extent+0x2cc/0xf20 [ 1401.647001] ext4_es_insert_extent+0x2b7/0xa40 [ 1401.647019] ? ext4_es_scan_clu+0x50/0x50 [ 1401.647049] ext4_map_blocks+0xba2/0x1a20 [ 1401.647071] ? ext4_issue_zeroout+0x170/0x170 [ 1401.647092] ? kasan_check_write+0x14/0x20 [ 1401.720814] ? __brelse+0x95/0xb0 [ 1401.720843] ext4_getblk+0xc4/0x510 [ 1401.720863] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1401.720883] ? ext4_free_inode+0x1470/0x1470 [ 1401.720900] ext4_bread+0x8f/0x230 [ 1401.720915] ? ext4_getblk+0x510/0x510 [ 1401.761139] ext4_append+0x155/0x370 [ 1401.764975] ext4_mkdir+0x61b/0xdf0 [ 1401.768641] ? ext4_init_dot_dotdot+0x520/0x520 [ 1401.773345] ? selinux_inode_mkdir+0x23/0x30 [ 1401.777772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1401.783852] ? security_inode_mkdir+0xee/0x120 [ 1401.788455] vfs_mkdir+0x433/0x690 [ 1401.792014] do_mkdirat+0x234/0x2a0 [ 1401.795665] ? __ia32_sys_mknod+0xb0/0xb0 [ 1401.799829] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1401.804612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.810001] ? do_syscall_64+0x26/0x610 [ 1401.813990] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1401.818595] __x64_sys_mkdir+0x5c/0x80 [ 1401.822507] do_syscall_64+0x103/0x610 [ 1401.826423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.831804] RIP: 0033:0x457247 [ 1401.835024] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1401.853942] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1401.861660] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457247 [ 1401.869034] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000180 [ 1401.876737] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1401.884020] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 06:46:19 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0xff28, {{0xa, 0x4e21, 0x1, @remote, 0x400}}}, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x480000000001, 0x0) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0xfffffffffffffd96) 06:46:19 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200), 0x0) 06:46:20 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200), 0x0) 06:46:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1401.891293] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1402.061063] XFS (loop2): Invalid superblock magic number 06:46:20 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x6280001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000100)=ANY=[], 0xffffffffffffff21) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:20 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) r1 = getpgid(0x0) ioprio_set$pid(0x3, r1, 0x3) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) write$selinux_context(r0, &(0x7f0000000040)='system_u:object_r:selinux_config_t:s0\x00', 0x26) 06:46:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x4800000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:20 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200), 0x0) 06:46:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x200000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:20 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:20 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) [ 1402.501865] gfs2: commit mount option requires a positive numeric argument [ 1402.509195] gfs2: can't parse mount arguments 06:46:20 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) write$evdev(r0, &(0x7f0000000040)=[{{0x0, 0x2710}, 0x4, 0x9, 0x6}, {{}, 0x2, 0x1, 0x3ff}], 0x30) 06:46:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x9000000000000, 0xffffffff, 0x7, 0x1}) 06:46:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x4c00000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:20 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x840, 0x0) write$sndseq(r0, &(0x7f0000000080)=[{0x2, 0x1000, 0x0, 0x100000001, @tick, {}, {0x0, 0x4}, @connect={{0x8, 0x4}, {0xe, 0x6}}}], 0x30) 06:46:20 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0) [ 1402.699346] gfs2: commit mount option requires a positive numeric argument [ 1402.727749] gfs2: can't parse mount arguments [ 1402.840172] FAULT_INJECTION: forcing a failure. [ 1402.840172] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.914389] CPU: 1 PID: 30733 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1402.921707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.931065] Call Trace: [ 1402.933668] dump_stack+0x172/0x1f0 [ 1402.937313] should_fail.cold+0xa/0x1b [ 1402.941218] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1402.946324] ? lock_downgrade+0x810/0x810 [ 1402.950479] ? ___might_sleep+0x163/0x280 [ 1402.954630] __should_failslab+0x121/0x190 [ 1402.958874] should_failslab+0x9/0x14 [ 1402.962677] __kmalloc_track_caller+0x2d8/0x740 [ 1402.967354] ? lock_downgrade+0x810/0x810 [ 1402.971511] ? strndup_user+0x77/0xd0 [ 1402.975315] memdup_user+0x26/0xb0 [ 1402.978859] strndup_user+0x77/0xd0 [ 1402.982491] ksys_mount+0x3c/0x150 [ 1402.986040] __x64_sys_mount+0xbe/0x150 [ 1402.990023] do_syscall_64+0x103/0x610 [ 1402.993919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1402.999106] RIP: 0033:0x45a89a [ 1403.002300] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1403.021203] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1403.028908] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1403.036173] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1403.043436] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1403.050705] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1403.058146] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:21 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r3) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f00000000c0)=@null) 06:46:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x6000000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:21 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x975bf11d1a46897, 0x0) write$sndseq(r0, &(0x7f00000000c0), 0x0) 06:46:21 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200), 0x0) 06:46:21 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1403.506608] FAULT_INJECTION: forcing a failure. [ 1403.506608] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.513639] gfs2: commit mount option requires a positive numeric argument [ 1403.536816] CPU: 1 PID: 30751 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1403.544226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.553587] Call Trace: [ 1403.556199] dump_stack+0x172/0x1f0 [ 1403.559835] should_fail.cold+0xa/0x1b [ 1403.563736] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1403.568845] ? lock_downgrade+0x810/0x810 [ 1403.573004] ? ___might_sleep+0x163/0x280 [ 1403.576418] gfs2: can't parse mount arguments [ 1403.577159] __should_failslab+0x121/0x190 [ 1403.585866] should_failslab+0x9/0x14 [ 1403.589680] __kmalloc_track_caller+0x2d8/0x740 [ 1403.594365] ? lock_downgrade+0x810/0x810 [ 1403.598516] ? strndup_user+0x77/0xd0 [ 1403.602330] memdup_user+0x26/0xb0 [ 1403.605878] strndup_user+0x77/0xd0 [ 1403.609509] ksys_mount+0x3c/0x150 [ 1403.613062] __x64_sys_mount+0xbe/0x150 [ 1403.617045] do_syscall_64+0x103/0x610 [ 1403.620940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1403.626131] RIP: 0033:0x45a89a [ 1403.629325] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1403.648227] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:21 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200), 0x0) 06:46:21 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0xfc, 0x0, 0x0, 0x0, @tick, {}, {0xffffffffffffffff, 0x8}, @note={0xffffffff, 0x409}}], 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000002c0)=0xe8) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x2, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x80000001, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="98410ce224843cbfc8178e1b1abe0b0ef91312346fea12e3ea0f29f4609326329a6001f2069e2134ff23b90b657fea0b45a0dc2f25a227f285d7b1b1e9ef12f7fa0d3e52f780f6b2b593ac9a7fde63ce656d536dc85a712c45637b1869b093bff35cd5a3e8510a7f7681545d78de32bec9ed0fffeace5404a0143280892d74d07b83d1dc1eb1f6a90984351aff8cc2f726f0aae335839138229ac7d81f32b69f49ba1e3ae68af0ef692eac641074139ec4cde9", 0xb3}], 0x4008, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000020773537c8834c065eabe241b0ac7f6167a25a8545b408daace7a21c879edaebec072fe9ab140fcd77700ff160ab372d7f5d66e0b803eb8b90bbe169eb15993c93da7eb9afece6fb263e672bbbae64e0a88545a0679eadb016", @ANYRESHEX=r1, @ANYBLOB=',barrier,nobarrier,uid=', @ANYRESHEX=r2, @ANYBLOB="2c7569643d7ae8024da1e0ca0ada4a4cd5d5e760dd3429", @ANYRESDEC=r3, @ANYBLOB="2c7375626a5f757365723d2f6465762f73657175656e636572002c61707072616973655f747970653d696d617369672c66736e6108653d2f6465762f73657175656e636572002c7063723d30303030303030303030303030303030303033342c73666c6f6f723d2f6465762f73657175656e636572002c726f6f74636f6e746578743d73746166665f752c00ab1fef8f297cbb7264b4ebdea8d4068523cb392ff55dc0dde71c8e080c3014e3db391296a05f7a813b6a2da7f23862623568f5c568d4fe004c6f85626c9c3b3f2b973c6cff9186b441c8d96a182bfa6c67610fce57e4312845cdbfed8016a8337eea71694684bcb1e6ce9a4075b4ad5077c78accbc33327b6701f5700ed59e283702c63db20ce6fefead111aa2ec4613c67de11d7a000000000000"]) 06:46:21 executing program 3: r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000300)={{0x3, @bcast}, [@null, @default, @default, @null, @default, @default, @bcast, @netrom]}, &(0x7f0000000380)=0x48, 0x80000) write$binfmt_elf32(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x401, 0x7fffffff, 0x5, 0xfffffffffffffffc, 0x7f, 0x3, 0x3, 0x1, 0x2e7, 0x38, 0x322, 0xfff, 0x0, 0x20, 0x1, 0x3, 0x4c}, [{0x7, 0x100000001, 0x4, 0x8000, 0x100000000, 0x6ac, 0x1, 0x9}], "2a099be9708313d07678ebb0b7f5cc14cc7a5436b4827fbb0486b10bb55e63094c", [[], [], [], [], []]}, 0x579) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200200, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f00000002c0)={0xfffffffffffffffa, 0xb3f, &(0x7f00000000c0)="77ddc8ea22ebfdf613889cf37084823dbcca8ef703b8cd91b63b31c03307e834ff0969279bd66e4075b609144353d2ccd201e5bae975bec51958964c57860786c07974c44ff6d403051459532fa9be5906fc2721f5cbe2c4166297fead8c355227650646ff88adce07443c6e5e23cdcfd767f23f9a8a1a8cf0413de02e9f2a679b64d3ee07669985cac64ed29f34f2ecac5c7c7358b672be53bc698286b0f654e890b2443753c2f287061c98fb46b2d76f191524e3efcf8ee06ec72ae8dc1da956", &(0x7f00000001c0)="5847ff9267ace474503663607324fd6aa8101ff6486013676b1918e6ff034c52486287558cc3c47b157d34e7d6478dc117cc488a62813cce10f0f9b111b1884ea626be858b4215c53d37d19cb32a72737c667f8e0d63cf754db7a192f47011531b728d20ee274732736157e6ad5de86f02a74468ee74c1813188c743ad651010aba075b3ee2dfe9b5e89328242f524ee2d1e910fc92eb98419acb4b984d872bf1d1f00ba9a5399736b01b578159468b042cb40a75af4097dd5add556ac303a97e5e7312c52408fbb599c5b96eebbcd721e1dfa3c2864ebe94122469dfa33c8eedf19e92f1de34bc986397631f2fce10b68ada78a95a822c710db75197787", 0xc1, 0xfe}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) [ 1403.655946] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1403.663213] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1403.670479] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1403.677746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1403.685013] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x6800000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:21 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:21 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x400000000001, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={0x0, 0x7530}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x20, 0x3, {"368bcd647e9e9b30db280b1d43ae6bdf"}, 0x7f, 0x8}}}, 0x90) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @note={0xffffffff, 0x409}}], 0x30) [ 1403.910267] gfs2: commit mount option requires a positive numeric argument [ 1403.935219] gfs2: can't parse mount arguments [ 1403.950433] FAULT_INJECTION: forcing a failure. [ 1403.950433] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.963341] CPU: 1 PID: 30780 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1403.970757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.980112] Call Trace: [ 1403.982721] dump_stack+0x172/0x1f0 [ 1403.986355] should_fail.cold+0xa/0x1b [ 1403.990251] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1403.995364] ? lock_downgrade+0x810/0x810 [ 1403.999523] ? ___might_sleep+0x163/0x280 [ 1404.003682] __should_failslab+0x121/0x190 [ 1404.007921] should_failslab+0x9/0x14 [ 1404.011728] __kmalloc_track_caller+0x2d8/0x740 [ 1404.016405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1404.021955] ? strndup_user+0x77/0xd0 [ 1404.025762] memdup_user+0x26/0xb0 [ 1404.029304] strndup_user+0x77/0xd0 [ 1404.032936] ksys_mount+0x7b/0x150 [ 1404.036483] __x64_sys_mount+0xbe/0x150 [ 1404.040644] do_syscall_64+0x103/0x610 [ 1404.044539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1404.049726] RIP: 0033:0x45a89a [ 1404.052917] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1404.071988] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1404.079694] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1404.086962] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1404.094230] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1404.101505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1404.108770] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:22 executing program 0: 06:46:22 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000200), 0x0) 06:46:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x2) 06:46:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x05\x00\x00\x10\x00', 0x9e01}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x10000306) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 06:46:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x6c00000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:22 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1404.452379] FAULT_INJECTION: forcing a failure. [ 1404.452379] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.475426] gfs2: commit mount option requires a positive numeric argument [ 1404.514808] gfs2: can't parse mount arguments [ 1404.521690] CPU: 0 PID: 30793 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1404.528986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.538339] Call Trace: [ 1404.540938] dump_stack+0x172/0x1f0 [ 1404.544578] should_fail.cold+0xa/0x1b [ 1404.548486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1404.553600] ? lock_downgrade+0x810/0x810 [ 1404.557765] ? ___might_sleep+0x163/0x280 06:46:22 executing program 0: [ 1404.561926] __should_failslab+0x121/0x190 [ 1404.566173] should_failslab+0x9/0x14 [ 1404.569977] __kmalloc_track_caller+0x2d8/0x740 [ 1404.574660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1404.580208] ? strndup_user+0x77/0xd0 [ 1404.584029] memdup_user+0x26/0xb0 [ 1404.587583] strndup_user+0x77/0xd0 [ 1404.591223] ksys_mount+0x7b/0x150 [ 1404.594768] __x64_sys_mount+0xbe/0x150 [ 1404.598755] do_syscall_64+0x103/0x610 [ 1404.602654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1404.607851] RIP: 0033:0x45a89a 06:46:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1404.611047] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1404.629960] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1404.637678] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1404.644954] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1404.652228] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 06:46:22 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200), 0x0) 06:46:22 executing program 0: 06:46:22 executing program 5: [ 1404.659518] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1404.666793] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:22 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000200), 0x0) 06:46:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x7400000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:22 executing program 0: 06:46:23 executing program 5: 06:46:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x31c) [ 1404.893170] gfs2: commit mount option requires a positive numeric argument [ 1404.923278] gfs2: can't parse mount arguments 06:46:23 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:23 executing program 0: 06:46:23 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x34000}, &(0x7f0000000200), 0x0) 06:46:23 executing program 5: 06:46:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x7a00000000000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) msgget$private(0x0, 0x20) 06:46:23 executing program 5: 06:46:23 executing program 0: 06:46:23 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x400300}, &(0x7f0000000200), 0x0) [ 1405.206462] gfs2: commit mount option requires a positive numeric argument [ 1405.219207] FAULT_INJECTION: forcing a failure. [ 1405.219207] name failslab, interval 1, probability 0, space 0, times 0 06:46:23 executing program 5: [ 1405.267759] gfs2: can't parse mount arguments [ 1405.272616] CPU: 0 PID: 30839 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1405.279906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.289269] Call Trace: [ 1405.291879] dump_stack+0x172/0x1f0 [ 1405.295526] should_fail.cold+0xa/0x1b [ 1405.299435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1405.304565] ? lock_downgrade+0x810/0x810 [ 1405.308727] ? ___might_sleep+0x163/0x280 [ 1405.312890] __should_failslab+0x121/0x190 06:46:23 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000200), 0x0) [ 1405.317143] should_failslab+0x9/0x14 [ 1405.321038] __kmalloc_track_caller+0x2d8/0x740 [ 1405.325721] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1405.331180] ? alloc_vfsmnt+0x28/0x780 [ 1405.335082] ? kstrdup_const+0x66/0x80 [ 1405.338991] kstrdup+0x3a/0x70 [ 1405.342188] kstrdup_const+0x66/0x80 [ 1405.345918] alloc_vfsmnt+0xba/0x780 [ 1405.349648] vfs_kern_mount.part.0+0x2a/0x410 [ 1405.354155] do_mount+0x581/0x2d30 [ 1405.357703] ? copy_mount_options+0x41/0x440 [ 1405.362118] ? copy_mount_string+0x40/0x40 06:46:23 executing program 5: [ 1405.366356] ? kmem_cache_alloc_trace+0x354/0x760 [ 1405.371206] ? _copy_from_user+0xdd/0x150 [ 1405.375370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1405.381025] ? copy_mount_options+0x30e/0x440 [ 1405.385530] ksys_mount+0xdb/0x150 [ 1405.389083] __x64_sys_mount+0xbe/0x150 [ 1405.393068] do_syscall_64+0x103/0x610 [ 1405.396970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1405.402165] RIP: 0033:0x45a89a [ 1405.405358] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1405.424267] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1405.431980] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1405.439253] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1405.446525] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1405.453899] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1405.461171] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:23 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x9, 0x4, &(0x7f0000519fa8)=ANY=[@ANYBLOB="18000000000000000000000000000000671e00000000000095d46e9bed000000"], 0x0, 0x8000, 0x1000, &(0x7f000062b000)=""/4096}, 0x48) 06:46:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x80004e22}, 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 06:46:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0x8cffffff00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:23 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000200), 0x0) 06:46:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x20000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000180)={0x4, 0x2, 0x10001, 0x6ddb, &(0x7f0000000080)=[{}, {}]}) [ 1405.651665] gfs2: commit mount option requires a positive numeric argument [ 1405.664678] gfs2: can't parse mount arguments [ 1405.673525] FAULT_INJECTION: forcing a failure. [ 1405.673525] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1405.685529] CPU: 1 PID: 30865 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1405.692907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.702248] Call Trace: [ 1405.704831] dump_stack+0x172/0x1f0 [ 1405.708449] should_fail.cold+0xa/0x1b [ 1405.712329] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1405.717424] should_fail_alloc_page+0x50/0x60 [ 1405.721906] __alloc_pages_nodemask+0x1a1/0x710 [ 1405.726562] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1405.731567] ? find_held_lock+0x35/0x130 [ 1405.735625] cache_grow_begin+0x9c/0x8c0 [ 1405.739672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1405.745198] ? check_preemption_disabled+0x48/0x290 [ 1405.750214] kmem_cache_alloc+0x645/0x710 [ 1405.754355] getname_flags+0xd6/0x5b0 [ 1405.758158] user_path_at_empty+0x2f/0x50 [ 1405.762302] do_mount+0x15e/0x2d30 [ 1405.765828] ? copy_mount_options+0x5c/0x440 [ 1405.770224] ? copy_mount_string+0x40/0x40 [ 1405.774448] ? kmem_cache_alloc_trace+0x354/0x760 [ 1405.779281] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1405.784805] ? _copy_from_user+0xdd/0x150 [ 1405.788938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1405.794472] ? copy_mount_options+0x30e/0x440 [ 1405.798959] ksys_mount+0xdb/0x150 [ 1405.802488] __x64_sys_mount+0xbe/0x150 [ 1405.806453] do_syscall_64+0x103/0x610 [ 1405.810327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1405.815498] RIP: 0033:0x45a89a [ 1405.818675] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1405.837658] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r0) 06:46:24 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000200), 0x0) [ 1405.846141] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1405.853395] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1405.860652] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1405.867905] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1405.875158] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xf6ffffff00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfffffffffffffd31) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x2, 0xd2, 0x14ee}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x2, 0xe, 0xfffffffffffeffff, 0x5, 0x80, 0x6, 0xff, 0x2, 0x6}) 06:46:24 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000200), 0x0) 06:46:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe9a, 0x200408d4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 1406.048050] XFS (loop2): Invalid superblock magic number [ 1406.083857] gfs2: commit mount option requires a positive numeric argument [ 1406.164863] gfs2: can't parse mount arguments 06:46:24 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:24 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000580)={'#! ', './file0', [{0x20, '{\x82\x04~j\xa23\xade\xbb\xd7\xaa\xab\x90\x98uW\xb09\xb4pz\xba\x17\x90\x97\xd2t\x907\xcbW\xd8\xe3\xdb\xdf\xb9\xe5\xda\x91\xe6\xc0:a\x11\xca\x81\xbd\xfe\x81)\xf5\a\xf2\xbb\xd31[\xc8\xfdys\xbb\xd8S\x1c\xd6\x91\xc6\xd2\x10\xb19@\x81\x13\xf4\xa3>\xbc\x18S?\x825\xbf\xa2\xed+_\x01xyQ\xf2\xed\x8b\v9E\xd7\x1ce\x89#i\xac\xc6\xdd\xc5\xfaZ\xba\x1cW`\x9e{\f\x05\xe8\x1f\xaf;6\xfc{\xfd\xf3\x96\x93)\xf8k\xafpi-2\xbd\xd8\xde\xfdlV\xb3\x8b\xa7\xae0\xddR\x1c\x9d\x90\x9f\xc3C\xff\xee\xc57\xa1\xc4e8\xd5%\x9d\t={\xabL\xb11e\x7f\xc5]>q\xbf\xd5\xfc[\xbc\xe2\xf1u^%Z\xa4\xe6b\xd0\x1c\xcc\xd3\xc1\x9e\xbaS\xf7\xed\x92\xe7\xfa\xfe!\x87\xc8\xa8\x03\xab\xef\xdbX}\x0e\xb1\x1f`'}]}, 0xec) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 06:46:24 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) 06:46:24 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x6280001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000100)=ANY=[], 0xffffffffffffff21) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$KDDISABIO(r0, 0x4b37) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080)={0xa, 0x4, 0x4, 0x5}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCGPTPEER(r0, 0x5441, 0x1000) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xfcfdffff00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfffffffffffffd31) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x2, 0xd2, 0x14ee}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x2, 0xe, 0xfffffffffffeffff, 0x5, 0x80, 0x6, 0xff, 0x2, 0x6}) [ 1406.366476] gfs2: commit mount option requires a positive numeric argument [ 1406.387218] gfs2: can't parse mount arguments 06:46:24 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) [ 1406.430312] FAULT_INJECTION: forcing a failure. [ 1406.430312] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.467547] CPU: 1 PID: 30921 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1406.474866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.484225] Call Trace: [ 1406.486835] dump_stack+0x172/0x1f0 [ 1406.490484] should_fail.cold+0xa/0x1b [ 1406.494388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1406.499498] ? lock_downgrade+0x810/0x810 [ 1406.503662] ? ___might_sleep+0x163/0x280 [ 1406.507823] __should_failslab+0x121/0x190 [ 1406.512067] should_failslab+0x9/0x14 [ 1406.515880] kmem_cache_alloc+0x2be/0x710 [ 1406.520031] ? lock_downgrade+0x810/0x810 [ 1406.524200] alloc_vfsmnt+0x28/0x780 [ 1406.527923] vfs_kern_mount.part.0+0x2a/0x410 [ 1406.532426] do_mount+0x581/0x2d30 [ 1406.535971] ? copy_mount_options+0x41/0x440 [ 1406.540387] ? copy_mount_string+0x40/0x40 [ 1406.544623] ? kmem_cache_alloc_trace+0x354/0x760 [ 1406.549470] ? _copy_from_user+0xdd/0x150 [ 1406.553629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1406.559167] ? copy_mount_options+0x30e/0x440 [ 1406.563672] ksys_mount+0xdb/0x150 [ 1406.567219] __x64_sys_mount+0xbe/0x150 [ 1406.571201] do_syscall_64+0x103/0x610 [ 1406.575102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.580290] RIP: 0033:0x45a89a [ 1406.583490] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1406.602392] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1406.610113] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1406.617380] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 06:46:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) r6 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0xfdc8cfd449c7092f}, [{0x2, 0x7, r1}, {0x2, 0x4, r2}, {0x2, 0x1, r3}, {0x2, 0x0, r4}, {0x2, 0x7, r5}, {0x2, 0x2, r6}, {0x2, 0x2, r7}], {}, [{0x8, 0x1, r8}, {0x8, 0x6cc0d450265aa805, r9}, {0x8, 0x4, r10}, {0x8, 0x2, r11}], {0x10, 0x4}, {0x20, 0x7}}, 0x7c, 0x3) write$binfmt_elf32(r0, 0x0, 0x0) [ 1406.624650] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1406.631917] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1406.639184] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xfdfdffff00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfffffffffffffd31) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x2, 0xd2, 0x14ee}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x2, 0xe, 0xfffffffffffeffff, 0x5, 0x80, 0x6, 0xff, 0x2, 0x6}) 06:46:24 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), 0x0) 06:46:24 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1406.777579] gfs2: commit mount option requires a positive numeric argument [ 1406.810710] gfs2: can't parse mount arguments 06:46:25 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, &(0x7f0000000200), 0x0) 06:46:25 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) r3 = request_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='user!ppp0\\,%\x00', 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000600)={r3, 0x30f, 0xfffffffffffffffc}, &(0x7f0000000640)=ANY=[@ANYBLOB="656e633d706b63733120e86173683d736861332d3232342d63650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], &(0x7f00000006c0)="f1d48bf9d1dbdf3a460ff2df4d37003b659ff31e2324af149b84c66956df72144df37849cd295fccf318ac58ff95b672a31936e055e2b7fc7d15a35db7d6607fd158302f1612d1a86d7d232868ad2c086042f99f48f0ccfd2394f66578f48e5a0cdff388a2927236be75146f96cb0899926b280b90529852082bb3f178a747c86521b8d1ca99a3d0843dbc41499169b333243b2c153a910539af401190e226d5b5865299efa7c1", &(0x7f0000000780)="6d61a443432460e02f19dfe2370e704f826c2073913a35e33f95f731e0d07c13d77cfe944ecc730750ad14f2cfc57dc9a9312ad962fc3ba1d5becf478d8f317a5361c57404b3fccc0f4fa4aad0460dffa69ed2c43c4ff674") r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = dup2(r6, r4) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000480)={@xdp={0x2c, 0x6, r8, 0xa}, {&(0x7f00000003c0)=""/131, 0x83}, &(0x7f0000000140), 0x2}, 0xa0) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000240)={0x87, @multicast2, 0x4e24, 0x1, 'wrr\x00', 0x8, 0x800, 0x13}, 0x2c) [ 1406.908514] FAULT_INJECTION: forcing a failure. [ 1406.908514] name failslab, interval 1, probability 0, space 0, times 0 [ 1406.962888] CPU: 1 PID: 30948 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1406.970210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.979571] Call Trace: [ 1406.982184] dump_stack+0x172/0x1f0 [ 1406.985830] should_fail.cold+0xa/0x1b [ 1406.989730] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1406.994867] ? lock_downgrade+0x810/0x810 [ 1406.999020] ? ___might_sleep+0x163/0x280 [ 1407.003174] __should_failslab+0x121/0x190 [ 1407.007413] should_failslab+0x9/0x14 [ 1407.011213] kmem_cache_alloc+0x2be/0x710 [ 1407.015361] ? find_held_lock+0x35/0x130 [ 1407.019428] ? cache_grow_end+0xa4/0x190 [ 1407.023499] getname_flags+0xd6/0x5b0 [ 1407.027312] user_path_at_empty+0x2f/0x50 [ 1407.031464] do_mount+0x15e/0x2d30 [ 1407.035007] ? copy_mount_options+0x5c/0x440 [ 1407.039423] ? copy_mount_string+0x40/0x40 [ 1407.043655] ? kmem_cache_alloc_trace+0x354/0x760 [ 1407.048513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1407.054060] ? copy_mount_options+0x30e/0x440 [ 1407.058559] ksys_mount+0xdb/0x150 [ 1407.062104] __x64_sys_mount+0xbe/0x150 [ 1407.066090] do_syscall_64+0x103/0x610 [ 1407.069984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.075179] RIP: 0033:0x45a89a [ 1407.078375] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1407.097276] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1407.104997] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) r6 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0xfdc8cfd449c7092f}, [{0x2, 0x7, r1}, {0x2, 0x4, r2}, {0x2, 0x1, r3}, {0x2, 0x0, r4}, {0x2, 0x7, r5}, {0x2, 0x2, r6}, {0x2, 0x2, r7}], {}, [{0x8, 0x1, r8}, {0x8, 0x6cc0d450265aa805, r9}, {0x8, 0x4, r10}, {0x8, 0x2, r11}], {0x10, 0x4}, {0x20, 0x7}}, 0x7c, 0x3) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xffffff7f00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000280)=""/72) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000300)=0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x1) pwrite64(r2, &(0x7f0000000180)="5233a61858f59a62aa629c34d501461889d9ae5269e18ed9edf50f968b0dd6157356532bdd677b8f1cb7020e89dbd4195974ee3ec7b367018d728e4ba95f4dae32ccd8206865351a6bb26d22ea4fb736100d9a88b9e0b2bcb9fa8cc8962237af19c973b612072bc762fc18106d3442ef326072fe4ae2fd8a59a1e63281e7aff816c1ba2b16e305d20680c03e355971f6285c1b89c0c66059f674a5b1d70098aac7a6ae9a1657acb1e8d673b9f015ee502b839272a6012abf18ba9b8e99d27ce06b5f692e51af42f12675dc13d3200facaffc51b1b43b1fe7fab77fd275f68bfda490a9dfe934", 0xe6, 0x0) 06:46:25 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000200), 0x0) [ 1407.112267] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1407.119543] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1407.126829] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1407.134098] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:25 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1407.225153] gfs2: commit mount option requires a positive numeric argument 06:46:25 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200), 0x0) 06:46:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0xfffffffffffffffe) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1407.284068] gfs2: can't parse mount arguments 06:46:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1407.392964] FAULT_INJECTION: forcing a failure. [ 1407.392964] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1407.404840] CPU: 1 PID: 30971 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1407.412207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.421558] Call Trace: [ 1407.421589] dump_stack+0x172/0x1f0 [ 1407.421609] should_fail.cold+0xa/0x1b [ 1407.431685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1407.431712] should_fail_alloc_page+0x50/0x60 [ 1407.441284] __alloc_pages_nodemask+0x1a1/0x710 [ 1407.445963] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1407.445982] ? find_held_lock+0x35/0x130 [ 1407.455158] cache_grow_begin+0x9c/0x8c0 [ 1407.459222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1407.465271] ? check_preemption_disabled+0x48/0x290 [ 1407.465292] kmem_cache_alloc+0x645/0x710 [ 1407.465308] ? find_held_lock+0x35/0x130 [ 1407.478490] ? cache_grow_end+0xa4/0x190 [ 1407.482566] getname_flags+0xd6/0x5b0 [ 1407.483611] gfs2: commit mount option requires a positive numeric argument [ 1407.486374] user_path_at_empty+0x2f/0x50 [ 1407.486395] do_mount+0x15e/0x2d30 [ 1407.501060] ? copy_mount_options+0x5c/0x440 [ 1407.505479] ? copy_mount_string+0x40/0x40 [ 1407.509712] ? kmem_cache_alloc_trace+0x354/0x760 [ 1407.511474] gfs2: can't parse mount arguments [ 1407.514564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1407.514579] ? copy_mount_options+0x30e/0x440 [ 1407.514597] ksys_mount+0xdb/0x150 [ 1407.532618] __x64_sys_mount+0xbe/0x150 [ 1407.536597] do_syscall_64+0x103/0x610 [ 1407.540492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.545680] RIP: 0033:0x45a89a [ 1407.548873] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1407.567780] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1407.575491] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1407.582760] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 06:46:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xffffffff00000000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1407.590115] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1407.597384] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1407.604653] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1407.760938] XFS (loop2): Invalid superblock magic number 06:46:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x4, 0x9, 0x7, 0x10000, 0x3, 0xebc, 0x9, 0x0, 0x8, 0x8, 0x401, 0x90}) 06:46:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}], [], 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:26 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80400, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x365, 0x7, 0x4, 0x20000, {0x77359400}, {0x5, 0xa, 0x0, 0x0, 0x9, 0x0, "2bc67d0a"}, 0x5, 0x1, @userptr=0x7, 0x4}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x8, 0x1, 0x32, 0x3, 0xa, 0x0, 0x101, 0x100000001, 0x10000, 0x400, 0x2, 0xffffffffffffff89}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xffffffffffffff33) 06:46:26 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200), 0x0) 06:46:26 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1408.031534] FAULT_INJECTION: forcing a failure. [ 1408.031534] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1408.043398] CPU: 1 PID: 31002 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1408.050679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.060027] Call Trace: [ 1408.060055] dump_stack+0x172/0x1f0 [ 1408.060072] should_fail.cold+0xa/0x1b [ 1408.060089] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1408.075262] should_fail_alloc_page+0x50/0x60 [ 1408.075278] __alloc_pages_nodemask+0x1a1/0x710 [ 1408.084446] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1408.089466] ? find_held_lock+0x35/0x130 [ 1408.093547] cache_grow_begin+0x9c/0x8c0 [ 1408.097615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1408.103154] ? check_preemption_disabled+0x48/0x290 [ 1408.108177] kmem_cache_alloc+0x645/0x710 [ 1408.112329] ? find_held_lock+0x35/0x130 [ 1408.116411] getname_kernel+0x53/0x370 [ 1408.120306] kern_path+0x20/0x40 [ 1408.123678] lookup_bdev.part.0+0x7b/0x1b0 [ 1408.127915] ? blkdev_open+0x290/0x290 [ 1408.131801] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1408.137255] ? rcu_read_lock_sched_held+0x110/0x130 [ 1408.142276] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1408.147819] blkdev_get_by_path+0x81/0x130 [ 1408.152057] mount_bdev+0x5d/0x3c0 [ 1408.155607] ? xfs_test_remount_options+0x90/0x90 [ 1408.160448] xfs_fs_mount+0x35/0x40 [ 1408.164075] mount_fs+0x106/0x3ff [ 1408.167532] ? emergency_thaw_all+0x1a0/0x1a0 [ 1408.172027] ? __init_waitqueue_head+0x36/0x90 [ 1408.176615] vfs_kern_mount.part.0+0x6f/0x410 [ 1408.181115] do_mount+0x581/0x2d30 [ 1408.184655] ? copy_mount_options+0x41/0x440 [ 1408.189069] ? copy_mount_string+0x40/0x40 [ 1408.193308] ? kmem_cache_alloc_trace+0x354/0x760 [ 1408.198161] ? _copy_from_user+0xdd/0x150 [ 1408.202315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1408.207855] ? copy_mount_options+0x30e/0x440 [ 1408.212354] ksys_mount+0xdb/0x150 [ 1408.215902] __x64_sys_mount+0xbe/0x150 [ 1408.219886] do_syscall_64+0x103/0x610 [ 1408.223782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.228969] RIP: 0033:0x45a89a [ 1408.232164] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1408.251064] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1408.258775] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1408.266041] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1408.273321] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 06:46:26 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200), 0x0) 06:46:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f00000000c0)) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:26 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80400, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x365, 0x7, 0x4, 0x20000, {0x77359400}, {0x5, 0xa, 0x0, 0x0, 0x9, 0x0, "2bc67d0a"}, 0x5, 0x1, @userptr=0x7, 0x4}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x8, 0x1, 0x32, 0x3, 0xa, 0x0, 0x101, 0x100000001, 0x10000, 0x400, 0x2, 0xffffffffffffff89}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) [ 1408.280590] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1408.287854] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1408.347524] gfs2: commit mount option requires a positive numeric argument [ 1408.370717] gfs2: can't parse mount arguments 06:46:26 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) 06:46:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xffffffffffffff33) 06:46:26 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80400, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x365, 0x7, 0x4, 0x20000, {0x77359400}, {0x5, 0xa, 0x0, 0x0, 0x9, 0x0, "2bc67d0a"}, 0x5, 0x1, @userptr=0x7, 0x4}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x8, 0x1, 0x32, 0x3, 0xa, 0x0, 0x101, 0x100000001, 0x10000, 0x400, 0x2, 0xffffffffffffff89}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) [ 1408.486235] sp0: Synchronizing with TNC 06:46:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3ac72df23833763a49cde45bf2636f6d6d69743d30783030303030e27afa617b0e0d27b666cd0fbf8bdcfd3bfd5205ed529d56"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:26 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0) 06:46:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x4, 0x9, 0x7, 0x10000, 0x3, 0xebc, 0x9, 0x0, 0x8, 0x8, 0x401, 0x90}) [ 1408.590490] XFS (loop2): Invalid superblock magic number 06:46:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xffffffffffffff33) 06:46:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCCBRK(r0, 0x5428) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x10001) write$binfmt_elf32(r0, 0x0, 0x0) epoll_create(0x2fce) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)=""/113) [ 1408.676054] gfs2: invalid mount option: :Ç-ò83v:IÍä[òcommit=0x00000âzúa{ '¶fÍ¿‹Üý;ýRíRV 06:46:26 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x4, 0x9, 0x7, 0x10000, 0x3, 0xebc, 0x9, 0x0, 0x8, 0x8, 0x401, 0x90}) 06:46:26 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200), 0x0) [ 1408.716848] gfs2: can't parse mount arguments 06:46:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) getpeername$llc(r1, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', r1}, 0x10) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 06:46:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000080)=0x7) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x4, 0x9, 0x7, 0x10000, 0x3, 0xebc, 0x9, 0x0, 0x8, 0x8, 0x401, 0x90}) [ 1408.834047] FAULT_INJECTION: forcing a failure. [ 1408.834047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1408.845891] CPU: 0 PID: 31059 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1408.853171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.862618] Call Trace: [ 1408.865223] dump_stack+0x172/0x1f0 [ 1408.868868] should_fail.cold+0xa/0x1b [ 1408.872770] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1408.877889] should_fail_alloc_page+0x50/0x60 [ 1408.882392] __alloc_pages_nodemask+0x1a1/0x710 [ 1408.887074] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1408.892099] ? find_held_lock+0x35/0x130 [ 1408.896191] cache_grow_begin+0x9c/0x8c0 [ 1408.900262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1408.905811] ? check_preemption_disabled+0x48/0x290 [ 1408.910844] kmem_cache_alloc+0x645/0x710 [ 1408.915000] ? find_held_lock+0x35/0x130 [ 1408.919078] getname_kernel+0x53/0x370 [ 1408.922989] kern_path+0x20/0x40 [ 1408.926373] lookup_bdev.part.0+0x7b/0x1b0 [ 1408.930620] ? blkdev_open+0x290/0x290 [ 1408.934542] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1408.940004] ? rcu_read_lock_sched_held+0x110/0x130 [ 1408.945032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1408.950582] blkdev_get_by_path+0x81/0x130 [ 1408.954835] mount_bdev+0x5d/0x3c0 [ 1408.958381] ? xfs_test_remount_options+0x90/0x90 [ 1408.963249] xfs_fs_mount+0x35/0x40 [ 1408.966885] mount_fs+0x106/0x3ff [ 1408.970349] ? emergency_thaw_all+0x1a0/0x1a0 [ 1408.974853] ? __init_waitqueue_head+0x36/0x90 [ 1408.979446] vfs_kern_mount.part.0+0x6f/0x410 [ 1408.979467] do_mount+0x581/0x2d30 [ 1408.979482] ? copy_mount_options+0x41/0x440 [ 1408.979499] ? copy_mount_string+0x40/0x40 [ 1408.996138] ? kmem_cache_alloc_trace+0x354/0x760 [ 1409.001005] ? _copy_from_user+0xdd/0x150 [ 1409.005209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1409.011272] ? copy_mount_options+0x30e/0x440 [ 1409.011293] ksys_mount+0xdb/0x150 [ 1409.011312] __x64_sys_mount+0xbe/0x150 [ 1409.011332] do_syscall_64+0x103/0x610 [ 1409.011355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.011365] RIP: 0033:0x45a89a [ 1409.011380] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1409.011387] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1409.011401] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1409.011409] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1409.011417] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 06:46:27 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200), 0x0) 06:46:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f00000000c0)) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:27 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x400000, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) epoll_create(0x8) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f00000000c0)) write$binfmt_elf32(r0, 0x0, 0x0) [ 1409.011431] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1409.011439] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1409.123884] gfs2: commit mount option requires a positive numeric argument [ 1409.155755] gfs2: can't parse mount arguments 06:46:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffff94, 0x0, 0x101, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgid(0xffffffffffffffff) fcntl$lock(r2, 0x25, &(0x7f0000000000)={0x3, 0x4, 0x4ebd4e7c, 0x2, r3}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:27 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000200), 0x0) [ 1409.201522] XFS (loop2): Invalid superblock magic number 06:46:27 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f00000000c0)) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:27 executing program 4: prctl$PR_SET_ENDIAN(0x14, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0xa8002) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x100000001, 0xb0e, 0x9}, &(0x7f0000000140)=0x10) sched_yield() getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x4}, &(0x7f00000001c0)=0x8) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d7b44cf4888019019689f4269743d32782c00"]) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:27 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200), 0x0) 06:46:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000080)=0x7) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x49, 0x4) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'loproc'}, {0x20, 'ð1+,--'}, {}, {0x20, '/dev/ptmx\x00'}], 0xa, "69574745432466ee31a4a8c1f78b2951ce4d91b6666506a38553666632631e44c2829f8f82ec43b8595471ccc3dcf8e396cfd71478fc838b1d45f01ff927fa6548"}, 0x69) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000000)={@my=0x0}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfe25) [ 1409.393045] FAULT_INJECTION: forcing a failure. [ 1409.393045] name failslab, interval 1, probability 0, space 0, times 0 [ 1409.442993] gfs2: invalid mount option: comm{DÏHˆhŸBit=2x [ 1409.448838] gfs2: can't parse mount arguments [ 1409.461859] CPU: 1 PID: 31108 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1409.470259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1409.479627] Call Trace: [ 1409.482246] dump_stack+0x172/0x1f0 [ 1409.485902] should_fail.cold+0xa/0x1b [ 1409.489809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1409.494934] ? lock_downgrade+0x810/0x810 [ 1409.499097] ? ___might_sleep+0x163/0x280 [ 1409.503267] __should_failslab+0x121/0x190 [ 1409.507526] should_failslab+0x9/0x14 [ 1409.511348] kmem_cache_alloc+0x2be/0x710 [ 1409.515508] ? find_held_lock+0x35/0x130 [ 1409.519774] getname_kernel+0x53/0x370 [ 1409.523678] kern_path+0x20/0x40 [ 1409.527088] lookup_bdev.part.0+0x7b/0x1b0 [ 1409.531347] ? blkdev_open+0x290/0x290 [ 1409.535252] ? rcu_lockdep_current_cpu_online+0xe3/0x130 06:46:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x10001, 0xc400) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/4096) write$binfmt_elf32(r0, 0x0, 0x0) [ 1409.540718] ? rcu_read_lock_sched_held+0x110/0x130 [ 1409.545749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1409.551303] blkdev_get_by_path+0x81/0x130 [ 1409.555561] mount_bdev+0x5d/0x3c0 [ 1409.559134] ? xfs_test_remount_options+0x90/0x90 [ 1409.563997] xfs_fs_mount+0x35/0x40 [ 1409.567639] mount_fs+0x106/0x3ff [ 1409.571216] ? emergency_thaw_all+0x1a0/0x1a0 [ 1409.575727] ? __init_waitqueue_head+0x36/0x90 [ 1409.580602] vfs_kern_mount.part.0+0x6f/0x410 [ 1409.585127] do_mount+0x581/0x2d30 [ 1409.588682] ? copy_mount_options+0x41/0x440 06:46:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) r3 = semget$private(0x0, 0x3, 0x101) semctl$GETVAL(r3, 0x6, 0xc, &(0x7f0000000180)=""/69) write$binfmt_elf32(r1, 0x0, 0x0) [ 1409.593108] ? copy_mount_string+0x40/0x40 [ 1409.597369] ? kmem_cache_alloc_trace+0x354/0x760 [ 1409.602243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1409.607800] ? copy_mount_options+0x30e/0x440 [ 1409.612320] ksys_mount+0xdb/0x150 [ 1409.615874] __x64_sys_mount+0xbe/0x150 [ 1409.619884] do_syscall_64+0x103/0x610 [ 1409.623791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.628990] RIP: 0033:0x45a89a [ 1409.632191] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1409.651280] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1409.659007] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1409.666294] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1409.673577] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1409.680860] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1409.688153] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(r0, r1, 0x80000) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000000c0), 0x4) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x49, 0x4) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'loproc'}, {0x20, 'ð1+,--'}, {}, {0x20, '/dev/ptmx\x00'}], 0xa, "69574745432466ee31a4a8c1f78b2951ce4d91b6666506a38553666632631e44c2829f8f82ec43b8595471ccc3dcf8e396cfd71478fc838b1d45f01ff927fa6548"}, 0x69) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000000)={@my=0x0}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfe25) 06:46:28 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000200), 0x0) 06:46:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) r3 = semget$private(0x0, 0x3, 0x101) semctl$GETVAL(r3, 0x6, 0xc, &(0x7f0000000180)=""/69) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x210) writev(r1, &(0x7f0000000a80)=[{&(0x7f0000000080)="302eee4478bc4f158fa729b6cef6946f2ce5fd9f87889e5eaf11590a5f09e212a9d091a3ac72489bb2d83599e07a0ed67952e018200e3c29e9579cdd4eb9fa20ebe41bd89823aeea059989a209765db0fabfe68470add74681915c8a8b", 0x5d}, {}, {&(0x7f0000000100)="7f21b8d94f0960cb80f9eb221499dec186b4e14e3ae786", 0x17}, {&(0x7f0000000940)="693dfbd2d6f1b1a5b3f1b3f9c670d1c74d51554b", 0x14}, {&(0x7f0000000980)="3bcd084219732886569913746637e44a223ce64f78edf386f89ea1007c69d6712756f28612108d02098a5035c2321a6cc97418a0e1f32897267e81dacb938ed6505220c7", 0x44}, {&(0x7f0000000a00)="c4dd7508a1d44b765eb13d56f1bc85f3c320dd365915b11a4dc4b4dbbc34499bdce8f36b20fbbdf1d7af7fce2c35c17a7117f6a5cde384945576dbdb94d81147b839ba", 0x43}], 0x6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="cc0101ffec0100004802000001000000e6020000cd0800000000000000000000968ffb70df35c63e3ab29c396e08db1b1c719448dafa8de2052ad93768276af37778d0ff4c926be3a400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000254c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x549) r2 = getuid() quotactl(0x6, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000b00)="d46caee3882985b57a8759f0e169f7b70fe146160af6ef553b8412d4808b2b89ed5c759df416cb18f2cbb24d36d3a690e7d102b289d0f6b4a057c35ca9464016b0b34a2e3f2609baab885b82a2b9dda325759715e113a7dd3e437464fa41e5281e83f0008b315475b81712b7e3ca376f0ca6d945702faf86dcc24cf476b91e70c355076e2acb35213031985595b230e1280462b1c867fc6a2ce0c546d1") 06:46:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69743d3078300f30303030303130303030304330302c00"]) fcntl$getflags(r0, 0x40a) r2 = dup(r1) sendto$netrom(r2, &(0x7f0000000180)="4afaaa02d0ac38ea9c0705a120e4572f4643654d1b2079890d007288a21b217845c23e2ad05f9db94f9e94452fcc839f34d99c395f1483ee47fdcd56fb06bbc8f12715e3fc664f3bc46a1bd8d1358ce214a0aa1841c472575a76cdf1be1615e4a91d7847258db056b7c6215619c5538c0faaeee2d231779a198511655710bccd00", 0x81, 0x4008041, &(0x7f0000000280)={{0x3, @bcast, 0x2}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x404001, 0x0) 06:46:28 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) r3 = semget$private(0x0, 0x3, 0x101) semctl$GETVAL(r3, 0x6, 0xc, &(0x7f0000000180)=""/69) write$binfmt_elf32(r1, 0x0, 0x0) [ 1410.173894] gfs2: invalid mount option: commit=0x000000100000C00 06:46:28 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000001640)=@rose) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:28 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}, &(0x7f0000000200), 0x0) [ 1410.216652] gfs2: can't parse mount arguments 06:46:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5441, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1410.316370] FAULT_INJECTION: forcing a failure. [ 1410.316370] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.353353] CPU: 1 PID: 31144 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 06:46:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69743d30783030303030301b3130303030303030302c00"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:28 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}, &(0x7f0000000200), 0x0) [ 1410.360666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.370019] Call Trace: [ 1410.372618] dump_stack+0x172/0x1f0 [ 1410.376259] should_fail.cold+0xa/0x1b [ 1410.380164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1410.385282] ? lock_downgrade+0x810/0x810 [ 1410.389440] ? ___might_sleep+0x163/0x280 [ 1410.393596] __should_failslab+0x121/0x190 [ 1410.397851] should_failslab+0x9/0x14 [ 1410.401660] kmem_cache_alloc_trace+0x2d1/0x760 [ 1410.406345] ? kasan_check_read+0x11/0x20 [ 1410.410504] ? do_raw_spin_unlock+0x57/0x270 [ 1410.414926] ? kill_litter_super+0x60/0x60 [ 1410.419173] sget_userns+0x11b/0xd30 [ 1410.422902] ? kill_litter_super+0x60/0x60 [ 1410.427152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.432732] ? ns_test_super+0x50/0x50 [ 1410.436633] ? ns_test_super+0x50/0x50 [ 1410.440540] ? kill_litter_super+0x60/0x60 [ 1410.444811] sget+0x10c/0x150 [ 1410.447949] mount_bdev+0xff/0x3c0 [ 1410.451511] ? xfs_test_remount_options+0x90/0x90 [ 1410.456973] xfs_fs_mount+0x35/0x40 [ 1410.460621] mount_fs+0x106/0x3ff [ 1410.464096] ? emergency_thaw_all+0x1a0/0x1a0 [ 1410.468600] ? __init_waitqueue_head+0x36/0x90 [ 1410.473178] vfs_kern_mount.part.0+0x6f/0x410 [ 1410.477663] do_mount+0x581/0x2d30 [ 1410.481204] ? copy_mount_string+0x40/0x40 [ 1410.485431] ? copy_mount_options+0x1de/0x440 [ 1410.489912] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1410.494742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1410.500264] ? copy_mount_options+0x30e/0x440 [ 1410.504754] ksys_mount+0xdb/0x150 [ 1410.508282] __x64_sys_mount+0xbe/0x150 [ 1410.512250] do_syscall_64+0x103/0x610 [ 1410.516127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1410.521312] RIP: 0033:0x45a89a [ 1410.524499] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1410.543394] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1410.551091] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1410.558352] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1410.565609] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1410.572869] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1410.580128] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x541f, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x1d) 06:46:28 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000200), 0x0) [ 1410.613389] gfs2: invalid mount option: commit=0x000000100000000 [ 1410.650822] gfs2: can't parse mount arguments 06:46:28 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:28 executing program 4: io_setup(0x2, &(0x7f0000000040)) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x541e, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:28 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000200), 0x0) [ 1410.820827] FAULT_INJECTION: forcing a failure. [ 1410.820827] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.838412] gfs2: commit mount option requires a positive numeric argument [ 1410.871091] CPU: 1 PID: 31174 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1410.878422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1410.887811] Call Trace: [ 1410.890412] dump_stack+0x172/0x1f0 [ 1410.894065] should_fail.cold+0xa/0x1b [ 1410.897969] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1410.903087] ? lock_downgrade+0x810/0x810 [ 1410.907253] ? ___might_sleep+0x163/0x280 [ 1410.911410] __should_failslab+0x121/0x190 [ 1410.915654] should_failslab+0x9/0x14 [ 1410.919467] kmem_cache_alloc_node_trace+0x270/0x720 [ 1410.924581] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1410.930052] __kmalloc_node+0x3d/0x70 [ 1410.933863] kvmalloc_node+0x68/0x100 [ 1410.937677] __list_lru_init+0x4aa/0x6e0 [ 1410.941755] sget_userns+0x81e/0xd30 [ 1410.945480] ? kill_litter_super+0x60/0x60 [ 1410.949727] ? ns_test_super+0x50/0x50 [ 1410.953623] ? ns_test_super+0x50/0x50 [ 1410.957520] ? kill_litter_super+0x60/0x60 [ 1410.961763] sget+0x10c/0x150 [ 1410.964884] mount_bdev+0xff/0x3c0 [ 1410.968430] ? xfs_test_remount_options+0x90/0x90 [ 1410.973285] xfs_fs_mount+0x35/0x40 [ 1410.976922] mount_fs+0x106/0x3ff [ 1410.980381] ? emergency_thaw_all+0x1a0/0x1a0 [ 1410.984889] ? __init_waitqueue_head+0x36/0x90 [ 1410.989481] vfs_kern_mount.part.0+0x6f/0x410 [ 1410.993988] do_mount+0x581/0x2d30 [ 1410.997551] ? copy_mount_string+0x40/0x40 [ 1411.001796] ? copy_mount_options+0x255/0x440 [ 1411.006297] ? write_comp_data+0x17/0x70 [ 1411.010362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1411.015909] ? copy_mount_options+0x30e/0x440 [ 1411.020466] ksys_mount+0xdb/0x150 [ 1411.024028] __x64_sys_mount+0xbe/0x150 [ 1411.028011] do_syscall_64+0x103/0x610 [ 1411.031927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1411.037124] RIP: 0033:0x45a89a [ 1411.040317] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1411.059217] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:29 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r2) ioctl$FICLONE(r3, 0x40049409, r5) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) [ 1411.066926] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1411.074199] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1411.081471] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1411.088738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1411.096008] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1411.110799] gfs2: can't parse mount arguments 06:46:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:29 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000200), 0x0) [ 1411.165337] gfs2: commit mount option requires a positive numeric argument [ 1411.202098] gfs2: can't parse mount arguments 06:46:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x900, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000009c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000ac0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)=@ipv6_newaddr={0x44, 0x14, 0x100, 0x70bd29, 0x25dfdbff, {0xa, 0x18, 0x440, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x7f, 0x5, 0x0, 0x8}}, @IFA_FLAGS={0x8, 0x8, 0x608}, @IFA_FLAGS={0x8, 0x8, 0x60}, @IFA_FLAGS={0x8, 0x8, 0x40}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000011}, 0x8000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x12, 0x9, 0x10, "130c9430ff97b30093ed4cf3b25e4b662364d90783c98202ae63badaecdf4f5fefb1bf6160d75f2e5980d3da09d70889898a2e3bcbd36911d29e673be5475327", "bb93bc17c5bc0bf6dbd64a125e6839aac4204444cb76161c66113062ebe976a0", [0x40, 0x1]}) 06:46:29 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='gfs2\x00', 0xfffffffffffffffa) keyctl$setperm(0x5, r1, 0x242009) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="71756f74615f7175616e7475003d3078303030303019303030303030303030392c686173682c00"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:29 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000200), 0x0) 06:46:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) write$binfmt_elf32(r0, 0x0, 0x0) [ 1411.441859] FAULT_INJECTION: forcing a failure. [ 1411.441859] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.474152] gfs2: invalid mount option: quota_quantu 06:46:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x800000000000000c) write$binfmt_elf32(r0, 0x0, 0x0) [ 1411.497854] gfs2: can't parse mount arguments [ 1411.510785] CPU: 0 PID: 31206 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1411.518094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1411.527538] Call Trace: [ 1411.530144] dump_stack+0x172/0x1f0 [ 1411.533798] should_fail.cold+0xa/0x1b [ 1411.537698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1411.542824] ? lock_downgrade+0x810/0x810 [ 1411.546993] ? ___might_sleep+0x163/0x280 [ 1411.551153] __should_failslab+0x121/0x190 [ 1411.555399] should_failslab+0x9/0x14 [ 1411.559212] kmem_cache_alloc_node_trace+0x270/0x720 [ 1411.564324] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1411.569903] __kmalloc_node+0x3d/0x70 [ 1411.573715] kvmalloc_node+0x68/0x100 [ 1411.577525] __list_lru_init+0x4aa/0x6e0 [ 1411.581601] sget_userns+0x81e/0xd30 [ 1411.585321] ? kill_litter_super+0x60/0x60 [ 1411.589563] ? ns_test_super+0x50/0x50 [ 1411.593459] ? ns_test_super+0x50/0x50 [ 1411.597363] ? kill_litter_super+0x60/0x60 [ 1411.601600] sget+0x10c/0x150 [ 1411.604716] mount_bdev+0xff/0x3c0 [ 1411.608267] ? xfs_test_remount_options+0x90/0x90 [ 1411.613116] xfs_fs_mount+0x35/0x40 [ 1411.616749] mount_fs+0x106/0x3ff [ 1411.620207] ? emergency_thaw_all+0x1a0/0x1a0 [ 1411.624705] ? __init_waitqueue_head+0x36/0x90 [ 1411.629304] vfs_kern_mount.part.0+0x6f/0x410 [ 1411.633812] do_mount+0x581/0x2d30 [ 1411.637360] ? copy_mount_options+0x41/0x440 [ 1411.641781] ? copy_mount_string+0x40/0x40 06:46:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1411.646018] ? kmem_cache_alloc_trace+0x354/0x760 [ 1411.651014] ? _copy_from_user+0xdd/0x150 [ 1411.655172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1411.660717] ? copy_mount_options+0x30e/0x440 [ 1411.665316] ksys_mount+0xdb/0x150 [ 1411.665333] __x64_sys_mount+0xbe/0x150 [ 1411.665352] do_syscall_64+0x103/0x610 [ 1411.676724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1411.681917] RIP: 0033:0x45a89a 06:46:29 executing program 3: r0 = accept(0xffffffffffffff9c, &(0x7f0000000080)=@l2, &(0x7f0000000000)=0x80) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000003c0)=0x64a, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x42, "f3cf3b9bd29099f2410038bd51758f7c70f76612da71c57a78ed7f219be124db9aefc011d67eecd846bc10b246e293a2c7d3f304bd76df0bb18a750c014b6e42ebef"}, &(0x7f0000000300)=0x4a) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r2, 0x8, 0x7ff, 0x1f}, &(0x7f0000000380)=0x10) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xffffffcb) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x2, "b6f6"}, &(0x7f0000000200)=0xa) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r3, 0xdc9}, 0x8) 06:46:29 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) [ 1411.685112] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1411.704128] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1411.711849] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1411.719142] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1411.726509] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1411.733783] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1411.741058] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:30 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r2) ioctl$FICLONE(r3, 0x40049409, r5) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x169801, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x5}, &(0x7f0000000100)=0x8) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x2c95, 0xdec, 0x8, 0x32f, 0x6, 0x0, 0x0, 0x3f, 0x7, 0x37, 0x3, 0x10000, 0xe, 0x2, 0x3, 0x2], 0xf000, 0x4000}) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x1, 0x100, 0x9}, &(0x7f00000001c0)=0x10) add_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="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", 0x1000, 0xffffffffffffffff) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 06:46:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x198, r2, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x78a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x437c}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd00}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xa4, @dev={0xfe, 0x80, [], 0x15}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e21, @local}}}}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xab2e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa88}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x100000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xe0}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x198}}, 0x80) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffe4b, 0x0, 0x4000000000000003, &(0x7f0000000040)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0xd2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:30 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 06:46:30 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:30 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), 0x0) 06:46:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom$x25(r1, &(0x7f0000000280)=""/4096, 0x1000, 0x20, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) 06:46:30 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x40800, 0x10002) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:30 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, &(0x7f0000000200), 0x0) [ 1412.251847] gfs2: commit mount option requires a positive numeric argument 06:46:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1412.292081] FAULT_INJECTION: forcing a failure. [ 1412.292081] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.300261] gfs2: can't parse mount arguments 06:46:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000080)=0x8, 0x4) ustat(0xf09, &(0x7f0000000100)) [ 1412.424370] CPU: 1 PID: 31261 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1412.431693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1412.441073] Call Trace: [ 1412.443678] dump_stack+0x172/0x1f0 [ 1412.447336] should_fail.cold+0xa/0x1b [ 1412.451241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1412.456379] ? lock_downgrade+0x810/0x810 [ 1412.460536] ? ___might_sleep+0x163/0x280 [ 1412.464706] __should_failslab+0x121/0x190 [ 1412.468961] should_failslab+0x9/0x14 [ 1412.472766] __kmalloc+0x2dc/0x740 [ 1412.476324] ? lockdep_init_map+0x10c/0x5b0 [ 1412.480662] ? prealloc_shrinker+0xdf/0x340 [ 1412.484993] prealloc_shrinker+0xdf/0x340 [ 1412.489151] sget_userns+0x7ef/0xd30 [ 1412.492873] ? kill_litter_super+0x60/0x60 [ 1412.497117] ? ns_test_super+0x50/0x50 [ 1412.501103] ? ns_test_super+0x50/0x50 [ 1412.504998] ? kill_litter_super+0x60/0x60 [ 1412.509241] sget+0x10c/0x150 [ 1412.512355] mount_bdev+0xff/0x3c0 [ 1412.515898] ? xfs_test_remount_options+0x90/0x90 [ 1412.520763] xfs_fs_mount+0x35/0x40 [ 1412.524407] mount_fs+0x106/0x3ff [ 1412.527864] ? emergency_thaw_all+0x1a0/0x1a0 [ 1412.532365] ? __init_waitqueue_head+0x36/0x90 [ 1412.536968] vfs_kern_mount.part.0+0x6f/0x410 [ 1412.541472] do_mount+0x581/0x2d30 [ 1412.545015] ? copy_mount_options+0x41/0x440 [ 1412.549430] ? copy_mount_string+0x40/0x40 [ 1412.553666] ? kmem_cache_alloc_trace+0x354/0x760 [ 1412.558529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1412.564070] ? copy_mount_options+0x30e/0x440 [ 1412.568577] ksys_mount+0xdb/0x150 [ 1412.572126] __x64_sys_mount+0xbe/0x150 [ 1412.576109] do_syscall_64+0x103/0x610 [ 1412.580005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1412.585191] RIP: 0033:0x45a89a [ 1412.588387] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1412.607293] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1412.615018] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1412.622294] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1412.629566] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1412.636833] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1412.644126] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:31 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r2) ioctl$FICLONE(r3, 0x40049409, r5) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r5, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:31 executing program 4: r0 = getpid() tkill(r0, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x4, &(0x7f0000000100)=""/162) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ffb000/0x4000)=nil) 06:46:31 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000200), 0x0) 06:46:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udp6\x00') ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xff, 0x0, 0x1, 0xd0b}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r2, 0x100, 0x2, [0x698a, 0x9]}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e22, 0x8, @remote, 0x98a}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}], 0x3c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000100)=""/32) 06:46:31 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) 06:46:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:31 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200), 0x0) 06:46:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDDISABIO(r0, 0x4b37) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1413.025981] FAULT_INJECTION: forcing a failure. [ 1413.025981] name failslab, interval 1, probability 0, space 0, times 0 06:46:31 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200), 0x0) [ 1413.115446] gfs2: commit mount option requires a positive numeric argument [ 1413.145241] gfs2: can't parse mount arguments [ 1413.174067] CPU: 1 PID: 31284 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1413.181390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1413.190878] Call Trace: [ 1413.193482] dump_stack+0x172/0x1f0 [ 1413.197133] should_fail.cold+0xa/0x1b [ 1413.201034] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1413.206167] ? lock_downgrade+0x810/0x810 [ 1413.210331] ? ___might_sleep+0x163/0x280 [ 1413.214492] __should_failslab+0x121/0x190 [ 1413.218741] should_failslab+0x9/0x14 [ 1413.222550] kmem_cache_alloc_trace+0x2d1/0x760 [ 1413.227230] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1413.232347] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1413.237294] __list_lru_init+0x3d3/0x6e0 [ 1413.241373] sget_userns+0x81e/0xd30 [ 1413.245152] ? kill_litter_super+0x60/0x60 [ 1413.249398] ? ns_test_super+0x50/0x50 [ 1413.253292] ? ns_test_super+0x50/0x50 [ 1413.257183] ? kill_litter_super+0x60/0x60 [ 1413.261424] sget+0x10c/0x150 [ 1413.264540] mount_bdev+0xff/0x3c0 [ 1413.268088] ? xfs_test_remount_options+0x90/0x90 [ 1413.272942] xfs_fs_mount+0x35/0x40 [ 1413.276577] mount_fs+0x106/0x3ff [ 1413.280045] ? emergency_thaw_all+0x1a0/0x1a0 [ 1413.284556] ? __init_waitqueue_head+0x36/0x90 [ 1413.289149] vfs_kern_mount.part.0+0x6f/0x410 [ 1413.293660] do_mount+0x581/0x2d30 [ 1413.297208] ? copy_mount_options+0x41/0x440 [ 1413.301636] ? copy_mount_string+0x40/0x40 [ 1413.305886] ? kmem_cache_alloc_trace+0x354/0x760 [ 1413.310740] ? _copy_from_user+0xdd/0x150 [ 1413.314909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1413.320453] ? copy_mount_options+0x30e/0x440 [ 1413.324963] ksys_mount+0xdb/0x150 [ 1413.328511] __x64_sys_mount+0xbe/0x150 [ 1413.332498] do_syscall_64+0x103/0x610 [ 1413.336403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1413.341593] RIP: 0033:0x45a89a [ 1413.344800] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1413.363704] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1d) [ 1413.371420] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1413.378693] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1413.385967] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1413.393250] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1413.400534] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:31 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000080)=@l2, &(0x7f0000000000)=0x80) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000003c0)=0x64a, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x42, "f3cf3b9bd29099f2410038bd51758f7c70f76612da71c57a78ed7f219be124db9aefc011d67eecd846bc10b246e293a2c7d3f304bd76df0bb18a750c014b6e42ebef"}, &(0x7f0000000300)=0x4a) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r2, 0x8, 0x7ff, 0x1f}, &(0x7f0000000380)=0x10) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xffffffcb) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x2, "b6f6"}, &(0x7f0000000200)=0xa) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r3, 0xdc9}, 0x8) 06:46:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x6, 0x400) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000180)={r4, r1, 0x1}) 06:46:31 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x1, 0x8, 0xb5c}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:31 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1d) 06:46:31 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200), 0x0) 06:46:32 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000080)=@l2, &(0x7f0000000000)=0x80) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000003c0)=0x64a, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x42, "f3cf3b9bd29099f2410038bd51758f7c70f76612da71c57a78ed7f219be124db9aefc011d67eecd846bc10b246e293a2c7d3f304bd76df0bb18a750c014b6e42ebef"}, &(0x7f0000000300)=0x4a) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r2, 0x8, 0x7ff, 0x1f}, &(0x7f0000000380)=0x10) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xffffffcb) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x2, "b6f6"}, &(0x7f0000000200)=0xa) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r3, 0xdc9}, 0x8) [ 1413.881904] gfs2: commit mount option requires a positive numeric argument [ 1413.895774] gfs2: can't parse mount arguments 06:46:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1d) 06:46:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69744b917a3fcd3030303000f3ce727c33"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:32 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) 06:46:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = socket(0x4004000000013, 0xffffffffffffffff, 0x8) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000000)=0x1) write$binfmt_elf32(r0, 0x0, 0x0) [ 1413.949612] FAULT_INJECTION: forcing a failure. [ 1413.949612] name failslab, interval 1, probability 0, space 0, times 0 [ 1413.993551] CPU: 0 PID: 31328 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1414.000867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.010219] Call Trace: [ 1414.012837] dump_stack+0x172/0x1f0 [ 1414.016480] should_fail.cold+0xa/0x1b [ 1414.020378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1414.025497] ? lock_downgrade+0x810/0x810 [ 1414.029662] ? ___might_sleep+0x163/0x280 [ 1414.033841] __should_failslab+0x121/0x190 [ 1414.038091] should_failslab+0x9/0x14 06:46:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1414.041894] kmem_cache_alloc_trace+0x2d1/0x760 [ 1414.046567] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1414.051695] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1414.056640] __list_lru_init+0x3d3/0x6e0 [ 1414.060713] sget_userns+0x81e/0xd30 [ 1414.064428] ? kill_litter_super+0x60/0x60 [ 1414.068671] ? ns_test_super+0x50/0x50 [ 1414.072564] ? ns_test_super+0x50/0x50 [ 1414.076457] ? kill_litter_super+0x60/0x60 [ 1414.080693] sget+0x10c/0x150 [ 1414.080714] mount_bdev+0xff/0x3c0 [ 1414.080729] ? xfs_test_remount_options+0x90/0x90 [ 1414.080745] xfs_fs_mount+0x35/0x40 [ 1414.080762] mount_fs+0x106/0x3ff [ 1414.080779] ? emergency_thaw_all+0x1a0/0x1a0 [ 1414.080796] ? __init_waitqueue_head+0x36/0x90 [ 1414.080824] vfs_kern_mount.part.0+0x6f/0x410 [ 1414.080841] do_mount+0x581/0x2d30 [ 1414.099338] ? copy_mount_options+0x41/0x440 [ 1414.099359] ? copy_mount_string+0x40/0x40 [ 1414.099373] ? kmem_cache_alloc_trace+0x354/0x760 [ 1414.099391] ? _copy_from_user+0xdd/0x150 [ 1414.134050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1414.139611] ? copy_mount_options+0x30e/0x440 06:46:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1414.144125] ksys_mount+0xdb/0x150 [ 1414.147679] __x64_sys_mount+0xbe/0x150 [ 1414.151669] do_syscall_64+0x103/0x610 [ 1414.155570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1414.160759] RIP: 0033:0x45a89a [ 1414.163955] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1414.182860] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:32 executing program 5: r0 = accept(0xffffffffffffff9c, &(0x7f0000000080)=@l2, &(0x7f0000000000)=0x80) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000003c0)=0x64a, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x42, "f3cf3b9bd29099f2410038bd51758f7c70f76612da71c57a78ed7f219be124db9aefc011d67eecd846bc10b246e293a2c7d3f304bd76df0bb18a750c014b6e42ebef"}, &(0x7f0000000300)=0x4a) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r2, 0x8, 0x7ff, 0x1f}, &(0x7f0000000380)=0x10) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xffffffcb) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x2, "b6f6"}, &(0x7f0000000200)=0xa) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r3, 0xdc9}, 0x8) [ 1414.190582] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1414.197862] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1414.205146] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1414.212434] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1414.219713] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1414.233611] gfs2: invalid mount option: commitK‘z?Í0000 [ 1414.268663] gfs2: can't parse mount arguments 06:46:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000540)) r2 = shmget(0x2, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000100), &(0x7f0000000280), &(0x7f00000002c0)=0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000480)={0x0, 0x0}) r8 = gettid() shmctl$IPC_SET(r2, 0x1, &(0x7f00000004c0)={{0x6, r3, r4, r5, r6, 0x148}, 0xc8, 0x80, 0x1, 0xd79, r7, r8, 0x100000000}) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:32 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:32 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0) 06:46:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x541b, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="efeaa25f20d8444dfca91eb67db3ac26a25558e242808730a3eb0fd24cdb229b9e96ff07364ca3b8a246d283bbb5017e9c0d3b13893ffc2f41b4298dff0c8cd1f2e6944c226a4477bbc31563b429090b5b3ee2b2b9789ac9f29c27d16388160e2342eb89c413ea91d19e621148d4b7005a2ac9f99469e9e5ecab7a1ae90d717941f7a334ff0bf2e1b50b81e237508a459c09b7f06eab913d6b082c9ca10c80a2e335a7c1ed7d754fa6eb7352932c606e38e6334b571b5cd04e1380106beb55933c5f", 0xc2, 0x2}], 0x104080, &(0x7f00000002c0)={[{@norecovery='norecovery'}, {@loccookie='loccookie'}, {@commit={'commit', 0x3d, 0x100}}, {@meta='meta'}, {@noquota='noquota'}, {@quota_account='quota=account'}, {@data_writeback='data=writeback'}, {@hostdata={'hostdata', 0x3d, 'gfs2\x00'}}], [{@smackfshat={'smackfshat', 0x3d, 'commit'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')cpuset*'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 06:46:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x541b, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3f, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x5, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x5}, 0x8) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1414.506344] gfs2: commit mount option requires a positive numeric argument [ 1414.545442] gfs2: can't parse mount arguments 06:46:32 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200), 0x0) [ 1414.566157] FAULT_INJECTION: forcing a failure. [ 1414.566157] name failslab, interval 1, probability 0, space 0, times 0 [ 1414.595883] CPU: 1 PID: 31369 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1414.603199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1414.603205] Call Trace: [ 1414.603228] dump_stack+0x172/0x1f0 [ 1414.603247] should_fail.cold+0xa/0x1b [ 1414.603264] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1414.603279] ? lock_downgrade+0x810/0x810 [ 1414.603294] ? ___might_sleep+0x163/0x280 [ 1414.603312] __should_failslab+0x121/0x190 [ 1414.636706] should_failslab+0x9/0x14 [ 1414.636724] kmem_cache_alloc_trace+0x2d1/0x760 [ 1414.649395] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1414.654518] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1414.659459] __list_lru_init+0x3d3/0x6e0 [ 1414.663533] sget_userns+0x81e/0xd30 [ 1414.667254] ? kill_litter_super+0x60/0x60 [ 1414.671496] ? ns_test_super+0x50/0x50 [ 1414.675384] ? ns_test_super+0x50/0x50 [ 1414.679282] ? kill_litter_super+0x60/0x60 [ 1414.683527] sget+0x10c/0x150 [ 1414.686645] mount_bdev+0xff/0x3c0 [ 1414.690185] ? xfs_test_remount_options+0x90/0x90 [ 1414.695032] xfs_fs_mount+0x35/0x40 [ 1414.698660] mount_fs+0x106/0x3ff [ 1414.702127] ? emergency_thaw_all+0x1a0/0x1a0 [ 1414.706626] ? __init_waitqueue_head+0x36/0x90 [ 1414.711221] vfs_kern_mount.part.0+0x6f/0x410 [ 1414.715720] do_mount+0x581/0x2d30 [ 1414.719266] ? copy_mount_options+0x41/0x440 [ 1414.723682] ? copy_mount_string+0x40/0x40 [ 1414.727922] ? kmem_cache_alloc_trace+0x354/0x760 [ 1414.732775] ? _copy_from_user+0xdd/0x150 [ 1414.736932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1414.742574] ? copy_mount_options+0x30e/0x440 [ 1414.747121] ksys_mount+0xdb/0x150 [ 1414.750666] __x64_sys_mount+0xbe/0x150 [ 1414.754648] do_syscall_64+0x103/0x610 [ 1414.758547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1414.763742] RIP: 0033:0x45a89a [ 1414.766945] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1414.785847] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1414.793560] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1414.800834] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1414.808103] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 06:46:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x541b, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1414.815371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1414.822640] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@lockproto_nolock='lockproto=lock_nolock'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5418, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:33 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:33 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200), 0x0) 06:46:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 06:46:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1415.012715] gfs2: not a GFS2 filesystem 06:46:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5416, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1415.074210] FAULT_INJECTION: forcing a failure. [ 1415.074210] name failslab, interval 1, probability 0, space 0, times 0 06:46:33 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000200), 0x0) 06:46:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x80000) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000100)={0x0, 0x1, @start={0x5, 0x1}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1415.164930] CPU: 1 PID: 31401 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1415.172245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.172252] Call Trace: [ 1415.172279] dump_stack+0x172/0x1f0 [ 1415.172299] should_fail.cold+0xa/0x1b [ 1415.172317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1415.172333] ? lock_downgrade+0x810/0x810 [ 1415.172350] ? ___might_sleep+0x163/0x280 [ 1415.205292] __should_failslab+0x121/0x190 [ 1415.209549] should_failslab+0x9/0x14 [ 1415.213360] kmem_cache_alloc_trace+0x2d1/0x760 [ 1415.213380] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1415.213399] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1415.228086] __list_lru_init+0x3d3/0x6e0 [ 1415.228109] sget_userns+0x81e/0xd30 [ 1415.228126] ? kill_litter_super+0x60/0x60 [ 1415.240129] ? ns_test_super+0x50/0x50 [ 1415.244027] ? ns_test_super+0x50/0x50 [ 1415.244043] ? kill_litter_super+0x60/0x60 [ 1415.244057] sget+0x10c/0x150 [ 1415.244074] mount_bdev+0xff/0x3c0 [ 1415.258813] ? xfs_test_remount_options+0x90/0x90 [ 1415.263674] xfs_fs_mount+0x35/0x40 [ 1415.267316] mount_fs+0x106/0x3ff [ 1415.270784] ? emergency_thaw_all+0x1a0/0x1a0 [ 1415.270824] gfs2: commit mount option requires a positive numeric argument [ 1415.275280] ? __init_waitqueue_head+0x36/0x90 [ 1415.275306] vfs_kern_mount.part.0+0x6f/0x410 [ 1415.275324] do_mount+0x581/0x2d30 [ 1415.295031] ? copy_mount_options+0x41/0x440 [ 1415.299543] ? copy_mount_string+0x40/0x40 [ 1415.299560] ? kmem_cache_alloc_trace+0x354/0x760 [ 1415.299583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1415.312389] gfs2: can't parse mount arguments [ 1415.314346] ? copy_mount_options+0x30e/0x440 [ 1415.314367] ksys_mount+0xdb/0x150 [ 1415.314383] __x64_sys_mount+0xbe/0x150 [ 1415.314405] do_syscall_64+0x103/0x610 [ 1415.323485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1415.340027] RIP: 0033:0x45a89a [ 1415.343226] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 06:46:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@lockproto_nolock='lockproto=lock_nolock'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x3ffffc, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f00000000c0)={0x7, 0x2, {0x9f97363acef33dd7, 0x1, 0x80000001, {0x6, 0x728}, {0x4, 0x3}, @rumble={0xff, 0x5}}, {0x52, 0x0, 0x0, {0xa4b, 0x2}, {0x7fffffff}, @ramp={0x6, 0x5, {0x5, 0x10001, 0xe9ab, 0x5}}}}) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)=0xd1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r2, 0x0, 0xffffffffffffffc7) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x5, 0x800, 0x8, 0x6, 0x5e222a76}) [ 1415.362141] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1415.369867] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1415.377147] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1415.384424] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1415.391699] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1415.398983] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:33 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\x00') syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r2}) 06:46:33 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000200), 0x0) 06:46:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa62b, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0xb, 0x2}, 0x0, 0xfffffffffdffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x100, 0x1000, 0x3}) 06:46:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1415.658921] gfs2: commit mount option requires a positive numeric argument [ 1415.685976] gfs2: can't parse mount arguments 06:46:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xff19) 06:46:33 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000200), 0x0) 06:46:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1415.715471] FAULT_INJECTION: forcing a failure. [ 1415.715471] name failslab, interval 1, probability 0, space 0, times 0 [ 1415.749708] CPU: 0 PID: 31448 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 06:46:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1415.757023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.757030] Call Trace: [ 1415.757053] dump_stack+0x172/0x1f0 [ 1415.757072] should_fail.cold+0xa/0x1b [ 1415.776509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1415.781621] ? lock_downgrade+0x810/0x810 [ 1415.785782] ? ___might_sleep+0x163/0x280 [ 1415.789941] __should_failslab+0x121/0x190 [ 1415.794198] should_failslab+0x9/0x14 [ 1415.798010] kmem_cache_alloc_trace+0x2d1/0x760 [ 1415.802708] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1415.807828] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1415.812771] __list_lru_init+0x3d3/0x6e0 [ 1415.816842] sget_userns+0x81e/0xd30 [ 1415.820562] ? kill_litter_super+0x60/0x60 [ 1415.824820] ? ns_test_super+0x50/0x50 [ 1415.824837] ? ns_test_super+0x50/0x50 [ 1415.824852] ? kill_litter_super+0x60/0x60 [ 1415.824867] sget+0x10c/0x150 [ 1415.839951] mount_bdev+0xff/0x3c0 [ 1415.843513] ? xfs_test_remount_options+0x90/0x90 [ 1415.848361] xfs_fs_mount+0x35/0x40 [ 1415.848382] mount_fs+0x106/0x3ff [ 1415.848402] ? emergency_thaw_all+0x1a0/0x1a0 [ 1415.859950] ? __init_waitqueue_head+0x36/0x90 [ 1415.864560] vfs_kern_mount.part.0+0x6f/0x410 [ 1415.869072] do_mount+0x581/0x2d30 [ 1415.872622] ? copy_mount_options+0x41/0x440 [ 1415.877034] ? copy_mount_string+0x40/0x40 [ 1415.877052] ? kmem_cache_alloc_trace+0x354/0x760 [ 1415.877077] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1415.891647] ? copy_mount_options+0x30e/0x440 [ 1415.896159] ksys_mount+0xdb/0x150 [ 1415.899708] __x64_sys_mount+0xbe/0x150 [ 1415.903703] do_syscall_64+0x103/0x610 [ 1415.907598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1415.912787] RIP: 0033:0x45a89a 06:46:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5413, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1415.915980] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1415.934889] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1415.942621] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1415.949898] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1415.957178] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1415.964457] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1415.971731] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5413, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x100, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000300)={0x0, 0xf, 0x4, 0x0, {0x77359400}, {0x7, 0xc, 0x568, 0x6, 0x2, 0x200, "3e495c9d"}, 0x277, 0x2, @fd=r1, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x408, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000380)={0x7, 0x5, 0x1, 0x3, 0xa, 0x1000, 0x8, 0x4, 0x3, 0xfffffffffffffffa, 0x1, 0xffffffff}) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000280)=0x20010, 0x4) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000002c0)) 06:46:34 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}, &(0x7f0000000200), 0x0) 06:46:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socket$inet(0x2, 0x2, 0xc4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000200)={@remote, @dev, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000280)={@broadcast, @local, 0x0}, &(0x7f00000002c0)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x80, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{&(0x7f00000017c0)=@l2, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001840)=""/187, 0xbb}, {&(0x7f0000001900)=""/17, 0x11}, {&(0x7f0000001940)=""/57, 0x39}, {&(0x7f0000001980)=""/92, 0x5c}, {&(0x7f0000001a00)=""/77, 0x4d}, {&(0x7f0000001a80)=""/77, 0x4d}, {&(0x7f0000001b00)=""/163, 0xa3}, {&(0x7f0000001bc0)=""/166, 0xa6}, {&(0x7f0000001c80)=""/207, 0xcf}], 0x9}, 0x4}, {{&(0x7f0000001e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001ec0)=""/246, 0xf6}, {&(0x7f0000001fc0)=""/150, 0x96}, {&(0x7f0000002080)=""/250, 0xfa}], 0x3, &(0x7f00000021c0)=""/19, 0x13}, 0xed}, {{&(0x7f0000002200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002280)=""/77, 0x4d}, {&(0x7f0000002300)=""/169, 0xa9}, {&(0x7f00000023c0)=""/120, 0x78}, {&(0x7f0000002440)=""/18, 0x12}], 0x4, &(0x7f00000024c0)=""/232, 0xe8}, 0x7fff}, {{&(0x7f00000025c0)=@nfc_llcp, 0x80, &(0x7f0000003b00)=[{&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/176, 0xb0}, {&(0x7f0000003700)=""/244, 0xf4}, {&(0x7f0000003800)=""/27, 0x1b}, {&(0x7f0000003840)=""/222, 0xde}, {&(0x7f0000003940)=""/221, 0xdd}, {&(0x7f0000003a40)=""/144, 0x90}], 0x7, &(0x7f0000003b80)=""/4096, 0x1000}, 0x40}, {{&(0x7f0000004b80)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004c00)=""/152, 0x98}, {&(0x7f0000004cc0)=""/192, 0xc0}, {&(0x7f0000004d80)=""/214, 0xd6}, {&(0x7f0000004e80)=""/149, 0x95}, {&(0x7f0000004f40)=""/180, 0xb4}, {&(0x7f0000005000)=""/239, 0xef}, {&(0x7f0000005100)=""/29, 0x1d}], 0x7, &(0x7f00000051c0)=""/201, 0xc9}, 0x3}, {{&(0x7f00000052c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005440)=[{&(0x7f0000005340)=""/107, 0x6b}, {&(0x7f00000053c0)=""/34, 0x22}, {&(0x7f0000005400)=""/4, 0x4}], 0x3}, 0xfffffffffffffffe}], 0x6, 0x0, &(0x7f0000005600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006a00)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000006b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000006b40)={@multicast1, @multicast2, 0x0}, &(0x7f0000006b80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006c80)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000006d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000006f00)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007480)={&(0x7f0000007080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000007380)=[{&(0x7f0000007100)=""/130, 0x82}, {&(0x7f00000071c0)=""/85, 0x55}, {&(0x7f0000007240)=""/164, 0xa4}, {&(0x7f0000007300)=""/90, 0x5a}], 0x4, &(0x7f00000073c0)=""/134, 0x86}, 0x100) accept4(0xffffffffffffffff, &(0x7f00000074c0)=@can={0x1d, 0x0}, &(0x7f0000007540)=0x80, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007640)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000007740)=0xe8) r16 = accept4$packet(0xffffffffffffff9c, &(0x7f0000007780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000077c0)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007800)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000007900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000007940)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000007a40)=0xe8) ioctl$SIOCX25GCAUSEDIAG(r7, 0x89e6, &(0x7f0000000440)={0x10001, 0x9}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000007a80)={@multicast1, @loopback, 0x0}, &(0x7f0000007ac0)=0xfffffd34) sendmsg(r16, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="627b81a58cb0bb2f9cb9b15c1027bdf0bc7c242de2bf06f8ed29d25176ec0dfac68632a54e9ffc456c2d4bb1e4e93723070d12356b5e52df7287299e74842ee28bddf71cf7a2e8cae057a30cc7e4838ae8196e06438a", 0x56}], 0x2}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008300)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008340)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000008a00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000089c0)={&(0x7f0000005640)=ANY=[@ANYBLOB="3c060000", @ANYRES16=r2, @ANYBLOB="200d25bd7000fbdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="fc00020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08e8840028846aee79ebf6ebeff3bd5a13fcce2284fbe3ee764a0c64cd37810dd4450594fad14a25c3259a4b7d18ae1a2bdd1fb3cf12caecee98c430cdfaaa3f3db06c0d5bbf5abc81d7da55cc5b08f05c37bef57207034529bee71bdb97d8f14610c9b74fd191a4392fa1e2b468442ef857cbf05e5fdcfe4051a60ee8f3b7a0", @ANYRES32=r10, @ANYBLOB="c800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400714e996a4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004001f0000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="8400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004007e000000080007000000000008000100", @ANYRES32=r18, @ANYBLOB="8402020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="080007000000000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000034000400000001070200000008000109090000000300040309000000ffffcd2a090000000180ffff0100000000020108ff7fffff40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r21, @ANYBLOB="08000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040018520601150f000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffff00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040009000000"], 0x63c}, 0x1, 0x0, 0x0, 0x4040001}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r16, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r23}}, 0x18) 06:46:34 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1416.165812] gfs2: commit mount option requires a positive numeric argument 06:46:34 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}, &(0x7f0000000200), 0x0) 06:46:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5413, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1416.226560] FAULT_INJECTION: forcing a failure. [ 1416.226560] name failslab, interval 1, probability 0, space 0, times 0 [ 1416.229017] gfs2: can't parse mount arguments 06:46:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1416.312440] CPU: 1 PID: 31481 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1416.319772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1416.329132] Call Trace: [ 1416.331732] dump_stack+0x172/0x1f0 [ 1416.335372] should_fail.cold+0xa/0x1b [ 1416.339369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1416.344479] ? lock_downgrade+0x810/0x810 [ 1416.348639] ? ___might_sleep+0x163/0x280 [ 1416.352803] __should_failslab+0x121/0x190 [ 1416.357044] should_failslab+0x9/0x14 [ 1416.360848] kmem_cache_alloc_trace+0x2d1/0x760 [ 1416.365524] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1416.370636] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1416.375573] __list_lru_init+0x3d3/0x6e0 [ 1416.379643] sget_userns+0x81e/0xd30 [ 1416.383366] ? kill_litter_super+0x60/0x60 [ 1416.387604] ? ns_test_super+0x50/0x50 [ 1416.391495] ? ns_test_super+0x50/0x50 [ 1416.395380] ? kill_litter_super+0x60/0x60 [ 1416.399621] sget+0x10c/0x150 [ 1416.402744] mount_bdev+0xff/0x3c0 [ 1416.406288] ? xfs_test_remount_options+0x90/0x90 [ 1416.411145] xfs_fs_mount+0x35/0x40 [ 1416.414871] mount_fs+0x106/0x3ff [ 1416.418332] ? emergency_thaw_all+0x1a0/0x1a0 [ 1416.422832] ? __init_waitqueue_head+0x36/0x90 [ 1416.427429] vfs_kern_mount.part.0+0x6f/0x410 [ 1416.431928] do_mount+0x581/0x2d30 [ 1416.435471] ? copy_mount_options+0x41/0x440 [ 1416.439889] ? copy_mount_string+0x40/0x40 [ 1416.444127] ? kmem_cache_alloc_trace+0x354/0x760 [ 1416.448982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1416.454520] ? copy_mount_options+0x30e/0x440 [ 1416.459025] ksys_mount+0xdb/0x150 [ 1416.462572] __x64_sys_mount+0xbe/0x150 [ 1416.466549] do_syscall_64+0x103/0x610 [ 1416.470445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1416.475638] RIP: 0033:0x45a89a [ 1416.478842] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1416.497749] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1416.505459] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:34 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000200), 0x0) [ 1416.512733] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1416.520002] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1416.527268] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1416.534538] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000001f80)={0xffffffffffffffff}, 0x80800) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000001fc0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xfc, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x8, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6de9743d30783030302c3030f03130070000003030302c00"]) recvmmsg(r0, &(0x7f0000001c80)=[{{&(0x7f0000000100)=@ax25={{0x3, @rose}, [@remote, @default, @default, @remote, @null, @null, @netrom, @default]}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)=""/89, 0x59}], 0x1, &(0x7f0000000200)=""/1, 0x1}, 0x6}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000280)=""/202, 0xca}, {&(0x7f0000000380)=""/170, 0xaa}, {&(0x7f0000000440)=""/88, 0x58}, {&(0x7f00000004c0)=""/165, 0xa5}, {&(0x7f0000000580)=""/138, 0x8a}, {&(0x7f0000000640)=""/224, 0xe0}, {&(0x7f0000000740)=""/85, 0x55}, {&(0x7f00000007c0)=""/179, 0xb3}], 0x8, &(0x7f0000000900)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000001900)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001980)=""/129, 0x81}, {&(0x7f0000001a40)=""/78, 0x4e}, {&(0x7f0000001ac0)=""/231, 0xe7}], 0x3, &(0x7f0000001c00)=""/99, 0x63}, 0x1}], 0x3, 0x10000, &(0x7f0000001d40)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000001d80)=[@in6={0xa, 0x4e22, 0x100, @ipv4={[], [], @remote}, 0x3f}, @in6={0xa, 0x4e23, 0x0, @rand_addr="f49441ba63e58edbfb021ca6dd8a5c8b", 0x9}], 0x38) fsetxattr$security_smack_entry(r3, &(0x7f0000001e40)='security.SMACK64IPOUT\x00', &(0x7f0000001e80)='keyring.vboxnet1\x00', 0x11, 0x1) getgid() times(&(0x7f0000001e00)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000001f00)={0x2f00000000000000, 0x80000000, 0x10000}, 0xc) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000001f40)=0x21bc, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001ec0)={0x1, &(0x7f0000001dc0)=[{0x7, 0x1, 0x4, 0x1000}]}) 06:46:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x400000000000e) write$binfmt_elf32(r0, 0x0, 0x0) [ 1416.726780] gfs2: invalid mount option: commét=0x000 [ 1416.747408] gfs2: can't parse mount arguments 06:46:35 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socket$inet(0x2, 0x2, 0xc4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000200)={@remote, @dev, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000280)={@broadcast, @local, 0x0}, &(0x7f00000002c0)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x80, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{&(0x7f00000017c0)=@l2, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001840)=""/187, 0xbb}, {&(0x7f0000001900)=""/17, 0x11}, {&(0x7f0000001940)=""/57, 0x39}, {&(0x7f0000001980)=""/92, 0x5c}, {&(0x7f0000001a00)=""/77, 0x4d}, {&(0x7f0000001a80)=""/77, 0x4d}, {&(0x7f0000001b00)=""/163, 0xa3}, {&(0x7f0000001bc0)=""/166, 0xa6}, {&(0x7f0000001c80)=""/207, 0xcf}], 0x9}, 0x4}, {{&(0x7f0000001e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001ec0)=""/246, 0xf6}, {&(0x7f0000001fc0)=""/150, 0x96}, {&(0x7f0000002080)=""/250, 0xfa}], 0x3, &(0x7f00000021c0)=""/19, 0x13}, 0xed}, {{&(0x7f0000002200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002280)=""/77, 0x4d}, {&(0x7f0000002300)=""/169, 0xa9}, {&(0x7f00000023c0)=""/120, 0x78}, {&(0x7f0000002440)=""/18, 0x12}], 0x4, &(0x7f00000024c0)=""/232, 0xe8}, 0x7fff}, {{&(0x7f00000025c0)=@nfc_llcp, 0x80, &(0x7f0000003b00)=[{&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/176, 0xb0}, {&(0x7f0000003700)=""/244, 0xf4}, {&(0x7f0000003800)=""/27, 0x1b}, {&(0x7f0000003840)=""/222, 0xde}, {&(0x7f0000003940)=""/221, 0xdd}, {&(0x7f0000003a40)=""/144, 0x90}], 0x7, &(0x7f0000003b80)=""/4096, 0x1000}, 0x40}, {{&(0x7f0000004b80)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004c00)=""/152, 0x98}, {&(0x7f0000004cc0)=""/192, 0xc0}, {&(0x7f0000004d80)=""/214, 0xd6}, {&(0x7f0000004e80)=""/149, 0x95}, {&(0x7f0000004f40)=""/180, 0xb4}, {&(0x7f0000005000)=""/239, 0xef}, {&(0x7f0000005100)=""/29, 0x1d}], 0x7, &(0x7f00000051c0)=""/201, 0xc9}, 0x3}, {{&(0x7f00000052c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005440)=[{&(0x7f0000005340)=""/107, 0x6b}, {&(0x7f00000053c0)=""/34, 0x22}, {&(0x7f0000005400)=""/4, 0x4}], 0x3}, 0xfffffffffffffffe}], 0x6, 0x0, &(0x7f0000005600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006a00)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000006b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000006b40)={@multicast1, @multicast2, 0x0}, &(0x7f0000006b80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006c80)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000006d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000006f00)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007480)={&(0x7f0000007080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000007380)=[{&(0x7f0000007100)=""/130, 0x82}, {&(0x7f00000071c0)=""/85, 0x55}, {&(0x7f0000007240)=""/164, 0xa4}, {&(0x7f0000007300)=""/90, 0x5a}], 0x4, &(0x7f00000073c0)=""/134, 0x86}, 0x100) accept4(0xffffffffffffffff, &(0x7f00000074c0)=@can={0x1d, 0x0}, &(0x7f0000007540)=0x80, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007640)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000007740)=0xe8) r16 = accept4$packet(0xffffffffffffff9c, &(0x7f0000007780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000077c0)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007800)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000007900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000007940)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000007a40)=0xe8) ioctl$SIOCX25GCAUSEDIAG(r7, 0x89e6, &(0x7f0000000440)={0x10001, 0x9}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000007a80)={@multicast1, @loopback, 0x0}, &(0x7f0000007ac0)=0xfffffd34) sendmsg(r16, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="627b81a58cb0bb2f9cb9b15c1027bdf0bc7c242de2bf06f8ed29d25176ec0dfac68632a54e9ffc456c2d4bb1e4e93723070d12356b5e52df7287299e74842ee28bddf71cf7a2e8cae057a30cc7e4838ae8196e06438a", 0x56}], 0x2}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008300)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008340)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000008a00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000089c0)={&(0x7f0000005640)=ANY=[@ANYBLOB="3c060000", @ANYRES16=r2, @ANYBLOB="200d25bd7000fbdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="fc00020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08e8840028846aee79ebf6ebeff3bd5a13fcce2284fbe3ee764a0c64cd37810dd4450594fad14a25c3259a4b7d18ae1a2bdd1fb3cf12caecee98c430cdfaaa3f3db06c0d5bbf5abc81d7da55cc5b08f05c37bef57207034529bee71bdb97d8f14610c9b74fd191a4392fa1e2b468442ef857cbf05e5fdcfe4051a60ee8f3b7a0", @ANYRES32=r10, @ANYBLOB="c800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400714e996a4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004001f0000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="8400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004007e000000080007000000000008000100", @ANYRES32=r18, @ANYBLOB="8402020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="080007000000000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000034000400000001070200000008000109090000000300040309000000ffffcd2a090000000180ffff0100000000020108ff7fffff40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r21, @ANYBLOB="08000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040018520601150f000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffff00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040009000000"], 0x63c}, 0x1, 0x0, 0x0, 0x4040001}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r16, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r23}}, 0x18) 06:46:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:35 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000200), 0x0) 06:46:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3, 0x40403) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f00000000c0)={0xe6e, [0x3, 0xea, 0x0, 0x80, 0x2, 0x40, 0x8, 0xffffffff80000001, 0x214, 0x7fffffff, 0x0, 0x1, 0x1, 0xa93, 0x6, 0x4, 0x1, 0x58, 0x35, 0x72c, 0x40, 0x401, 0x8, 0x0, 0x3, 0x7, 0x0, 0x9, 0x3, 0x1, 0x401, 0xd5, 0x7fffffff, 0x7, 0x7ff, 0x8, 0x4, 0x8, 0x7ff, 0x7824, 0x4, 0x7, 0x3, 0x100, 0x3, 0x4, 0x3, 0x5]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./bus\x00', 0xfff, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="f312bc1118f4a82a6c3169887086618d5ad8db4d6f513d094d0f8b815cf612fe052e6e011d44f5c31956373ccc409fa434860af0e68939ac8c22bbde6b52538c1ace79acecd6cf20e023d8affc19e0794f4e0b0d96f33ba7b0c95010c844230c40078d973d949fcdfcf35f52b4363b1aae7963e393", 0x75, 0x1}], 0x0, &(0x7f0000000440)={[{@shortname_lower='shortname=lower'}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ip6erspan0\x00'}}, {@subj_user={'subj_user', 0x3d, '\\md5sum'}}, {@euid_lt={'euid<', r2}}]}) read(r0, &(0x7f0000000000)=""/49, 0x31) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000180)={'ip6erspan0\x00', 0x200}) ftruncate(r4, 0x42) readv(0xffffffffffffffff, &(0x7f0000001440)=[{0x0}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) write$binfmt_elf32(r3, 0x0, 0x0) 06:46:35 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1d) 06:46:35 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000200), 0x0) [ 1416.967891] FAULT_INJECTION: forcing a failure. [ 1416.967891] name failslab, interval 1, probability 0, space 0, times 0 [ 1417.024261] CPU: 1 PID: 31522 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1417.031582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.040949] Call Trace: [ 1417.043555] dump_stack+0x172/0x1f0 [ 1417.044445] FAT-fs (loop3): Unrecognized mount option "func=KEXEC_KERNEL_CHECK" or missing value [ 1417.047194] should_fail.cold+0xa/0x1b [ 1417.047214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1417.047237] ? lock_downgrade+0x810/0x810 [ 1417.069263] ? ___might_sleep+0x163/0x280 [ 1417.073423] __should_failslab+0x121/0x190 [ 1417.077666] should_failslab+0x9/0x14 [ 1417.081472] kmem_cache_alloc_trace+0x2d1/0x760 [ 1417.086146] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1417.091256] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1417.096199] __list_lru_init+0x3d3/0x6e0 [ 1417.100275] sget_userns+0x81e/0xd30 [ 1417.103994] ? kill_litter_super+0x60/0x60 [ 1417.108240] ? ns_test_super+0x50/0x50 [ 1417.112133] ? ns_test_super+0x50/0x50 [ 1417.116022] ? kill_litter_super+0x60/0x60 [ 1417.120258] sget+0x10c/0x150 [ 1417.123379] mount_bdev+0xff/0x3c0 [ 1417.126919] ? xfs_test_remount_options+0x90/0x90 [ 1417.131763] xfs_fs_mount+0x35/0x40 [ 1417.135399] mount_fs+0x106/0x3ff [ 1417.138861] ? emergency_thaw_all+0x1a0/0x1a0 [ 1417.143365] ? __init_waitqueue_head+0x36/0x90 [ 1417.147968] vfs_kern_mount.part.0+0x6f/0x410 [ 1417.152470] do_mount+0x581/0x2d30 [ 1417.156018] ? copy_mount_string+0x40/0x40 [ 1417.160262] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 1417.165798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1417.171344] ? copy_mount_options+0x30e/0x440 [ 1417.175849] ksys_mount+0xdb/0x150 [ 1417.179401] __x64_sys_mount+0xbe/0x150 [ 1417.183388] do_syscall_64+0x103/0x610 [ 1417.187281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1417.192470] RIP: 0033:0x45a89a [ 1417.195664] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1417.214566] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socket$inet(0x2, 0x2, 0xc4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000200)={@remote, @dev, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000280)={@broadcast, @local, 0x0}, &(0x7f00000002c0)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x80, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{&(0x7f00000017c0)=@l2, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001840)=""/187, 0xbb}, {&(0x7f0000001900)=""/17, 0x11}, {&(0x7f0000001940)=""/57, 0x39}, {&(0x7f0000001980)=""/92, 0x5c}, {&(0x7f0000001a00)=""/77, 0x4d}, {&(0x7f0000001a80)=""/77, 0x4d}, {&(0x7f0000001b00)=""/163, 0xa3}, {&(0x7f0000001bc0)=""/166, 0xa6}, {&(0x7f0000001c80)=""/207, 0xcf}], 0x9}, 0x4}, {{&(0x7f0000001e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001ec0)=""/246, 0xf6}, {&(0x7f0000001fc0)=""/150, 0x96}, {&(0x7f0000002080)=""/250, 0xfa}], 0x3, &(0x7f00000021c0)=""/19, 0x13}, 0xed}, {{&(0x7f0000002200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002280)=""/77, 0x4d}, {&(0x7f0000002300)=""/169, 0xa9}, {&(0x7f00000023c0)=""/120, 0x78}, {&(0x7f0000002440)=""/18, 0x12}], 0x4, &(0x7f00000024c0)=""/232, 0xe8}, 0x7fff}, {{&(0x7f00000025c0)=@nfc_llcp, 0x80, &(0x7f0000003b00)=[{&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/176, 0xb0}, {&(0x7f0000003700)=""/244, 0xf4}, {&(0x7f0000003800)=""/27, 0x1b}, {&(0x7f0000003840)=""/222, 0xde}, {&(0x7f0000003940)=""/221, 0xdd}, {&(0x7f0000003a40)=""/144, 0x90}], 0x7, &(0x7f0000003b80)=""/4096, 0x1000}, 0x40}, {{&(0x7f0000004b80)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004c00)=""/152, 0x98}, {&(0x7f0000004cc0)=""/192, 0xc0}, {&(0x7f0000004d80)=""/214, 0xd6}, {&(0x7f0000004e80)=""/149, 0x95}, {&(0x7f0000004f40)=""/180, 0xb4}, {&(0x7f0000005000)=""/239, 0xef}, {&(0x7f0000005100)=""/29, 0x1d}], 0x7, &(0x7f00000051c0)=""/201, 0xc9}, 0x3}, {{&(0x7f00000052c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005440)=[{&(0x7f0000005340)=""/107, 0x6b}, {&(0x7f00000053c0)=""/34, 0x22}, {&(0x7f0000005400)=""/4, 0x4}], 0x3}, 0xfffffffffffffffe}], 0x6, 0x0, &(0x7f0000005600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006a00)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000006b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000006b40)={@multicast1, @multicast2, 0x0}, &(0x7f0000006b80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006c80)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000006d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000006f00)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007480)={&(0x7f0000007080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000007380)=[{&(0x7f0000007100)=""/130, 0x82}, {&(0x7f00000071c0)=""/85, 0x55}, {&(0x7f0000007240)=""/164, 0xa4}, {&(0x7f0000007300)=""/90, 0x5a}], 0x4, &(0x7f00000073c0)=""/134, 0x86}, 0x100) accept4(0xffffffffffffffff, &(0x7f00000074c0)=@can={0x1d, 0x0}, &(0x7f0000007540)=0x80, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007640)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000007740)=0xe8) r16 = accept4$packet(0xffffffffffffff9c, &(0x7f0000007780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000077c0)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007800)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000007900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000007940)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000007a40)=0xe8) ioctl$SIOCX25GCAUSEDIAG(r7, 0x89e6, &(0x7f0000000440)={0x10001, 0x9}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000007a80)={@multicast1, @loopback, 0x0}, &(0x7f0000007ac0)=0xfffffd34) sendmsg(r16, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="627b81a58cb0bb2f9cb9b15c1027bdf0bc7c242de2bf06f8ed29d25176ec0dfac68632a54e9ffc456c2d4bb1e4e93723070d12356b5e52df7287299e74842ee28bddf71cf7a2e8cae057a30cc7e4838ae8196e06438a", 0x56}], 0x2}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008300)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008340)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000008a00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000089c0)={&(0x7f0000005640)=ANY=[@ANYBLOB="3c060000", @ANYRES16=r2, @ANYBLOB="200d25bd7000fbdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="fc00020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08e8840028846aee79ebf6ebeff3bd5a13fcce2284fbe3ee764a0c64cd37810dd4450594fad14a25c3259a4b7d18ae1a2bdd1fb3cf12caecee98c430cdfaaa3f3db06c0d5bbf5abc81d7da55cc5b08f05c37bef57207034529bee71bdb97d8f14610c9b74fd191a4392fa1e2b468442ef857cbf05e5fdcfe4051a60ee8f3b7a0", @ANYRES32=r10, @ANYBLOB="c800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400714e996a4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004001f0000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="8400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004007e000000080007000000000008000100", @ANYRES32=r18, @ANYBLOB="8402020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="080007000000000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000034000400000001070200000008000109090000000300040309000000ffffcd2a090000000180ffff0100000000020108ff7fffff40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r21, @ANYBLOB="08000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040018520601150f000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffff00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040009000000"], 0x63c}, 0x1, 0x0, 0x0, 0x4040001}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r16, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r23}}, 0x18) [ 1417.222284] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1417.229561] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1417.236835] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1417.244112] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1417.251385] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:35 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000200), 0x0) 06:46:35 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1d) [ 1417.367517] FAT-fs (loop3): Unrecognized mount option "func=KEXEC_KERNEL_CHECK" or missing value [ 1417.509758] gfs2: invalid mount option: commét=0x000 [ 1417.514988] gfs2: can't parse mount arguments 06:46:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="436f6d6d69748e273d09db8c56cdcac90e38f33d307830309431ddedbfa9c790afcb7e71f3429a8ccd00bfe7889d19e396510437c84bf0979aa45e1ec87eeb07c5f6dbf627ce218aae85d61cc33a754cade7f0640e3a8c2f9eafc51466e62e13"]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x2000000000084) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000180)=""/12, &(0x7f00000001c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:35 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) 06:46:35 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socket$inet(0x2, 0x2, 0xc4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000200)={@remote, @dev, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000280)={@broadcast, @local, 0x0}, &(0x7f00000002c0)=0xc) accept4(0xffffffffffffff9c, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x80, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005480)=[{{&(0x7f00000017c0)=@l2, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001840)=""/187, 0xbb}, {&(0x7f0000001900)=""/17, 0x11}, {&(0x7f0000001940)=""/57, 0x39}, {&(0x7f0000001980)=""/92, 0x5c}, {&(0x7f0000001a00)=""/77, 0x4d}, {&(0x7f0000001a80)=""/77, 0x4d}, {&(0x7f0000001b00)=""/163, 0xa3}, {&(0x7f0000001bc0)=""/166, 0xa6}, {&(0x7f0000001c80)=""/207, 0xcf}], 0x9}, 0x4}, {{&(0x7f0000001e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001ec0)=""/246, 0xf6}, {&(0x7f0000001fc0)=""/150, 0x96}, {&(0x7f0000002080)=""/250, 0xfa}], 0x3, &(0x7f00000021c0)=""/19, 0x13}, 0xed}, {{&(0x7f0000002200)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002280)=""/77, 0x4d}, {&(0x7f0000002300)=""/169, 0xa9}, {&(0x7f00000023c0)=""/120, 0x78}, {&(0x7f0000002440)=""/18, 0x12}], 0x4, &(0x7f00000024c0)=""/232, 0xe8}, 0x7fff}, {{&(0x7f00000025c0)=@nfc_llcp, 0x80, &(0x7f0000003b00)=[{&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/176, 0xb0}, {&(0x7f0000003700)=""/244, 0xf4}, {&(0x7f0000003800)=""/27, 0x1b}, {&(0x7f0000003840)=""/222, 0xde}, {&(0x7f0000003940)=""/221, 0xdd}, {&(0x7f0000003a40)=""/144, 0x90}], 0x7, &(0x7f0000003b80)=""/4096, 0x1000}, 0x40}, {{&(0x7f0000004b80)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004c00)=""/152, 0x98}, {&(0x7f0000004cc0)=""/192, 0xc0}, {&(0x7f0000004d80)=""/214, 0xd6}, {&(0x7f0000004e80)=""/149, 0x95}, {&(0x7f0000004f40)=""/180, 0xb4}, {&(0x7f0000005000)=""/239, 0xef}, {&(0x7f0000005100)=""/29, 0x1d}], 0x7, &(0x7f00000051c0)=""/201, 0xc9}, 0x3}, {{&(0x7f00000052c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005440)=[{&(0x7f0000005340)=""/107, 0x6b}, {&(0x7f00000053c0)=""/34, 0x22}, {&(0x7f0000005400)=""/4, 0x4}], 0x3}, 0xfffffffffffffffe}], 0x6, 0x0, &(0x7f0000005600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006a00)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000006b00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000006b40)={@multicast1, @multicast2, 0x0}, &(0x7f0000006b80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006c80)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000006d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006e00)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000006f00)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007480)={&(0x7f0000007080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000007380)=[{&(0x7f0000007100)=""/130, 0x82}, {&(0x7f00000071c0)=""/85, 0x55}, {&(0x7f0000007240)=""/164, 0xa4}, {&(0x7f0000007300)=""/90, 0x5a}], 0x4, &(0x7f00000073c0)=""/134, 0x86}, 0x100) accept4(0xffffffffffffffff, &(0x7f00000074c0)=@can={0x1d, 0x0}, &(0x7f0000007540)=0x80, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007640)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000007740)=0xe8) r16 = accept4$packet(0xffffffffffffff9c, &(0x7f0000007780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000077c0)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007800)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000007900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000007940)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000007a40)=0xe8) ioctl$SIOCX25GCAUSEDIAG(r7, 0x89e6, &(0x7f0000000440)={0x10001, 0x9}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000007a80)={@multicast1, @loopback, 0x0}, &(0x7f0000007ac0)=0xfffffd34) sendmsg(r16, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="627b81a58cb0bb2f9cb9b15c1027bdf0bc7c242de2bf06f8ed29d25176ec0dfac68632a54e9ffc456c2d4bb1e4e93723070d12356b5e52df7287299e74842ee28bddf71cf7a2e8cae057a30cc7e4838ae8196e06438a", 0x56}], 0x2}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008300)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008340)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000008a00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000089c0)={&(0x7f0000005640)=ANY=[@ANYBLOB="3c060000", @ANYRES16=r2, @ANYBLOB="200d25bd7000fbdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="fc00020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08e8840028846aee79ebf6ebeff3bd5a13fcce2284fbe3ee764a0c64cd37810dd4450594fad14a25c3259a4b7d18ae1a2bdd1fb3cf12caecee98c430cdfaaa3f3db06c0d5bbf5abc81d7da55cc5b08f05c37bef57207034529bee71bdb97d8f14610c9b74fd191a4392fa1e2b468442ef857cbf05e5fdcfe4051a60ee8f3b7a0", @ANYRES32=r10, @ANYBLOB="c800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400714e996a4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004001f0000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="8400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004007e000000080007000000000008000100", @ANYRES32=r18, @ANYBLOB="8402020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="080007000000000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000034000400000001070200000008000109090000000300040309000000ffffcd2a090000000180ffff0100000000020108ff7fffff40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r21, @ANYBLOB="08000700000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040018520601150f000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffff00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040009000000"], 0x63c}, 0x1, 0x0, 0x0, 0x4040001}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r16, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r23}}, 0x18) 06:46:35 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1d) [ 1417.637860] FAULT_INJECTION: forcing a failure. [ 1417.637860] name failslab, interval 1, probability 0, space 0, times 0 [ 1417.675232] CPU: 1 PID: 31560 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1417.682545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.691904] Call Trace: [ 1417.694507] dump_stack+0x172/0x1f0 [ 1417.698155] should_fail.cold+0xa/0x1b [ 1417.702057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1417.707170] ? lock_downgrade+0x810/0x810 [ 1417.711336] ? ___might_sleep+0x163/0x280 [ 1417.715487] __should_failslab+0x121/0x190 [ 1417.719723] should_failslab+0x9/0x14 [ 1417.719740] kmem_cache_alloc_node_trace+0x270/0x720 [ 1417.719755] ? kmem_cache_alloc_trace+0x354/0x760 [ 1417.728652] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1417.728675] __kmalloc_node+0x3d/0x70 [ 1417.742403] kvmalloc_node+0x68/0x100 [ 1417.746215] __list_lru_init+0x4aa/0x6e0 [ 1417.750287] sget_userns+0x81e/0xd30 [ 1417.754009] ? kill_litter_super+0x60/0x60 [ 1417.758253] ? ns_test_super+0x50/0x50 [ 1417.761441] gfs2: invalid mount option: CommitŽ'= ÛŒVÍÊÉ8ó=0x00”1Ýí¿©Ç¯Ë~qóBšŒÍ [ 1417.762319] ? ns_test_super+0x50/0x50 [ 1417.762340] ? kill_litter_super+0x60/0x60 [ 1417.762355] sget+0x10c/0x150 [ 1417.772342] gfs2: can't parse mount arguments 06:46:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 06:46:35 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 06:46:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 06:46:35 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200), 0x0) [ 1417.773840] mount_bdev+0xff/0x3c0 [ 1417.773853] ? xfs_test_remount_options+0x90/0x90 [ 1417.773869] xfs_fs_mount+0x35/0x40 [ 1417.797715] mount_fs+0x106/0x3ff [ 1417.801176] ? emergency_thaw_all+0x1a0/0x1a0 [ 1417.805681] ? __init_waitqueue_head+0x36/0x90 [ 1417.810279] vfs_kern_mount.part.0+0x6f/0x410 [ 1417.814782] do_mount+0x581/0x2d30 [ 1417.818334] ? copy_mount_options+0x41/0x440 [ 1417.822748] ? copy_mount_string+0x40/0x40 [ 1417.826986] ? kmem_cache_alloc_trace+0x354/0x760 [ 1417.827008] ? _copy_from_user+0xdd/0x150 06:46:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x4, 0xcb, 0x2, 0xffffffff, 0x14, 0x5, 0x183, 0x5, 0x8001, 0x42, 0x0, 0xffff}) [ 1417.827029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1417.827043] ? copy_mount_options+0x30e/0x440 [ 1417.836014] ksys_mount+0xdb/0x150 [ 1417.836034] __x64_sys_mount+0xbe/0x150 [ 1417.836054] do_syscall_64+0x103/0x610 [ 1417.836074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1417.846066] RIP: 0033:0x45a89a [ 1417.846083] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 06:46:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3, 0x40403) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f00000000c0)={0xe6e, [0x3, 0xea, 0x0, 0x80, 0x2, 0x40, 0x8, 0xffffffff80000001, 0x214, 0x7fffffff, 0x0, 0x1, 0x1, 0xa93, 0x6, 0x4, 0x1, 0x58, 0x35, 0x72c, 0x40, 0x401, 0x8, 0x0, 0x3, 0x7, 0x0, 0x9, 0x3, 0x1, 0x401, 0xd5, 0x7fffffff, 0x7, 0x7ff, 0x8, 0x4, 0x8, 0x7ff, 0x7824, 0x4, 0x7, 0x3, 0x100, 0x3, 0x4, 0x3, 0x5]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./bus\x00', 0xfff, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="f312bc1118f4a82a6c3169887086618d5ad8db4d6f513d094d0f8b815cf612fe052e6e011d44f5c31956373ccc409fa434860af0e68939ac8c22bbde6b52538c1ace79acecd6cf20e023d8affc19e0794f4e0b0d96f33ba7b0c95010c844230c40078d973d949fcdfcf35f52b4363b1aae7963e393", 0x75, 0x1}], 0x0, &(0x7f0000000440)={[{@shortname_lower='shortname=lower'}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ip6erspan0\x00'}}, {@subj_user={'subj_user', 0x3d, '\\md5sum'}}, {@euid_lt={'euid<', r2}}]}) read(r0, &(0x7f0000000000)=""/49, 0x31) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000180)={'ip6erspan0\x00', 0x200}) ftruncate(r4, 0x42) readv(0xffffffffffffffff, &(0x7f0000001440)=[{0x0}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) write$binfmt_elf32(r3, 0x0, 0x0) [ 1417.846091] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1417.846106] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1417.846118] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1417.853594] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1417.853602] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1417.853610] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000100)=0x8487) 06:46:36 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 06:46:36 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0xfffffffffffffe3c) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:36 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, &(0x7f0000000200), 0x0) 06:46:36 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x4000) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f00000000c0)=0x800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) [ 1418.128991] gfs2: commit mount option requires a positive numeric argument [ 1418.143825] gfs2: can't parse mount arguments 06:46:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x604040, 0x0) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f00000001c0)=0x7, 0x4) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0400000069743d307830300a0e0000303130303030303030302c00abb93fe8113f04b76138a1f027dbcf5a138205ebe2ea02000000a5582f3c12cb638e19d35e558571e3bb431ce99b81897bce569d903e12989705bd106af0cf61fe6bf1231771181ded6188bbad986b1b85dd3ab30a8d400afa2434b85c0f5f0b04f455af2ace8cd5e8"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) [ 1418.194447] FAULT_INJECTION: forcing a failure. [ 1418.194447] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.267390] CPU: 0 PID: 31594 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1418.274795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1418.284145] Call Trace: [ 1418.286745] dump_stack+0x172/0x1f0 [ 1418.290424] should_fail.cold+0xa/0x1b [ 1418.294784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1418.299924] ? lock_downgrade+0x810/0x810 [ 1418.304093] ? ___might_sleep+0x163/0x280 [ 1418.308251] __should_failslab+0x121/0x190 [ 1418.312495] should_failslab+0x9/0x14 [ 1418.316307] kmem_cache_alloc_trace+0x2d1/0x760 [ 1418.320989] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1418.325933] __list_lru_init+0x3d3/0x6e0 [ 1418.330003] sget_userns+0x81e/0xd30 [ 1418.333721] ? kill_litter_super+0x60/0x60 [ 1418.337995] ? ns_test_super+0x50/0x50 [ 1418.341894] ? ns_test_super+0x50/0x50 [ 1418.345802] ? kill_litter_super+0x60/0x60 [ 1418.350042] sget+0x10c/0x150 [ 1418.353161] mount_bdev+0xff/0x3c0 [ 1418.356709] ? xfs_test_remount_options+0x90/0x90 [ 1418.361562] xfs_fs_mount+0x35/0x40 06:46:36 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000200), 0x0) [ 1418.365209] mount_fs+0x106/0x3ff [ 1418.368674] ? emergency_thaw_all+0x1a0/0x1a0 [ 1418.373178] ? __init_waitqueue_head+0x36/0x90 [ 1418.378826] vfs_kern_mount.part.0+0x6f/0x410 [ 1418.378853] do_mount+0x581/0x2d30 [ 1418.378869] ? copy_mount_options+0x41/0x440 06:46:36 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000200), 0x0) 06:46:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) [ 1418.378890] ? copy_mount_string+0x40/0x40 [ 1418.378908] ? kmem_cache_alloc_trace+0x354/0x760 [ 1418.378929] ? _copy_from_user+0xdd/0x150 06:46:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0xb6, &(0x7f0000000100)="44d1f4cec7c24099795080a0bed2129acbdc07671a448482dcbc53e38aeba297fe8ae5f8c2ca59355f9e66d172ce6ba7d5bda91f75e28d17c36cd6959651bd4b6d76fe53a29f62fcc368abc0df4b048799643869501b27ce08e06eb3fdf85e79bb50e48fecedb6d1ec5e74d7e94cb8e766bd1cb922fc5cec1a930acb506ab8ea57cee041675e0bf8082e317abe3417b6500bdbe189e962033ccb5c565bdc04d2b106eeed00378e5c68d0120e2abb34c7f67c5120746d"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) [ 1418.378950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1418.378965] ? copy_mount_options+0x30e/0x440 06:46:36 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000200), 0x0) [ 1418.378988] ksys_mount+0xdb/0x150 [ 1418.379011] __x64_sys_mount+0xbe/0x150 [ 1418.379032] do_syscall_64+0x103/0x610 [ 1418.379053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1418.379070] RIP: 0033:0x45a89a [ 1418.379086] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1418.379094] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1418.379109] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1418.379118] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1418.379128] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1418.379140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1418.379149] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1418.444314] gfs2: invalid mount option:  [ 1418.444320] gfs2: can't parse mount arguments [ 1418.692792] gfs2: commit mount option requires a positive numeric argument [ 1418.692802] gfs2: can't parse mount arguments 06:46:37 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) [ 1418.977738] FAULT_INJECTION: forcing a failure. [ 1418.977738] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.998823] CPU: 0 PID: 31643 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1419.006136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.015499] Call Trace: [ 1419.018103] dump_stack+0x172/0x1f0 [ 1419.021754] should_fail.cold+0xa/0x1b [ 1419.025655] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1419.030773] ? lock_downgrade+0x810/0x810 [ 1419.034940] ? ___might_sleep+0x163/0x280 [ 1419.039099] __should_failslab+0x121/0x190 [ 1419.043341] should_failslab+0x9/0x14 [ 1419.047152] kmem_cache_alloc_trace+0x2d1/0x760 [ 1419.051835] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1419.056951] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1419.061909] __list_lru_init+0x3d3/0x6e0 [ 1419.065988] sget_userns+0x81e/0xd30 [ 1419.069717] ? kill_litter_super+0x60/0x60 [ 1419.073968] ? ns_test_super+0x50/0x50 [ 1419.077865] ? ns_test_super+0x50/0x50 [ 1419.081769] ? kill_litter_super+0x60/0x60 [ 1419.086015] sget+0x10c/0x150 [ 1419.089137] mount_bdev+0xff/0x3c0 [ 1419.092687] ? xfs_test_remount_options+0x90/0x90 [ 1419.097537] xfs_fs_mount+0x35/0x40 [ 1419.101173] mount_fs+0x106/0x3ff [ 1419.104647] ? emergency_thaw_all+0x1a0/0x1a0 [ 1419.109151] ? __init_waitqueue_head+0x36/0x90 [ 1419.113761] vfs_kern_mount.part.0+0x6f/0x410 [ 1419.118449] do_mount+0x581/0x2d30 [ 1419.122001] ? copy_mount_options+0x41/0x440 [ 1419.126420] ? copy_mount_string+0x40/0x40 [ 1419.130653] ? kmem_cache_alloc_trace+0x354/0x760 [ 1419.135506] ? _copy_from_user+0xdd/0x150 [ 1419.139660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1419.145202] ? copy_mount_options+0x30e/0x440 [ 1419.149705] ksys_mount+0xdb/0x150 [ 1419.153261] __x64_sys_mount+0xbe/0x150 [ 1419.157244] do_syscall_64+0x103/0x610 [ 1419.161139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.166329] RIP: 0033:0x45a89a 06:46:37 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, 0xfffffffffffffe3c) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$dspn(0x0, 0x0, 0xa000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r2) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0x4, 0x0, 0x1ff, {0x0, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x101}}, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000280)=0x6, 0x4) 06:46:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfff, 0x3) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:37 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000200), 0x0) 06:46:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0xa880) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000140)) [ 1419.169525] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1419.188520] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1419.196235] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1419.203517] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1419.210796] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1419.218074] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:46:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x4, 0xcb, 0x2, 0xffffffff, 0x14, 0x5, 0x183, 0x5, 0x8001, 0x42, 0x0, 0xffff}) [ 1419.225358] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1419.264712] gfs2: commit mount option requires a positive numeric argument [ 1419.271944] gfs2: can't parse mount arguments 06:46:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "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"}, 0x16a) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20001, 0x25) ioctl$KDSETMODE(r2, 0x4b3a, 0x100400) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0xaa1c, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:46:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) flock(r0, 0x4) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) write$binfmt_elf32(r1, 0x0, 0xfffffffffffffd8a) 06:46:37 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) 06:46:37 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x4, 0xcb, 0x2, 0xffffffff, 0x14, 0x5, 0x183, 0x5, 0x8001, 0x42, 0x0, 0xffff}) [ 1419.493463] FAULT_INJECTION: forcing a failure. [ 1419.493463] name failslab, interval 1, probability 0, space 0, times 0 [ 1419.522343] gfs2: commit mount option requires a positive numeric argument [ 1419.529522] gfs2: can't parse mount arguments [ 1419.531677] CPU: 1 PID: 31669 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1419.541293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1419.550651] Call Trace: [ 1419.553255] dump_stack+0x172/0x1f0 [ 1419.556900] should_fail.cold+0xa/0x1b [ 1419.560806] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1419.565918] ? lock_downgrade+0x810/0x810 [ 1419.570075] ? ___might_sleep+0x163/0x280 [ 1419.574235] __should_failslab+0x121/0x190 [ 1419.578480] should_failslab+0x9/0x14 [ 1419.582298] kmem_cache_alloc_trace+0x2d1/0x760 [ 1419.586977] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1419.592110] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1419.597044] __list_lru_init+0x3d3/0x6e0 [ 1419.601115] sget_userns+0x81e/0xd30 [ 1419.604835] ? kill_litter_super+0x60/0x60 [ 1419.609075] ? ns_test_super+0x50/0x50 [ 1419.612965] ? ns_test_super+0x50/0x50 [ 1419.616853] ? kill_litter_super+0x60/0x60 [ 1419.621093] sget+0x10c/0x150 [ 1419.624212] mount_bdev+0xff/0x3c0 [ 1419.627751] ? xfs_test_remount_options+0x90/0x90 [ 1419.632599] xfs_fs_mount+0x35/0x40 [ 1419.636238] mount_fs+0x106/0x3ff [ 1419.639698] ? emergency_thaw_all+0x1a0/0x1a0 [ 1419.644192] ? __init_waitqueue_head+0x36/0x90 [ 1419.648785] vfs_kern_mount.part.0+0x6f/0x410 [ 1419.653287] do_mount+0x581/0x2d30 [ 1419.656837] ? copy_mount_options+0x41/0x440 [ 1419.661252] ? copy_mount_string+0x40/0x40 [ 1419.665493] ? kmem_cache_alloc_trace+0x354/0x760 [ 1419.670345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1419.675885] ? copy_mount_options+0x30e/0x440 [ 1419.680399] ksys_mount+0xdb/0x150 [ 1419.683951] __x64_sys_mount+0xbe/0x150 [ 1419.687952] do_syscall_64+0x103/0x610 [ 1419.691847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1419.697032] RIP: 0033:0x45a89a [ 1419.700226] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1419.719125] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1419.726837] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1419.734106] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 06:46:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x540c, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:37 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000240)={r5, 0xc7, "816838db0397c426244176aa76585f62434a1e35ca347650517b35605876652c01dbd783fdf3ac3aaabfd7b427b643efaae65074b649b068076607d3ed6e058ba35f2e989ed921aab855ae8cc5d5d3a4a8df0b81e7dff4c50e4b63580bdefd7f7b6459442eeab2b6f3cf0227e16b41cd93ad9957a39b15d8826cb7da1029534a16201c6d66881b5c38d3b0bbdb6723b6e514b71827e2019b191cf5d8455435018c578dc4d4c82c84e7b07d71e8fbe8866e0e16c705d013af850bf8776044df16180a473e3476a5"}, &(0x7f0000000100)=0xcf) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1419.741376] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1419.748643] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1419.755911] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1419.801337] gfs2: commit mount option requires a positive numeric argument [ 1419.822572] gfs2: can't parse mount arguments 06:46:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x540b, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4, 0x0) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1d1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4f96, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r1, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 06:46:38 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = accept(r0, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)={0x2a4, r2, 0x108, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x12c, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2ae}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x66}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x511}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x88}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffff7f}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdcf}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8075}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x445e}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xd3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}]}, 0x2a4}, 0x1, 0x0, 0x0, 0x10}, 0x4008041) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/nullb0\x00', 0x20300, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) userfaultfd(0x80000) 06:46:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000240)={r5, 0xc7, "816838db0397c426244176aa76585f62434a1e35ca347650517b35605876652c01dbd783fdf3ac3aaabfd7b427b643efaae65074b649b068076607d3ed6e058ba35f2e989ed921aab855ae8cc5d5d3a4a8df0b81e7dff4c50e4b63580bdefd7f7b6459442eeab2b6f3cf0227e16b41cd93ad9957a39b15d8826cb7da1029534a16201c6d66881b5c38d3b0bbdb6723b6e514b71827e2019b191cf5d8455435018c578dc4d4c82c84e7b07d71e8fbe8866e0e16c705d013af850bf8776044df16180a473e3476a5"}, &(0x7f0000000100)=0xcf) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:38 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000240)={r5, 0xc7, "816838db0397c426244176aa76585f62434a1e35ca347650517b35605876652c01dbd783fdf3ac3aaabfd7b427b643efaae65074b649b068076607d3ed6e058ba35f2e989ed921aab855ae8cc5d5d3a4a8df0b81e7dff4c50e4b63580bdefd7f7b6459442eeab2b6f3cf0227e16b41cd93ad9957a39b15d8826cb7da1029534a16201c6d66881b5c38d3b0bbdb6723b6e514b71827e2019b191cf5d8455435018c578dc4d4c82c84e7b07d71e8fbe8866e0e16c705d013af850bf8776044df16180a473e3476a5"}, &(0x7f0000000100)=0xcf) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1420.143288] gfs2: commit mount option requires a positive numeric argument [ 1420.150602] FAULT_INJECTION: forcing a failure. [ 1420.150602] name failslab, interval 1, probability 0, space 0, times 0 06:46:38 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000240)="0adcd2ef099a1158e6576c716146ac81da3100a07a6859c52d3a186681ab0082be6502396c5234fc74344b32f372d20a6698fa3488ac5a9edf037ae4330b3d71a3d37301000000d219b5ebab9326d69a9503f4803d4ba0f2436f12a63cf5206348a88dccc5db6be038113959fc75f991358180ce73ffd819587ae874c7a4011ba578e52b9960cb09fdc516dee098500884010ccb53eb7e4df3d9469c638eec4c07f39c0d22528986c2f876f2831d8589c8b1225192379bc0dfe2849d62548074bd5f92f3584877acbc2dbe576ebf98546e1967d7cfdf4f000000000000000000000000000000000000") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000340)={{0x4, 0x6, 0x2, 0x1ff, 'syz0\x00', 0xfffffffffffffffa}, 0x6, 0x1c, 0x9, r2, 0x4, 0x8000, 'syz0\x00', &(0x7f0000000100)=['posix_acl_accessbdev\x00', '\x00', '/dev/nullb0\x00', '/dev/nullb0\x00'], 0x2e, [], [0x8, 0x4, 0x8b9, 0x8]}) [ 1420.188135] gfs2: can't parse mount arguments 06:46:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000240)={r5, 0xc7, "816838db0397c426244176aa76585f62434a1e35ca347650517b35605876652c01dbd783fdf3ac3aaabfd7b427b643efaae65074b649b068076607d3ed6e058ba35f2e989ed921aab855ae8cc5d5d3a4a8df0b81e7dff4c50e4b63580bdefd7f7b6459442eeab2b6f3cf0227e16b41cd93ad9957a39b15d8826cb7da1029534a16201c6d66881b5c38d3b0bbdb6723b6e514b71827e2019b191cf5d8455435018c578dc4d4c82c84e7b07d71e8fbe8866e0e16c705d013af850bf8776044df16180a473e3476a5"}, &(0x7f0000000100)=0xcf) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1420.222100] CPU: 0 PID: 31696 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1420.229434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1420.238826] Call Trace: [ 1420.241446] dump_stack+0x172/0x1f0 [ 1420.245084] should_fail.cold+0xa/0x1b [ 1420.248988] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1420.254098] ? lock_downgrade+0x810/0x810 [ 1420.254118] ? ___might_sleep+0x163/0x280 [ 1420.254138] __should_failslab+0x121/0x190 [ 1420.262424] should_failslab+0x9/0x14 [ 1420.262442] kmem_cache_alloc_trace+0x2d1/0x760 [ 1420.262460] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1420.262480] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1420.262495] __list_lru_init+0x3d3/0x6e0 [ 1420.262516] sget_userns+0x81e/0xd30 [ 1420.292943] ? kill_litter_super+0x60/0x60 [ 1420.297819] ? ns_test_super+0x50/0x50 [ 1420.301735] ? ns_test_super+0x50/0x50 [ 1420.305626] ? kill_litter_super+0x60/0x60 [ 1420.305642] sget+0x10c/0x150 [ 1420.305666] mount_bdev+0xff/0x3c0 [ 1420.316513] ? xfs_test_remount_options+0x90/0x90 06:46:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000240)={r5, 0xc7, "816838db0397c426244176aa76585f62434a1e35ca347650517b35605876652c01dbd783fdf3ac3aaabfd7b427b643efaae65074b649b068076607d3ed6e058ba35f2e989ed921aab855ae8cc5d5d3a4a8df0b81e7dff4c50e4b63580bdefd7f7b6459442eeab2b6f3cf0227e16b41cd93ad9957a39b15d8826cb7da1029534a16201c6d66881b5c38d3b0bbdb6723b6e514b71827e2019b191cf5d8455435018c578dc4d4c82c84e7b07d71e8fbe8866e0e16c705d013af850bf8776044df16180a473e3476a5"}, &(0x7f0000000100)=0xcf) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1420.316535] xfs_fs_mount+0x35/0x40 [ 1420.316557] mount_fs+0x106/0x3ff [ 1420.328469] ? emergency_thaw_all+0x1a0/0x1a0 [ 1420.332971] ? __init_waitqueue_head+0x36/0x90 [ 1420.337567] vfs_kern_mount.part.0+0x6f/0x410 [ 1420.342098] do_mount+0x581/0x2d30 [ 1420.345667] ? copy_mount_string+0x40/0x40 [ 1420.345693] ? copy_mount_options+0x1de/0x440 [ 1420.354429] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 1420.354445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1420.354463] ? copy_mount_options+0x30e/0x440 [ 1420.369294] ksys_mount+0xdb/0x150 [ 1420.372850] __x64_sys_mount+0xbe/0x150 [ 1420.376833] do_syscall_64+0x103/0x610 [ 1420.380735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1420.385920] RIP: 0033:0x45a89a [ 1420.385936] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1420.385944] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1420.385959] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8020, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:38 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1420.385969] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1420.408045] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1420.408055] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1420.408064] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:38 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xb6e, 0x48800) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000100)={0x93ca, 0x49, 0xe1a5}) ioctl$TIOCSBRK(r2, 0x5427) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) 06:46:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) 06:46:38 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1420.635019] gfs2: commit mount option requires a positive numeric argument [ 1420.662038] gfs2: can't parse mount arguments 06:46:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:38 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000000c0)={0x0, r1}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r2, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x9, 0xc8300) 06:46:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r2 = open(&(0x7f0000000140)='./file0\x00', 0x121000, 0x80) getpeername$llc(r2, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)=')\'\x00') socket(0x11, 0x80003, 0x2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2001, 0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000200)) fadvise64(r0, 0x0, 0x0, 0x5) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000100)=0x2) 06:46:38 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) [ 1420.746595] FAULT_INJECTION: forcing a failure. [ 1420.746595] name failslab, interval 1, probability 0, space 0, times 0 [ 1420.808938] CPU: 1 PID: 31730 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1420.816259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1420.825623] Call Trace: [ 1420.828233] dump_stack+0x172/0x1f0 [ 1420.831883] should_fail.cold+0xa/0x1b [ 1420.835784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1420.840905] ? lock_downgrade+0x810/0x810 [ 1420.845069] ? ___might_sleep+0x163/0x280 [ 1420.849231] __should_failslab+0x121/0x190 [ 1420.853479] should_failslab+0x9/0x14 [ 1420.857293] kmem_cache_alloc_trace+0x2d1/0x760 [ 1420.861975] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1420.867099] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1420.872042] __list_lru_init+0x3d3/0x6e0 [ 1420.876123] sget_userns+0x81e/0xd30 [ 1420.879837] ? kill_litter_super+0x60/0x60 [ 1420.884086] ? ns_test_super+0x50/0x50 [ 1420.887983] ? ns_test_super+0x50/0x50 [ 1420.891874] ? kill_litter_super+0x60/0x60 [ 1420.896120] sget+0x10c/0x150 [ 1420.899244] mount_bdev+0xff/0x3c0 [ 1420.902791] ? xfs_test_remount_options+0x90/0x90 [ 1420.907645] xfs_fs_mount+0x35/0x40 [ 1420.911278] mount_fs+0x106/0x3ff [ 1420.914740] ? emergency_thaw_all+0x1a0/0x1a0 [ 1420.919243] ? __init_waitqueue_head+0x36/0x90 [ 1420.923840] vfs_kern_mount.part.0+0x6f/0x410 [ 1420.928353] do_mount+0x581/0x2d30 [ 1420.931894] ? copy_mount_options+0x41/0x440 [ 1420.936312] ? copy_mount_string+0x40/0x40 [ 1420.940576] ? kmem_cache_alloc_trace+0x354/0x760 [ 1420.945435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1420.950978] ? copy_mount_options+0x30e/0x440 [ 1420.955490] ksys_mount+0xdb/0x150 [ 1420.959039] __x64_sys_mount+0xbe/0x150 [ 1420.963029] do_syscall_64+0x103/0x610 [ 1420.966932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1420.972124] RIP: 0033:0x45a89a [ 1420.975320] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1420.994231] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1421.001949] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 06:46:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x934, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x10000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:39 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000180)={'bpq0\x00', {0x2, 0x4e21, @broadcast}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x6, 0x3c6, 0x1, 0xc4, 0x17, 0x9, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffb, 0x8}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x101381, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x17, &(0x7f00000000c0)=0x54, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1421.009225] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1421.016499] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1421.023776] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1421.031056] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000180)=""/253) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) fdatasync(r0) [ 1421.063513] gfs2: commit mount option requires a positive numeric argument [ 1421.081421] gfs2: can't parse mount arguments 06:46:39 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:39 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8000000000081) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x14, "12fb7efacc1772102707f3174c9503c7d1d2fb2d"}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)={r4, 0x1000, "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"}, &(0x7f0000001380)=0xfffffe83) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getpeername$packet(r1, &(0x7f0000001280)={0x11, 0x0, 0x0}, &(0x7f00000012c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000001300)={@mcast2, @rand_addr="7dde2fe332b01f9be006c9b8b62fa381", @rand_addr="382852ca58ed1c7ca03eaa28478c5f46", 0x0, 0x2, 0x80ae, 0x0, 0xfff, 0x0, r5}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x81, 0x1) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0xe3f) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r2, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x9, @empty, 0xfffffffffffffffb}, @in6={0xa, 0x4e23, 0x3, @mcast2, 0x1954db02}}}, 0x118) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0xbd187875ead17c4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1c008}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="850000", @ANYRES16=r4, @ANYBLOB="200026bd7000ffdbdf25020000001400020008000b000000000008000800030000000800060081000000"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4044) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:39 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$TIOCNOTTY(r0, 0x5422) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = semget(0x2, 0x0, 0x20) ioctl$TIOCSBRK(r0, 0x5427) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f00000000c0)=""/116) pipe2$9p(&(0x7f0000000300), 0x5000000004880002) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x87c8, 0x3) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) [ 1421.364240] FAULT_INJECTION: forcing a failure. [ 1421.364240] name failslab, interval 1, probability 0, space 0, times 0 [ 1421.390464] gfs2: not a GFS2 filesystem [ 1421.409195] CPU: 1 PID: 31777 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1421.416519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1421.425888] Call Trace: [ 1421.428509] dump_stack+0x172/0x1f0 [ 1421.432253] should_fail.cold+0xa/0x1b [ 1421.436164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1421.441281] ? lock_downgrade+0x810/0x810 [ 1421.445453] ? ___might_sleep+0x163/0x280 [ 1421.449613] __should_failslab+0x121/0x190 [ 1421.453858] should_failslab+0x9/0x14 [ 1421.457664] kmem_cache_alloc_trace+0x2d1/0x760 [ 1421.462862] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1421.467982] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1421.472930] __list_lru_init+0x3d3/0x6e0 [ 1421.477011] sget_userns+0x81e/0xd30 [ 1421.480736] ? kill_litter_super+0x60/0x60 [ 1421.484994] ? ns_test_super+0x50/0x50 [ 1421.488893] ? ns_test_super+0x50/0x50 [ 1421.492858] ? kill_litter_super+0x60/0x60 [ 1421.497104] sget+0x10c/0x150 [ 1421.500228] mount_bdev+0xff/0x3c0 [ 1421.503866] ? xfs_test_remount_options+0x90/0x90 [ 1421.508723] xfs_fs_mount+0x35/0x40 [ 1421.512366] mount_fs+0x106/0x3ff [ 1421.515830] ? emergency_thaw_all+0x1a0/0x1a0 [ 1421.520348] ? __init_waitqueue_head+0x36/0x90 [ 1421.524955] vfs_kern_mount.part.0+0x6f/0x410 [ 1421.529462] do_mount+0x581/0x2d30 [ 1421.533005] ? copy_mount_options+0x41/0x440 [ 1421.537420] ? copy_mount_string+0x40/0x40 [ 1421.541662] ? kmem_cache_alloc_trace+0x354/0x760 [ 1421.546523] ? _copy_from_user+0xdd/0x150 [ 1421.550688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1421.556702] ? copy_mount_options+0x30e/0x440 [ 1421.561226] ksys_mount+0xdb/0x150 [ 1421.564781] __x64_sys_mount+0xbe/0x150 [ 1421.568767] do_syscall_64+0x103/0x610 [ 1421.572674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1421.577865] RIP: 0033:0x45a89a [ 1421.581070] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1421.599983] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1421.607710] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x14) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000080)={0x0, {0x40, 0x1, 0xaa62, 0x4f}}) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000100)={0xd000, 0x100000, 0x8, 0x3f, 0x7fffffff}) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000140)={0x5, 0x5}) 06:46:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x31, 0x7, 0x7ff, 0xfffffffffffffffa, 0x15, 0x100, 0x9, 0x6, 0x6, 0x10, 0x7, 0xfffffffffffff800}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000100)=""/9) clock_gettime(0x7, &(0x7f0000000000)) 06:46:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x800000000000004, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1421.614986] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1421.622384] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1421.629688] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1421.636966] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:39 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:39 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, r0, 0x7, 0x1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f8, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:46:39 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="63050014303030303130303030302f30302c0000000004ba64860018c97a2ddb3a69632b5fad8c028dcc8c7390c0b0614172df9a86911cf5ac14140a9d5226adcc34f31f591571d7bdf438ae31622c6163b31efe67111bbd364761371c12bed84e7a73ad7a70155211bcbf27a0109371e8d25cbae1da8f0673971ead08d1d20bcfd8b024d2f6bed7b93bfb5009bf3f2c738839f524ae744088c9910217a635f55d8b2e34c0f3989bad3593bf43532de1b86c6d75a73b1e6dd4bb3355a3327ba2fe4a2779a0b5a72c1ff117388115638eef32d567a42edaedf4e3"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000280)={0x1, 0x5, 0x0, 0x7, [], [], [], 0x9, 0x3, 0x800, 0x80000000, "0044fb4c4f526967db6aa7dea704aa70"}) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000140)) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) 06:46:39 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:39 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x800001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x3) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0xd) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="4f0984ac948066e12b1e0900e402000072a3a885bf"], 0x3, 0x2) write$binfmt_elf32(r2, 0x0, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) 06:46:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000000c0)={0x8, &(0x7f0000000180)="fe0d12bd1b281d30278950567168a2a993aab31a45bb832e2b3a09c3ce60c3596b09ae97dc6e3f1a19c3938d983166528bc68b21590027e18434d53d19dfd4661dacacc5ca9d0cdbdd21976f0a5cd5e57211992a87271e8f272b14356e0a3246d9d5321120c542eec6cd01b87b1603c5d5f7e82f642a8532b849b51d20ab57cfc9a721e320b4887a25984faf5a61cbb3e5b118e92f893dea4e6bb06da542c85d91c04bc7ef16093b6ae66bf86520e0e37c25e08f6d0ae458bb298c4024858dc831ab417d67a7eb998052d11f0e4abd9fcae3c483"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x8, 0x1}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r3, 0x2}, 0x8) socket$inet_sctp(0x2, 0x5, 0x84) 06:46:40 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1421.823838] gfs2: invalid mount option: c [ 1421.839329] gfs2: can't parse mount arguments 06:46:40 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e23, 0xffffffffffffff3d, @rand_addr="b6987e77f60027e56f3232e5fca03d5b", 0x7f}], 0x2c) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="fcda"], 0x2) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffff00000000f80000"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1421.906747] FAULT_INJECTION: forcing a failure. [ 1421.906747] name failslab, interval 1, probability 0, space 0, times 0 [ 1421.970779] CPU: 1 PID: 31814 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1421.978093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1421.987457] Call Trace: [ 1421.990161] dump_stack+0x172/0x1f0 [ 1421.993802] should_fail.cold+0xa/0x1b [ 1421.997707] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1422.002824] ? lock_downgrade+0x810/0x810 [ 1422.006990] ? ___might_sleep+0x163/0x280 [ 1422.011150] __should_failslab+0x121/0x190 [ 1422.015392] should_failslab+0x9/0x14 [ 1422.019200] kmem_cache_alloc_trace+0x2d1/0x760 [ 1422.023884] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1422.029002] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1422.033943] __list_lru_init+0x3d3/0x6e0 [ 1422.038021] sget_userns+0x81e/0xd30 [ 1422.041759] ? kill_litter_super+0x60/0x60 [ 1422.046002] ? ns_test_super+0x50/0x50 [ 1422.049907] ? ns_test_super+0x50/0x50 [ 1422.053805] ? kill_litter_super+0x60/0x60 [ 1422.058050] sget+0x10c/0x150 [ 1422.061162] mount_bdev+0xff/0x3c0 [ 1422.064706] ? xfs_test_remount_options+0x90/0x90 [ 1422.069553] xfs_fs_mount+0x35/0x40 [ 1422.073187] mount_fs+0x106/0x3ff [ 1422.076652] ? emergency_thaw_all+0x1a0/0x1a0 [ 1422.081156] ? __init_waitqueue_head+0x36/0x90 [ 1422.085752] vfs_kern_mount.part.0+0x6f/0x410 [ 1422.090276] do_mount+0x581/0x2d30 [ 1422.093823] ? copy_mount_options+0x41/0x440 [ 1422.098239] ? copy_mount_string+0x40/0x40 [ 1422.102504] ? kmem_cache_alloc_trace+0x354/0x760 [ 1422.107389] ? _copy_from_user+0xdd/0x150 [ 1422.111554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.117109] ? copy_mount_options+0x30e/0x440 [ 1422.121613] ksys_mount+0xdb/0x150 [ 1422.125160] __x64_sys_mount+0xbe/0x150 [ 1422.129146] do_syscall_64+0x103/0x610 [ 1422.133050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.138245] RIP: 0033:0x45a89a [ 1422.141453] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1422.160355] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:40 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x8, 0x8}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000000c0)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="419b71db767bfd1d8e2ba06da5cdf6cc5843e4a09fac58ddd2902bbb11009a6e4256d2f4e66b04d531a86d67fd70055f", 0x30, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000002c0)={r2, 0x7, 0x5}, 0x0, &(0x7f0000000300)="b107db2d4bf1753c111848f16fa4158d9acee84870feb994f35109399f6bbeb9564bae6496d0864de507656b98cc42e5e2826518f0a967d838f6a5cb0b1427b2ed93090c3309c919741966bcfbb70bde65c1aa2745332a6cd5fad76b3e1d723deb6510d340954e4ace25b3811d847192329045732a35794d05e478c0fcfed9862f9f33849cd5728a04d3a51e5d5c0fa7ac43edc5449d1b000547191e9a6e647a3442f9ee06e3cfacde336bd3dccc01e768db9a4e29b0db9611fdd08f6fb79a1b0c9fa5e86864cd89b6b768b35c55d1dfe6a8c2d6f3c03cc133", &(0x7f0000000400)=""/188) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0xbf0000, 0x5, 0x200, [], &(0x7f0000000100)={0x9b0a73, 0x80, [], @value64=0x8}}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000004c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x20000, 0x0) 06:46:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41000100}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xe0, r2, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x18000000000000}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd3ca}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x26}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfad}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffc01}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xdf0a}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffff9}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x810}, 0x4050) name_to_handle_at(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0xc3, 0x4f, "ff35a051733fe3b05a175844bf38bf97937c5dd8071be2cadb2898cc1a353f291785817a27d1ba3ee449c77d83cdd40a5609a27acf66da5e171fe6cecbf4c9029fcb94705c1998f3988e055f3249e7acf5bc7c3b27065884f5990ca0263946ec1b3521924e43b846887d3f4b5efa2f45e773f9a331bd0b617cbf9486e245d5cbacbe8de9bde4080674da1301c47021d65e0b6df5d5bb805bc632b0dbcceee573c4fce1615ba213dae3712efaefdb870a67e441816e3170c4210ee0"}, &(0x7f0000000400), 0x1400) [ 1422.168076] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1422.175357] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1422.182630] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1422.189901] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1422.197174] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:40 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:40 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000000)=""/71) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:40 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x408800, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) sendto$llc(r2, &(0x7f0000000080)="39bbca65cfd8fb762af08b2212f0122370e32da656ae201227d651960446b10dfad007a65c97bfd8ecc6ef53fa8ad9da451f4f045ae057d9b9c4141d455ddcd2c771e23bb22fd5dd4c27dc2f149e72665864c8581852fe28726e7a2aa624921033b17e6ad5be", 0x66, 0x40, &(0x7f0000000100)={0x1a, 0x30f, 0x0, 0x8, 0xffff, 0x9395, @remote}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) [ 1422.257041] gfs2: invalid mount option: ÿÿÿÿ [ 1422.263992] gfs2: can't parse mount arguments 06:46:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x800, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x80, 0x4) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000100)=0xe30) write(r1, &(0x7f0000000140)="da3613f3bc87bf3b2c230c1f54b542f9bdda3c", 0x13) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000180)=0x5) 06:46:40 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0xfffffffe) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x78a00, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000240)) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000080)={0x68a, 0xa, 0x2, "9c5023f285a89486566b6c7eec0bad35d9822e9bb237b0f1a5c839180edd4d95", 0x35315241}) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x6, 0x18000) fstat(r3, &(0x7f0000000180)) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000100)) fsync(r3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:40 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1422.422513] FAULT_INJECTION: forcing a failure. [ 1422.422513] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.472544] CPU: 1 PID: 31853 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1422.479883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1422.489252] Call Trace: [ 1422.491858] dump_stack+0x172/0x1f0 [ 1422.495500] should_fail.cold+0xa/0x1b [ 1422.499407] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1422.504521] ? lock_downgrade+0x810/0x810 [ 1422.508685] ? ___might_sleep+0x163/0x280 [ 1422.512844] __should_failslab+0x121/0x190 [ 1422.517115] should_failslab+0x9/0x14 [ 1422.520937] kmem_cache_alloc_trace+0x2d1/0x760 [ 1422.525739] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1422.530861] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1422.535804] __list_lru_init+0x3d3/0x6e0 [ 1422.539890] sget_userns+0x81e/0xd30 [ 1422.543614] ? kill_litter_super+0x60/0x60 [ 1422.547865] ? ns_test_super+0x50/0x50 [ 1422.551760] ? ns_test_super+0x50/0x50 [ 1422.555652] ? kill_litter_super+0x60/0x60 [ 1422.559891] sget+0x10c/0x150 [ 1422.563053] mount_bdev+0xff/0x3c0 [ 1422.566603] ? xfs_test_remount_options+0x90/0x90 [ 1422.571460] xfs_fs_mount+0x35/0x40 [ 1422.575093] mount_fs+0x106/0x3ff [ 1422.578551] ? emergency_thaw_all+0x1a0/0x1a0 [ 1422.583050] ? __init_waitqueue_head+0x36/0x90 [ 1422.587647] vfs_kern_mount.part.0+0x6f/0x410 [ 1422.592149] do_mount+0x581/0x2d30 [ 1422.595689] ? copy_mount_options+0x41/0x440 [ 1422.600108] ? copy_mount_string+0x40/0x40 [ 1422.604346] ? kmem_cache_alloc_trace+0x354/0x760 [ 1422.609196] ? _copy_from_user+0xdd/0x150 [ 1422.613372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1422.618915] ? copy_mount_options+0x30e/0x440 [ 1422.623523] ksys_mount+0xdb/0x150 [ 1422.627069] __x64_sys_mount+0xbe/0x150 [ 1422.631052] do_syscall_64+0x103/0x610 [ 1422.634953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1422.640141] RIP: 0033:0x45a89a [ 1422.643343] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1422.662259] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:40 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = dup3(r0, r0, 0x80000) fanotify_mark(r1, 0x75, 0x1000, r2, &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xa) write$binfmt_elf32(r0, 0x0, 0x0) [ 1422.669967] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1422.677250] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1422.684516] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1422.691786] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1422.699054] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:40 executing program 1: iopl(0x4) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000040)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1422.763021] gfs2: commit mount option requires a positive numeric argument [ 1422.770174] gfs2: can't parse mount arguments 06:46:41 executing program 2 (fault-call:0 fault-nth:66): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000080)={0x1, 0x1000}) 06:46:41 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f00000000c0)={0x1000, 0x40, @value=0x5}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000000)={0x9, 0x8, 0x9, 0x7, 0xdc, 0x8000}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xfffffffffffffd09) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x101, 0x2, 0x1, 0x7, 0x5, 0x6}) fsetxattr$security_smack_transmute(r2, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) 06:46:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='hwsim0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:46:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1ffffffbffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000080)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:41 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x48013, r0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 1: r0 = socket(0x11, 0x6, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x3, 0x10001, 0x5, 0x74, 0x0, 0x401, 0x800, 0x10000, 0x2, 0x1, 0x1d2d}, 0xb) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x130) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) 06:46:41 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) socket$inet6(0xa, 0x5, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000880)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xeae, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x4000, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000780)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) socket$pptp(0x18, 0x1, 0x2) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x77b, 0x101000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000980)={0x0, @in6={{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x22}, 0x4}}, 0x7fffffff, 0x1, 0x9, 0xb0c9, 0x1000}, &(0x7f0000000040)=0x3b2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e22, 0x80000001, @mcast1, 0x1}}, 0xffffffffffffffc0, 0xffff}, &(0x7f0000000280)=0x90) write$binfmt_elf32(r0, 0x0, 0x0) sendmmsg$inet_sctp(r2, &(0x7f00000006c0)=[{&(0x7f00000002c0)=@in={0x2, 0x4e24, @rand_addr=0x5}, 0x10, &(0x7f0000000300)}, {&(0x7f0000000340)=@in6={0xa, 0x4e21, 0x9, @mcast2, 0x1ff}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000380)="f2d3bd9c394aaeea8a72fdc8b30a02946b04494e90d8eecbbbe34e5737b70b85e66b240400dce5416b5cd290d2c3372a87e367f309f1aa48512d08d64b8a9f46573cdc018d588ace7a51bd6d0ae2f576a295ab48e71fb2f974525324f8272e2774d0ccbf233504cdbb9f780a549b5a3f206d2a216203cab01ecf5b05b60a7b51604d201d85edceea4805194e5e5a1b9a1449d418ab8ae236dc54048e32ff4d26370293df954c2cd05ca5e2ba06fc3df72cb639813b95552aec0cd5f18967d509ec5ef32afcac0fee4d371d6d2790b1fcdc0374da5ca92388ce62e8a3f6c5", 0xde}], 0x1, &(0x7f00000004c0)=[@prinfo={0x18, 0x84, 0x5, {0x20}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x209, 0x1f, 0x1, r4}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0xffc00000, 0x8208, 0xf2, 0xffffffffffffffe1, 0x8, 0x7, 0x80000001, r4}}], 0x68, 0x4000}, {&(0x7f0000000540)=@in6={0xa, 0x4e20, 0xffffffffffffffe0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000580)="c9ec77daeecf58788e8056a3c87afc7577c84c8be79d8b2e2cde65ac5bcdc3d8c4ecf6cd08d0ddc50647329509546508c226a92cf5b22e8b69d7b2c4caffc7f25c35f2dfaa263a5546bc", 0x4a}], 0x1, &(0x7f0000000640)=[@sndinfo={0x20, 0x84, 0x2, {0x5, 0x2, 0x5f, 0x8, r3}}, @sndrcv={0x30, 0x84, 0x1, {0x296f, 0xa04a, 0x0, 0x5, 0x0, 0xfffffffffffffbff, 0x200, 0x1, r4}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x77b}}], 0x68, 0x20000000}], 0x3, 0x40000) [ 1423.034480] gfs2: commit mount option requires a positive numeric argument [ 1423.041741] gfs2: can't parse mount arguments [ 1423.120500] FAULT_INJECTION: forcing a failure. [ 1423.120500] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.169618] CPU: 0 PID: 31909 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1423.176933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1423.186290] Call Trace: [ 1423.188898] dump_stack+0x172/0x1f0 [ 1423.192541] should_fail.cold+0xa/0x1b [ 1423.196443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1423.201564] ? lock_downgrade+0x810/0x810 [ 1423.205728] ? ___might_sleep+0x163/0x280 [ 1423.209885] __should_failslab+0x121/0x190 [ 1423.214127] should_failslab+0x9/0x14 [ 1423.217940] kmem_cache_alloc_trace+0x2d1/0x760 [ 1423.222619] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1423.227741] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1423.232682] __list_lru_init+0x3d3/0x6e0 [ 1423.236752] sget_userns+0x81e/0xd30 [ 1423.240476] ? kill_litter_super+0x60/0x60 [ 1423.244722] ? ns_test_super+0x50/0x50 [ 1423.248620] ? ns_test_super+0x50/0x50 [ 1423.252515] ? kill_litter_super+0x60/0x60 [ 1423.256754] sget+0x10c/0x150 [ 1423.259868] mount_bdev+0xff/0x3c0 [ 1423.263413] ? xfs_test_remount_options+0x90/0x90 [ 1423.268424] xfs_fs_mount+0x35/0x40 [ 1423.272061] mount_fs+0x106/0x3ff [ 1423.275521] ? emergency_thaw_all+0x1a0/0x1a0 [ 1423.280021] ? __init_waitqueue_head+0x36/0x90 [ 1423.284613] vfs_kern_mount.part.0+0x6f/0x410 [ 1423.289114] do_mount+0x581/0x2d30 [ 1423.292655] ? copy_mount_options+0x41/0x440 [ 1423.297076] ? copy_mount_string+0x40/0x40 [ 1423.301312] ? kmem_cache_alloc_trace+0x354/0x760 [ 1423.306160] ? _copy_from_user+0xdd/0x150 [ 1423.310318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1423.315858] ? copy_mount_options+0x30e/0x440 [ 1423.320362] ksys_mount+0xdb/0x150 [ 1423.323908] __x64_sys_mount+0xbe/0x150 [ 1423.327887] do_syscall_64+0x103/0x610 [ 1423.331779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.336969] RIP: 0033:0x45a89a [ 1423.340164] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1423.359184] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1423.366893] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1423.374168] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1423.381730] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1423.388998] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1423.396272] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:41 executing program 2 (fault-call:0 fault-nth:67): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303130303030303030166330"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x4, 0x1, 0xbf, 0x4}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:41 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r2, @in={{0x2, 0x4e23, @local}}}, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000180)=0x6e, 0x80000) get_mempolicy(&(0x7f0000000200), &(0x7f0000000240), 0x3, &(0x7f0000ffd000/0x2000)=nil, 0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6cd, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000001c0)) write$binfmt_elf32(r2, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x40, 0x0) 06:46:41 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x10000005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x420041, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:41 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$inet_sctp(0x2, 0x1, 0x84) renameat2(r2, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:41 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1423.542502] gfs2: invalid mount option: commit=0x000000010000000c0 [ 1423.567979] gfs2: can't parse mount arguments [ 1423.575404] FAULT_INJECTION: forcing a failure. [ 1423.575404] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.625243] CPU: 0 PID: 31933 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1423.632565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1423.641927] Call Trace: [ 1423.644536] dump_stack+0x172/0x1f0 [ 1423.648192] should_fail.cold+0xa/0x1b [ 1423.652095] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1423.657220] ? lock_downgrade+0x810/0x810 [ 1423.661388] ? ___might_sleep+0x163/0x280 [ 1423.665565] __should_failslab+0x121/0x190 [ 1423.669811] should_failslab+0x9/0x14 [ 1423.673620] kmem_cache_alloc_trace+0x2d1/0x760 [ 1423.678297] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1423.683408] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1423.688359] __list_lru_init+0x3d3/0x6e0 [ 1423.692440] sget_userns+0x81e/0xd30 [ 1423.696182] ? kill_litter_super+0x60/0x60 [ 1423.700450] ? ns_test_super+0x50/0x50 [ 1423.704347] ? ns_test_super+0x50/0x50 [ 1423.708239] ? kill_litter_super+0x60/0x60 [ 1423.712482] sget+0x10c/0x150 [ 1423.715603] mount_bdev+0xff/0x3c0 [ 1423.719240] ? xfs_test_remount_options+0x90/0x90 [ 1423.724090] xfs_fs_mount+0x35/0x40 [ 1423.727727] mount_fs+0x106/0x3ff [ 1423.731192] ? emergency_thaw_all+0x1a0/0x1a0 [ 1423.735775] ? __init_waitqueue_head+0x36/0x90 [ 1423.740371] vfs_kern_mount.part.0+0x6f/0x410 [ 1423.744874] do_mount+0x581/0x2d30 [ 1423.748447] ? copy_mount_string+0x40/0x40 [ 1423.752690] ? copy_mount_options+0x234/0x440 [ 1423.757192] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1423.762036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1423.767574] ? copy_mount_options+0x30e/0x440 [ 1423.772080] ksys_mount+0xdb/0x150 06:46:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:41 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f0000000380)={0x2, 0x3, 0x2, 0xfffffffffffffffb, r1}) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1423.775627] __x64_sys_mount+0xbe/0x150 [ 1423.779790] do_syscall_64+0x103/0x610 [ 1423.783691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1423.788886] RIP: 0033:0x45a89a [ 1423.792081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1423.810992] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1423.818703] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:42 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) splice(r0, &(0x7f0000000080), r2, &(0x7f0000000100), 0x5, 0x5) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)={0x15, 0x100000001}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1423.825973] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1423.833243] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1423.840515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1423.847793] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:42 executing program 2 (fault-call:0 fault-nth:68): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0xfffffffffffffffd, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1ff, 0x200001) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000000c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) ioctl$VIDIOC_S_FBUF(r2, 0x4030560b, &(0x7f0000000040)={0x2, 0x44, &(0x7f0000000180)="24337b8b67341fb9a8960be456ca654f41baef6f0910b60778eb91d46ba310ac38477c45a2a957aef5c0bd8bf3c6a43eebc466c8e5a18e9337e0cba658dc61b2aeb1ba98b63b5a741e046db9050ed1", {0x0, 0x200, 0x32314142, 0x6, 0xff, 0x0, 0x8, 0x800}}) 06:46:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffe2e, 0x0, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:42 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:42 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x7, 0x100000000, 0x2, 0x9, 0x0, 0x8, 0xfffffffffffffc01, 0xfffffffffffffff9, 0x8001, 0x2}) 06:46:42 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$inet_sctp(0x2, 0x1, 0x84) io_setup(0x10000, &(0x7f0000000040)=0x0) io_cancel(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x9, r2, &(0x7f0000000240)="0f4dc82a6a122aacc1c1a5764a1dacab9d866c9592409bf1dcc9e35c6cc90586648f1cad2df12cfa07d85fac4d56738dc4c0c4062a44e1fbeaa9493f3c315968c6868c2f7bdc3ce1ae8f51b6726cfadcd4d5a46709", 0x55, 0x6, 0x0, 0x1, r0}, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:42 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='commit=00000000,\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1424.051306] FAULT_INJECTION: forcing a failure. [ 1424.051306] name failslab, interval 1, probability 0, space 0, times 0 [ 1424.090809] CPU: 0 PID: 31969 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 06:46:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000001c0)=0x12, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netlink\x00') r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x109402, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x802, 0x0) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000900b0e610e715ed58525cd4eebda42ed9d6402720f34e0e9a08b53846577fbfe62359aa12bc294f82c930947abcef4f6111b36eb5b661390ce287e9166c56892bc7a043e62ef13c05b29a0efe59a582d4b67634501fac4e4d0542220e403c92301ab287c9c0d2dcd461b585cb0bd162154856"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1d) 06:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101100, 0x0) accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) write$binfmt_elf32(r0, 0x0, 0x0) [ 1424.098145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1424.107515] Call Trace: [ 1424.110148] dump_stack+0x172/0x1f0 [ 1424.113799] should_fail.cold+0xa/0x1b [ 1424.117711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1424.122923] ? lock_downgrade+0x810/0x810 [ 1424.127091] ? ___might_sleep+0x163/0x280 [ 1424.131267] __should_failslab+0x121/0x190 [ 1424.135524] should_failslab+0x9/0x14 [ 1424.139340] kmem_cache_alloc_trace+0x2d1/0x760 [ 1424.144139] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1424.149097] __list_lru_init+0x3d3/0x6e0 [ 1424.153188] sget_userns+0x81e/0xd30 [ 1424.157188] ? kill_litter_super+0x60/0x60 [ 1424.161718] ? ns_test_super+0x50/0x50 [ 1424.165621] ? ns_test_super+0x50/0x50 [ 1424.169525] ? kill_litter_super+0x60/0x60 [ 1424.173779] sget+0x10c/0x150 [ 1424.176904] mount_bdev+0xff/0x3c0 [ 1424.180458] ? xfs_test_remount_options+0x90/0x90 [ 1424.185323] xfs_fs_mount+0x35/0x40 [ 1424.188961] mount_fs+0x106/0x3ff [ 1424.192434] ? emergency_thaw_all+0x1a0/0x1a0 [ 1424.196936] ? __init_waitqueue_head+0x36/0x90 [ 1424.201537] vfs_kern_mount.part.0+0x6f/0x410 [ 1424.206040] do_mount+0x581/0x2d30 [ 1424.209607] ? copy_mount_options+0x41/0x440 [ 1424.214034] ? copy_mount_string+0x40/0x40 [ 1424.218281] ? kmem_cache_alloc_trace+0x354/0x760 [ 1424.223148] ? _copy_from_user+0xdd/0x150 [ 1424.227312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1424.232860] ? copy_mount_options+0x30e/0x440 [ 1424.237377] ksys_mount+0xdb/0x150 [ 1424.240941] __x64_sys_mount+0xbe/0x150 [ 1424.244927] do_syscall_64+0x103/0x610 06:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x9, 0x10000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x3, 'team0\x00', 0x1}, 0x18) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) futex(&(0x7f0000000200), 0x81, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)=0x2, 0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20000, 0x0) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f00000000c0)={0x98c, "26db837f78c2caf95051350c2ed57a26ef7cd4e80f1a3b0516c24c2e3483be42", 0x1, 0x2, 0x800000000000000, 0x0, 0xe, 0x3, 0x9, 0xb116}) write$binfmt_elf32(r0, 0x0, 0x0) [ 1424.248836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1424.254031] RIP: 0033:0x45a89a [ 1424.257265] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1424.276176] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1424.283906] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1424.291190] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1424.299634] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1424.306919] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1424.314201] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1424.364184] gfs2: commit mount option requires a positive numeric argument 06:46:42 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1424.418020] gfs2: can't parse mount arguments 06:46:42 executing program 2 (fault-call:0 fault-nth:69): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0xffffffffffffff32, 0x7, [0x400, 0x2198f4fc, 0x3, 0x200, 0x418, 0x1, 0x81]}, &(0x7f00000000c0)=0x16) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e20, 0x9, @loopback, 0x8}}, 0x0, 0x7}, &(0x7f0000000100)=0x90) fcntl$getflags(r1, 0x2000080000000004) fcntl$getown(r1, 0x9) 06:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/70) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:42 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000240)) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:42 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x7, 0x400) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x13) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1424.622608] gfs2: commit mount option requires a positive numeric argument [ 1424.629667] gfs2: can't parse mount arguments 06:46:42 executing program 0: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x40) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x80) 06:46:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x400) 06:46:42 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000040)={0x6, 0xfffffffffffffffe, 0x2}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1014, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) r4 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r3, r4, 0x7, &(0x7f0000000240)={0x19, 0x6, 0x8}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80000, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1424.740196] FAULT_INJECTION: forcing a failure. [ 1424.740196] name failslab, interval 1, probability 0, space 0, times 0 [ 1424.773577] CPU: 1 PID: 32012 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1424.780901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1424.790300] Call Trace: [ 1424.792913] dump_stack+0x172/0x1f0 [ 1424.796563] should_fail.cold+0xa/0x1b [ 1424.800467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1424.805582] ? lock_downgrade+0x810/0x810 [ 1424.809747] ? ___might_sleep+0x163/0x280 [ 1424.813907] __should_failslab+0x121/0x190 [ 1424.818154] should_failslab+0x9/0x14 [ 1424.821970] kmem_cache_alloc_trace+0x2d1/0x760 [ 1424.826673] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1424.826693] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1424.836709] __list_lru_init+0x3d3/0x6e0 [ 1424.840793] sget_userns+0x81e/0xd30 [ 1424.844518] ? kill_litter_super+0x60/0x60 [ 1424.848758] ? ns_test_super+0x50/0x50 [ 1424.852652] ? ns_test_super+0x50/0x50 [ 1424.856540] ? kill_litter_super+0x60/0x60 [ 1424.860780] sget+0x10c/0x150 [ 1424.863893] mount_bdev+0xff/0x3c0 [ 1424.867433] ? xfs_test_remount_options+0x90/0x90 [ 1424.872280] xfs_fs_mount+0x35/0x40 [ 1424.875913] mount_fs+0x106/0x3ff [ 1424.879375] ? emergency_thaw_all+0x1a0/0x1a0 [ 1424.883885] ? __init_waitqueue_head+0x36/0x90 [ 1424.888495] vfs_kern_mount.part.0+0x6f/0x410 [ 1424.893000] do_mount+0x581/0x2d30 [ 1424.896544] ? copy_mount_options+0x41/0x440 [ 1424.900957] ? copy_mount_string+0x40/0x40 [ 1424.905193] ? kmem_cache_alloc_trace+0x354/0x760 [ 1424.910045] ? _copy_from_user+0xdd/0x150 [ 1424.914211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1424.919747] ? copy_mount_options+0x30e/0x440 [ 1424.924251] ksys_mount+0xdb/0x150 [ 1424.927812] __x64_sys_mount+0xbe/0x150 [ 1424.931816] do_syscall_64+0x103/0x610 [ 1424.935725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1424.941013] RIP: 0033:0x45a89a [ 1424.944212] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1424.963126] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1424.970846] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1424.978124] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 06:46:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078303130309a27730158697cf1b47066448f372eb6dc000000000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) 06:46:43 executing program 0: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1424.985397] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1424.992664] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1424.999938] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1425.067976] gfs2: invalid mount option: commit=0x0100š'sXi|ñ´pfD7.¶Ü [ 1425.075655] gfs2: can't parse mount arguments 06:46:43 executing program 2 (fault-call:0 fault-nth:70): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:43 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x174, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:43 executing program 0: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/221, 0xdd) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@upgrade='upgrade'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:43 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1425.298277] FAULT_INJECTION: forcing a failure. [ 1425.298277] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.318541] CPU: 1 PID: 32047 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1425.325852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.325858] Call Trace: [ 1425.325886] dump_stack+0x172/0x1f0 [ 1425.325906] should_fail.cold+0xa/0x1b [ 1425.325924] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.325940] ? lock_downgrade+0x810/0x810 [ 1425.325957] ? ___might_sleep+0x163/0x280 [ 1425.345390] __should_failslab+0x121/0x190 [ 1425.345408] should_failslab+0x9/0x14 [ 1425.366772] kmem_cache_alloc_trace+0x2d1/0x760 [ 1425.371459] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1425.376582] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1425.381523] __list_lru_init+0x3d3/0x6e0 [ 1425.385597] sget_userns+0x81e/0xd30 [ 1425.385614] ? kill_litter_super+0x60/0x60 [ 1425.385633] ? ns_test_super+0x50/0x50 [ 1425.385646] ? ns_test_super+0x50/0x50 [ 1425.385662] ? kill_litter_super+0x60/0x60 [ 1425.405567] sget+0x10c/0x150 [ 1425.405589] mount_bdev+0xff/0x3c0 [ 1425.405603] ? xfs_test_remount_options+0x90/0x90 [ 1425.405618] xfs_fs_mount+0x35/0x40 [ 1425.417078] mount_fs+0x106/0x3ff [ 1425.417099] ? emergency_thaw_all+0x1a0/0x1a0 [ 1425.417118] ? __init_waitqueue_head+0x36/0x90 [ 1425.417139] vfs_kern_mount.part.0+0x6f/0x410 [ 1425.433247] do_mount+0x581/0x2d30 [ 1425.433265] ? copy_mount_options+0x41/0x440 06:46:43 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40240, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000080)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000611558000000000095000000000000000000000000eb288d0300000000000700eb01730e050a2e1f2d9136659514cc0514aaf38cbef3d8a14e743fe9481688f532fd30294d138799fa157fbbd30400000000000000ab18612f168f9343ff34a95008548744b1c564b1d96f5b7624e99101aaf6c43d73430c52de3031b07413cc168b22689bb59f4cb937b9d9164a53d71609d14a5bef0bf8559fa5176262b13dee1d3ce38b33ecf0e33052345245d5cfbbcd6342b22081875bfe7b30fbae8dd530c56754313328a49cb38f022322df76d83d03281762811df2bc4349b863edafdd880ceae26bb084e015681f3db90000000000000084395a"], &(0x7f0000000100)='GPL\x00'}, 0x48) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xfffffffffffffffe}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={r2, 0xfffffffffffffff7}, 0x8) ioctl$NBD_DISCONNECT(r0, 0xab08) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="3a36a6b5d3f78fc61ecaa8545a78978d0a2a0b7bafd7533b5e009ed8a75b88e9fd00cb87da9cf2adedb6c6f28fb428149d3b0b7cb95b3a355d8166fda1aec947c46ad5374f9c831a0204bdec6636c1b3a9109b28ff214f9890ecffaf5f6b1ceb3281a4e108", 0x65}, {&(0x7f0000000500)="68fda82590a0cf7336b37bb621c336001bb3a0af00c1e650a8111d957f6eb3eaa997b7a1eed13ee98a4e5ec1ce66336c1e067180254ed14b2acb2e87854fba24d5be9ee1eb5c3fd008741b6f09a36d8e2be66bf97ce1df2c42df7156c9b794a7d0947899bb3a506acdef2bd53886c70f1992cc8c90df7f78bc110d1ea5d49f3b62d7f522c31786c6e240ef89a9892292cdea602e51838387e29bb30233c9b241ed5e36439d97390fa93a6a4f06db4c170bcf8f0c0534e8f2032f139c7d5acef679d244aa2baf186c2a7f", 0xca}, {&(0x7f0000000600)="4d7c6cd1aaced1734ed69c886efb0db491cfa634298930ccd4d1e0338286d515bfc72c8c7f5b074f9d10513bbd1d321143648bea3caa5e0e728d3a68df75f25086c358df84e0f5037fef14ac0f0e1e74a7b7c150b8d7e2c396d416aded08fbc6b11f28fd75ad43c4566cf488d608957aa87c7dbff51c7a5170aac1572221cd2d9cb11cd512adbc1dcfe773bdf8574bc13df5b363fba1395dbe94ffadc93b70d1f9b24234a6c53d000f6b8493728bdf653aa9e9ef906a0a90b9f6e2f9da03c962ef8c022911", 0xc5}], 0x3, 0x0, 0x0, 0x24000000}, 0x1) 06:46:43 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000040)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:43 executing program 3: r0 = gettid() r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x414200, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x9, 0x80, 0x9, 0x2de81800, 0x0, 0x4a3e, 0x4001, 0x8, 0x100, 0x1, 0x8, 0x4260, 0x1a6, 0x0, 0x0, 0xfe, 0xfffffffffffffffa, 0x8869, 0x9, 0x8, 0x0, 0x7db9, 0x6, 0x8, 0x2, 0x100000001, 0x8, 0x7, 0x8, 0x10001, 0xa0, 0x1, 0x3, 0x100, 0x4, 0x80000000, 0x0, 0x1911, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x1900, 0x1000000000000000, 0x80000000, 0x6, 0xfffffffffffff8e1, 0x5, 0x1}, r0, 0xa, r1, 0x3) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r2, 0x0, 0x0) [ 1425.433286] ? copy_mount_string+0x40/0x40 [ 1425.433302] ? kmem_cache_alloc_trace+0x354/0x760 [ 1425.433322] ? _copy_from_user+0xdd/0x150 [ 1425.433346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1425.433361] ? copy_mount_options+0x30e/0x440 [ 1425.445805] ksys_mount+0xdb/0x150 [ 1425.445826] __x64_sys_mount+0xbe/0x150 [ 1425.445845] do_syscall_64+0x103/0x610 [ 1425.465100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.465113] RIP: 0033:0x45a89a [ 1425.465128] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1425.465137] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1425.465149] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1425.465160] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1425.481006] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1425.481014] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:46:43 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x30, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:43 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1425.481023] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1425.525908] gfs2: not a GFS2 filesystem 06:46:43 executing program 2 (fault-call:0 fault-nth:71): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x480001, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000240)={'nat\x00', 0x0, 0x3, 0xa0, [], 0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/160}, &(0x7f0000000100)=0x78) 06:46:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x200) 06:46:43 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) io_setup(0x8, &(0x7f0000000040)=0x0) io_pgetevents(r2, 0x5, 0x3, &(0x7f0000000240)=[{}, {}, {}], &(0x7f0000000080), &(0x7f00000001c0)={&(0x7f0000000100)={0x8}, 0x8}) 06:46:43 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1425.688616] gfs2: not a GFS2 filesystem 06:46:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='co00000000,\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x48c00, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x1c, r2, 0x119, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="3b3367508f4334b00fa5776faa2b938c4fb78bc879afdd1442b7b679908dde98808224589749cb212cba611479860a160524fe07b6ca410d69bfa47ce56e5cdd42fc042979c3661a1a7d383d5cec421e2638ae780ff83e106604aaa2fa440f3d11ca5ebadf85e45bdaec47b40e3ff8f5d2f1345a4598a6c8ef60119059620420ae276288181c1362c1c7") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000280)="fec649a420da483a0c16d9385acda485e5f734d4b580e72b1a7c4639", 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) bind$can_raw(r3, &(0x7f0000000480)={0x1d, r4}, 0x10) [ 1425.776789] FAULT_INJECTION: forcing a failure. [ 1425.776789] name failslab, interval 1, probability 0, space 0, times 0 06:46:44 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1425.819689] CPU: 0 PID: 32078 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1425.827015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1425.836368] Call Trace: [ 1425.838975] dump_stack+0x172/0x1f0 [ 1425.842625] should_fail.cold+0xa/0x1b [ 1425.846523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1425.851645] ? lock_downgrade+0x810/0x810 [ 1425.855808] ? ___might_sleep+0x163/0x280 [ 1425.859969] __should_failslab+0x121/0x190 [ 1425.864220] should_failslab+0x9/0x14 06:46:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x2, 0x6, 0x0, 0x9}]}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1425.868037] kmem_cache_alloc_trace+0x2d1/0x760 [ 1425.872726] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1425.877940] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1425.882886] __list_lru_init+0x3d3/0x6e0 [ 1425.886959] sget_userns+0x81e/0xd30 [ 1425.890681] ? kill_litter_super+0x60/0x60 [ 1425.894925] ? ns_test_super+0x50/0x50 [ 1425.898825] ? ns_test_super+0x50/0x50 [ 1425.902717] ? kill_litter_super+0x60/0x60 [ 1425.906959] sget+0x10c/0x150 [ 1425.910076] mount_bdev+0xff/0x3c0 [ 1425.913713] ? xfs_test_remount_options+0x90/0x90 06:46:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpgrp(0x0) r2 = dup(r0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000180)={"2a19c5246bfeade2d1882f0c0a7b3381ccda86af03c21566bd0cda630003235c42cff58f25ca38e8756e831070c2e13cfabfde98679e13baee64be9d7c7e01555e70a264458f4025da3cd9651768555cb21887c70e7f789f60f1719e2276204c93dcd97240fbc99699384a6f4a9ae5da2396766aa5b958fb76f77d724282ae3bb7b497710e0e4e41d5aabf0da02aafd36fe1d0f1dfec0f56118d27ffb4e630dc21f62b0be84d8332176f589fdcdc0785743d716f7bffd7c426d08b4cde561886228e2c7e1c77481c5ce2ecc2ca876e83eb536125de9c446d8d753d4298dda4548b0df05f76cbdee1b45e65d74a49fee5f723077e99e4ed2aeb166a1d6750d850a6b9fdd1d2fedbfc467fb777fa1867da404f725d6e3720d99d329ca992149238a5cbe23c7944d07f256288c0d15ce1665847f96e528be45366aeace0fdb2e10875a938ee90a5af7abe9807b9e18bbb1220bd2a81e929eb1a1222f0e8a4105e274de672cc60b44767ff7181ca012796ce73f565f28e535e8b5e8cda25dec99d4c6cf9c01ecafcac1b80b6b56873ea17e36d4a00746eff43c4de3ab2bcde6a6a3c7bd1b5a5818fbb96bd1ff6a73c079f08ec324899d255d406fe570bf8923f997cf6ec1a64eb5d2f8e397696bca559d14bf72a53d7eb3a81a518e924a4d5216bb5051591973e9a2dfaf4ce4f28ab720defe56ec41937d1c573b1e79e66a94fce08ec0d4fa58a49e947086201289e2f6cd49b6cfa571a281019c72e0105d9682a82e2988989bce58fc1615fe44f336a5a665bfbdb2d57cf701993421677337b219d1e479ca9ab6ed1844dd9ea692bfea10f3ecccc58b54a3478b8a50640883c48e62ce5e29580970cbda3412ffb63d8912a02d495758f751b0574dad482cd2483d99d69848abcc73cd3f9e19d4ae7bf05980b4b9127bdddb79a7f3f5431e7753f755310af4504af241e01b79fc92533c61c540299c324f92f1c882ebe181d5c5332e5c6a489959cec6d3f49c656937719bd126c57bf1d4458a585b7e8d93f539588ff8e9c62e6397c574fd8f7c5ce85f5db96d50771834ef13e881bce040edb4e2ee51079ac66bb04dce309877a42b1d542465d7ccba4620e101794aee07fb7b58e62c7ea17ce63446cfcb3f0cc8d48eb15d543bd682600531c379fa27c2dd8bee6744c5b52f936b02478f81961c0316019c126c6368e9899bc9ab7f751b9044e47c83c9d9f5791467af7701d0159ef1788359e4350cda171a9ef40ebc110f61137f5e4110fba5ff54067fd9aa6dfae8bdc2197d8d716a11aa281a6c19afcc8c87a42433a22cc6c57763386f835bda3885f327e92996fefca3640f19f44da835b1403c6cff9786b612f8d0af9bf3fb42bc7274ab833ddf3274af9196ea42030c386b7d38b21bcca5fd85b3b1f5cc3563702d3ff020b612afe5a910295d52f38c170"}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, r1, 0x0, r2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1425.918564] xfs_fs_mount+0x35/0x40 [ 1425.922199] mount_fs+0x106/0x3ff [ 1425.925659] ? emergency_thaw_all+0x1a0/0x1a0 [ 1425.930167] ? __init_waitqueue_head+0x36/0x90 [ 1425.934763] vfs_kern_mount.part.0+0x6f/0x410 [ 1425.939274] do_mount+0x581/0x2d30 [ 1425.942819] ? copy_mount_options+0x41/0x440 [ 1425.947236] ? copy_mount_string+0x40/0x40 [ 1425.951497] ? kmem_cache_alloc_trace+0x354/0x760 [ 1425.956358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1425.961904] ? copy_mount_options+0x30e/0x440 [ 1425.961926] ksys_mount+0xdb/0x150 06:46:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000000)=0x20) [ 1425.961946] __x64_sys_mount+0xbe/0x150 [ 1425.961965] do_syscall_64+0x103/0x610 [ 1425.961986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1425.961996] RIP: 0033:0x45a89a [ 1425.962019] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1425.962026] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1425.962040] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180)=0x0) setresgid(r1, r2, r3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1425.962048] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1425.962056] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1425.962063] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1425.962070] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1426.071194] gfs2: invalid mount option: co00000000 [ 1426.076174] gfs2: can't parse mount arguments 06:46:44 executing program 2 (fault-call:0 fault-nth:72): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:44 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x4}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x10000000000018, 0x0, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:44 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1426.296742] gfs2: commit mount option requires a positive numeric argument 06:46:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x4, 0x255) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000240)=""/235) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000180)) write$binfmt_elf32(r0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000200)={0xfd0, 0x3}) unshare(0x40000) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f00000001c0)=0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x20400, 0x0) ioctl$CAPI_NCCI_GETUNIT(r3, 0x80044327, &(0x7f0000000040)=0x6) 06:46:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1000000080400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1426.337101] gfs2: can't parse mount arguments [ 1426.347716] FAULT_INJECTION: forcing a failure. [ 1426.347716] name failslab, interval 1, probability 0, space 0, times 0 [ 1426.394531] CPU: 0 PID: 32126 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1426.401862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1426.411225] Call Trace: [ 1426.413837] dump_stack+0x172/0x1f0 [ 1426.417482] should_fail.cold+0xa/0x1b [ 1426.421378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1426.426489] ? lock_downgrade+0x810/0x810 [ 1426.430640] ? ___might_sleep+0x163/0x280 [ 1426.434797] __should_failslab+0x121/0x190 [ 1426.439040] should_failslab+0x9/0x14 [ 1426.442853] kmem_cache_alloc_trace+0x2d1/0x760 [ 1426.447545] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1426.452658] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1426.457599] __list_lru_init+0x3d3/0x6e0 [ 1426.461678] sget_userns+0x84d/0xd30 [ 1426.465396] ? kill_litter_super+0x60/0x60 [ 1426.469638] ? ns_test_super+0x50/0x50 [ 1426.473532] ? ns_test_super+0x50/0x50 [ 1426.477424] ? kill_litter_super+0x60/0x60 [ 1426.481660] sget+0x10c/0x150 [ 1426.484771] mount_bdev+0xff/0x3c0 [ 1426.488314] ? xfs_test_remount_options+0x90/0x90 [ 1426.493166] xfs_fs_mount+0x35/0x40 [ 1426.496799] mount_fs+0x106/0x3ff [ 1426.500264] ? emergency_thaw_all+0x1a0/0x1a0 [ 1426.504767] ? __init_waitqueue_head+0x36/0x90 [ 1426.509359] vfs_kern_mount.part.0+0x6f/0x410 [ 1426.513864] do_mount+0x581/0x2d30 [ 1426.517411] ? copy_mount_options+0x41/0x440 [ 1426.521827] ? copy_mount_string+0x40/0x40 [ 1426.526070] ? kmem_cache_alloc_trace+0x354/0x760 [ 1426.530927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1426.536474] ? copy_mount_options+0x30e/0x440 [ 1426.540984] ksys_mount+0xdb/0x150 [ 1426.544534] __x64_sys_mount+0xbe/0x150 [ 1426.548521] do_syscall_64+0x103/0x610 [ 1426.552416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1426.557604] RIP: 0033:0x45a89a [ 1426.560806] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1426.579709] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1426.587424] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:44 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:44 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x51, 0xfffffffffffffffa, 0x91, &(0x7f0000000240)="7fe09abb32665175cc54d4c463bd73acb68e2208fde2ec184dad8857cde6211e993339bcbd25a5d7d12bcc8c1f8b327db565e337391ee728df2ed1fa75ddb17279ac32f923abce7f91323da8ee19b7c632d605a7754bc52d08a14b8333a4833365ee06a470b850cf25af8ad6b65685a6e72567c6e3c87a2801bbfccd49bc197db93744a85b84507120f2e10385f6c2b18b"}) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1426.594694] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1426.601970] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1426.609247] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1426.616519] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x41, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) r2 = dup(r1) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000040)={0x0, @bt={0x1, 0x6, 0x1, 0x1, 0x7fffffff, 0x7, 0x291d, 0x8000, 0xffff, 0x1, 0x8, 0x5, 0x1, 0x8001, 0x16, 0x4}}) 06:46:44 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000100)=""/100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x7, &(0x7f0000000640)=[{&(0x7f0000000280)="b90c23dd70042cbb569cfa111be85d60d5d024266f7852daa89604c676d92c0c38b32e6d5dce07c80808896395c8fd18756d2f2cd99b07195a020a0ca78db45e4d1d95ac8cd0b99e15fcf4d30a14ad02184bbf6ed869d16f0a917847c482f526f752e32c3b3b7bfb86936c2514fe565a3dc5337d27beaa08bdb763ac5c21b3d09941bcdf2ac3984920d558d32ef2bbf64432", 0x92, 0x9}, {&(0x7f00000001c0)="8fa117596da8c828e746cee9bd121babbfe3dbc2c458e2077cfac7503ef174521083633fc966f1e10c8c98bcf9f31f3c5bfa9bd77b2c262aa173513fe22201c3ae60d6", 0x43, 0x4}, {&(0x7f0000000340)="e28b08f6cdb8353926e40137a345a2e065865f1ad175eaabb23ac5ce1b9adb8f0f9ee9e60c6b6f49d8afd55e45bedd1942322546267930d81e73fafe8415713a418340ce7e2ae1a370b2ce5a658c51299b7ee9297b2248c9", 0x58, 0x5699}, {&(0x7f00000003c0)="477171d9bfe965d7064ea1900707bd527a41841c7a8a0abd1d4a331f61224edb54723b22d6ef476f57f6366547a018460d3b23b10c226354254916bc245e70ee07f054a2bde0cd4986fe098becb109c265fd1f46d89bae243c2e058e38c594ccef1c37394a63cd53", 0x68, 0xa98}, {&(0x7f0000000440)="f7cdbd3bfc27a492e750e3c5d9bc4f72443f2951e82eab3a3f4b8f141299440e45bae5bbdb2bc1145132355c70ce05c08aa386b81a8cf0dc0c43cde71ab9bfd2716fbbd91825825909c4c717fa9c4871abc41968478a013a16aa5e449f4d535ec7244d6177db917df4ad15565f52c2b5bf6fca30404ea979710bbc970d50b29a7c494dbbe3b292f865912f8a97edd754e071a1545c6c6bddec86f5c23490f880a756cb0e887069bf5ac56e770bea0ed0dd7f2d9672671ef21a5845d19ba0b6fd093fe94dc8737b90aa65d3a56f1f0e1643ad14a1eb606c9ab646e8", 0xdb, 0x100000000}, {&(0x7f0000000540)="6e81a8d41c9e387982c3607bfa141ae3af5c27547ac4fc112e663cfaadaf810fe6c379e9c4558c3a0f4f9e416f63f2d13a5381e2571bce0b8383c50d29a8eb86739bff447bfc2abad7abe364e49e8d13ae97210546a2b569fa358848502bbae025c35418c3", 0x65, 0xd0ad}, {&(0x7f00000005c0)="9d71078ad5038c1855eb109a812e285832ae7be247a2431b3d936d8fb9c2bf25dca302bc1e67fe5538825386641f451be868e98502c9ed479f041e6bd0b67032bd1a56d89a46f6b6eab1bf4d3f8b23db1a2a8806b87b9593ac1b9c64f0f12f7ae3e6b5289c7307a09d52108801b69da19071eb33645599c911691ee0dfac", 0x7e, 0x200}], 0x10000, &(0x7f0000000780)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@session={'session', 0x3d, 0x5e}}, {@norock='norock'}, {@session={'session', 0x3d, 0x4b}}, {@nojoliet='nojoliet'}, {@session={'session', 0x3d, 0x31}}], [{@subj_user={'subj_user', 0x3d, 'commit'}}, {@obj_type={'obj_type', 0x3d, 'nodev'}}, {@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, 'trustedppp0}[ppp0'}}, {@euid_eq={'euid', 0x3d, r3}}, {@permit_directio='permit_directio'}, {@pcr={'pcr', 0x3d, 0x3b}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:46:44 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x48440, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) 06:46:44 executing program 2 (fault-call:0 fault-nth:73): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:44 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) bind$rose(r0, &(0x7f0000000040)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @bcast}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:44 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1426.778276] gfs2: commit mount option requires a positive numeric argument 06:46:45 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) fsetxattr$security_selinux(r1, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000180)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x1d) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000100)) 06:46:45 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1426.835989] FAULT_INJECTION: forcing a failure. [ 1426.835989] name failslab, interval 1, probability 0, space 0, times 0 [ 1426.847177] gfs2: can't parse mount arguments 06:46:45 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") close(r0) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000040)={{0x8001, 0x101}, {0x80000001, 0x8}, 0xada1, 0x6, 0x7fff}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) socketpair(0x1, 0x7, 0x7f, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 1426.880473] CPU: 0 PID: 32158 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1426.887791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1426.897149] Call Trace: [ 1426.899753] dump_stack+0x172/0x1f0 [ 1426.903399] should_fail.cold+0xa/0x1b [ 1426.907305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1426.912427] ? lock_downgrade+0x810/0x810 [ 1426.916590] ? ___might_sleep+0x163/0x280 [ 1426.920751] __should_failslab+0x121/0x190 [ 1426.924995] should_failslab+0x9/0x14 06:46:45 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1426.928812] kmem_cache_alloc_trace+0x2d1/0x760 [ 1426.933510] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1426.938454] __list_lru_init+0x3d3/0x6e0 [ 1426.942551] sget_userns+0x81e/0xd30 [ 1426.946272] ? kill_litter_super+0x60/0x60 [ 1426.950511] ? ns_test_super+0x50/0x50 [ 1426.954405] ? ns_test_super+0x50/0x50 [ 1426.958303] ? kill_litter_super+0x60/0x60 [ 1426.962547] sget+0x10c/0x150 [ 1426.962566] mount_bdev+0xff/0x3c0 [ 1426.962581] ? xfs_test_remount_options+0x90/0x90 [ 1426.962599] xfs_fs_mount+0x35/0x40 [ 1426.962615] mount_fs+0x106/0x3ff [ 1426.962633] ? emergency_thaw_all+0x1a0/0x1a0 [ 1426.962649] ? __init_waitqueue_head+0x36/0x90 [ 1426.962670] vfs_kern_mount.part.0+0x6f/0x410 [ 1426.962687] do_mount+0x581/0x2d30 [ 1426.969315] ? copy_mount_options+0x41/0x440 [ 1426.969335] ? copy_mount_string+0x40/0x40 [ 1427.006901] ? kmem_cache_alloc_trace+0x354/0x760 [ 1427.011769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.017311] ? copy_mount_options+0x30e/0x440 [ 1427.021817] ksys_mount+0xdb/0x150 [ 1427.025371] __x64_sys_mount+0xbe/0x150 [ 1427.029361] do_syscall_64+0x103/0x610 [ 1427.033264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.038456] RIP: 0033:0x45a89a [ 1427.041656] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1427.060561] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1427.068278] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1427.075551] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1427.082825] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1427.090098] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1427.097378] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000200)) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x7530}}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x6, 0x2, 0x2f, 0x0, 0x7, r3}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x1a) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) 06:46:45 executing program 2 (fault-call:0 fault-nth:74): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='0000000100000000,\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:45 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1e, &(0x7f0000000080)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000240)={0x2, 0x0, 0x2080, {0x1002, 0x7000, 0x3}, [], "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", "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"}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x400082, 0x0) 06:46:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @loopback, 0x4e22, 0x2, 'ovf\x00', 0xc, 0x7, 0x4}, {@broadcast, 0x4e20, 0x3, 0x7, 0x81, 0xfffffffffffffffe}}, 0x44) r2 = socket$inet(0x2, 0x80000, 0x200) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000000)=0xfffffffffffffff9, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:45 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, 0x0, 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1427.327039] FAULT_INJECTION: forcing a failure. [ 1427.327039] name failslab, interval 1, probability 0, space 0, times 0 [ 1427.375317] CPU: 0 PID: 32187 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1427.382640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1427.392206] Call Trace: [ 1427.394815] dump_stack+0x172/0x1f0 [ 1427.398458] should_fail.cold+0xa/0x1b [ 1427.402362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1427.407479] ? lock_downgrade+0x810/0x810 [ 1427.411639] ? ___might_sleep+0x163/0x280 [ 1427.415797] __should_failslab+0x121/0x190 [ 1427.420049] should_failslab+0x9/0x14 [ 1427.423861] kmem_cache_alloc_trace+0x2d1/0x760 [ 1427.428571] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1427.433670] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1427.438588] __list_lru_init+0x3d3/0x6e0 [ 1427.442649] sget_userns+0x81e/0xd30 [ 1427.446352] ? kill_litter_super+0x60/0x60 [ 1427.450572] ? ns_test_super+0x50/0x50 [ 1427.454455] ? ns_test_super+0x50/0x50 [ 1427.458331] ? kill_litter_super+0x60/0x60 [ 1427.462853] sget+0x10c/0x150 [ 1427.465949] mount_bdev+0xff/0x3c0 [ 1427.469476] ? xfs_test_remount_options+0x90/0x90 [ 1427.474309] xfs_fs_mount+0x35/0x40 [ 1427.477929] mount_fs+0x106/0x3ff [ 1427.481370] ? emergency_thaw_all+0x1a0/0x1a0 [ 1427.485854] ? __init_waitqueue_head+0x36/0x90 [ 1427.490429] vfs_kern_mount.part.0+0x6f/0x410 [ 1427.495029] do_mount+0x581/0x2d30 [ 1427.498567] ? copy_mount_string+0x40/0x40 [ 1427.502799] ? copy_mount_options+0x1de/0x440 [ 1427.507285] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1427.512375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1427.517907] ? copy_mount_options+0x30e/0x440 [ 1427.522391] ksys_mount+0xdb/0x150 [ 1427.525924] __x64_sys_mount+0xbe/0x150 [ 1427.529888] do_syscall_64+0x103/0x610 [ 1427.533773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.538947] RIP: 0033:0x45a89a [ 1427.542130] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1427.561019] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1427.568711] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfda2) r2 = dup3(r1, r0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2b, &(0x7f0000000000), 0x4) r3 = msgget(0x2, 0x80) r4 = geteuid() fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x1, r4, r5, r6, r7, 0x4, 0x6}, 0xffffffff, 0x80000000, 0x4, 0xcb, 0x27d, 0x0, r8, 0xffffffffffffffff}) 06:46:45 executing program 1: socket$inet6(0xa, 0x40000000002, 0x0) pipe(&(0x7f0000000180)) mremap(&(0x7f000000c000/0x1000)=nil, 0x7fffdfff9000, 0x1000, 0x3, &(0x7f0000006000/0x1000)=nil) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1427.575969] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1427.583229] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1427.590485] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1427.597740] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x111380, 0x0) bind$vsock_dgram(r1, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 06:46:45 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, 0x0, 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:45 executing program 2 (fault-call:0 fault-nth:75): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1427.662654] gfs2: invalid mount option: 0000000100000000 [ 1427.670892] gfs2: can't parse mount arguments 06:46:45 executing program 1: socket$inet6(0xa, 0x5, 0x0) alarm(0xf10) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x9c2d9101a125b09d, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000240)={0x81, 0x29, 0x1, {0x0, [{{0x8, 0x3, 0x4}, 0x2, 0x2, 0x7, './file0'}, {{0x8, 0x3, 0x3}, 0x8, 0xa8d3, 0x7, './file0'}, {{0x0, 0x4, 0x1}, 0x3, 0x5, 0x7, './file0'}, {{0x46, 0x3, 0x5}, 0x3, 0x6, 0x1, '.'}]}}, 0x81) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000001c0)={0x118}, 0x4) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) bind$rxrpc(r1, &(0x7f0000000100)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x92}}, 0x24) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @timestamp, @window={0x3, 0x8, 0x3f01f34c}, @timestamp, @window={0x3, 0xdc2, 0xfffffffffffffff8}, @mss={0x2, 0x8}], 0x6) 06:46:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=""/4096, &(0x7f00000000c0)=""/60}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) finit_module(r0, &(0x7f0000000000)='posix_acl_accessmime_type{{loproceth0\\\x00', 0x1) 06:46:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80080, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xa) 06:46:45 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, 0x0, 0x80002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1427.772148] FAULT_INJECTION: forcing a failure. [ 1427.772148] name failslab, interval 1, probability 0, space 0, times 0 06:46:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20200, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080)=0x1, &(0x7f00000000c0)=0x4) [ 1427.837895] gfs2: commit mount option requires a positive numeric argument 06:46:46 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) r3 = getuid() ioctl$TUNSETOWNER(r1, 0x400454cc, r3) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) [ 1427.880789] gfs2: can't parse mount arguments 06:46:46 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000480)=""/36, &(0x7f00000004c0)=0x24) r1 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x80000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x20000002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) getsockopt$inet_udp_int(r3, 0x11, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x1009}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000500)) getsockopt$packet_buf(r2, 0x107, 0x7, &(0x7f00000003c0)=""/185, &(0x7f00000001c0)=0xb9) r5 = getpgid(0x0) getpriority(0x1, r5) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0xe1, 0xfa00, {{0x2, 0x101, "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", 0x4a, 0x747abcaf, 0x2, 0x2, 0x4, 0x3, 0x400, 0x1}, r4}}, 0x120) 06:46:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x9, &(0x7f0000001580)=[{&(0x7f0000000180)="a7dda90b59d5b21ecc4be7ded2ac013d6079af0d29385aca22165f0d5481df41bada9e2fa3f10125c497830e77c8da5e1ae808102acf7c6cad4c7ea25102e16c0b0444a5d510a68721b7b04fe36df250742cb3246a2ac81a5eb3fb3c46c3af18da29a3fbd265203af93ff6be8ea50b202247ca49f05b08e06090c53ace401f9b3c7448fc82c35bff093eeecbd29964d79e775b2cc124d6f52fa4a4e282af7d7c889c3e16742f713c835d67569bd5755562862138ec57574673296dc219c26da18dc9d3", 0xc3, 0x27b4}, {&(0x7f0000000280)="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", 0x1000, 0x9}, {&(0x7f0000001280)="6d0b26f6163d59bfd6313a5ffaf89aefefcc3b3e382574c6e836dc57f2ab091f5bb0ae9e43d1c0bbf1a0baf1aa4fb254ec166d8c4c965ee3bbe555a10a260b492d8fa4925ea96a84bf335764343c1d5041b8e55eaaa7130ef79b1524ef6b456c3968e37240d8854daadab0333c44a5d43e174a0b2117ae483e11a486eaba1481960db56c43ad3e1184f35d2fc067efc7eb7533d1286ffb943db1c5febe14517ad2e000341a1e82a06661a3a76e36f8b105ca010da89173f4b8b8", 0xba, 0x7fff}, {&(0x7f00000000c0)="de4c29a0c660928dff5ab36ead88cfab85572a3c650e40610dbe63a54d2308396fa7304983cc2e384e60509b5b1a4e89aee8c3332168dc1d8e290fd3c538358e15bf7eff34c915611030653182fd9231a93e200eb7a9b5331340747a436733dcf7ba9ec175e4", 0x66, 0x6}, {&(0x7f0000001340)="2173c4c4cdeaec65802f8bfbc8c2db1d31fefbb8f87273fb35352276b40a9a8c0ea83ece93edc4a3f946f7d6f975430c51d205b8d3c2a59218e41c52169bd787fb465c2fea914b475d7d510a12b5550995d6a1972bb6be033d654972c676519e3827", 0x62, 0x38e}, {&(0x7f00000013c0)="88bc276450b3381ac7fa2a0ee6035c0e48c5eee134466383e4f50948aeef28da4e021cbca84bb8c0d2a4add7929814a457b594a87df24e0de5b8e5866a8105edefa3bc4085afb12fb52883fde0745c", 0x4f, 0x3f}, {&(0x7f0000001440)="5bb3ea85da4bea9045acbe1e9b1b70f79607d4a0740429e1c3030c10918f96fb478ae7112c58e0512b6cef72746aab12ea2906326fa393adfb3f3c945963791ec7d3545ddecfd17543142be7a4ba0c1d0c6ecf745489a824819cf7645b1d8ffc1186ad0c96ce48b2f065c40897359e540bedad9ad434a6f1ce946433d88d113dde48888dc9f53b0ffd1fba3337a9e5a000aa4d3ce7186efb5ac50a42200363ed2e899a7ae992", 0xa6, 0x3fff80000}, {&(0x7f0000001500)="8b2e522669a7", 0x6, 0x2}, {&(0x7f0000001540)="11e2c1da0821aafc284b798e31274a17b9a45b6942b4225f22641ef3d65ad3f257d9d880edece9361fff5e6b362ab6325e92ba24c9", 0x35, 0x4}], 0x0, &(0x7f0000001680)={[{@grpid='grpid'}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3f}}, {@i_version='i_version'}, {@nodelalloc='nodelalloc'}, {@nomblk_io_submit='nomblk_io_submit'}, {@nobh='nobh'}], [{@obj_role={'obj_role', 0x3d, '/dev/ptmx\x00'}}]}) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000001700)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000001740)=0x12) accept(r2, &(0x7f0000001780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000001800)=0x80) 06:46:46 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) socketpair(0x7, 0x5, 0x80000001, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x16, 0x4) write$binfmt_elf32(r0, 0x0, 0x0) r2 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="527fb37e19acdd90af47bb39d991ea9f947f1a4132b8f088e4ffa7e21f64ed431a1449fa5d3ae91887d385d07d97f5a9238f8e69e609f6289f33db6e8e6dbb9decad581dc9adfac88cfa09c4c9a100c73fbd9a2ad05e434ad5449058e898692d11456f72288ff6d004242ec5801a99ee6e86c1", 0x73, 0x0) keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f0000000240)='\x9bvmnet0cgroupbdev+systemvmnet0]eth1\x00') 06:46:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x42200, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000140)=0x3) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636ff900c9b73d303130303030303030302c00"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1428.096527] gfs2: invalid mount option: coù [ 1428.115391] gfs2: can't parse mount arguments [ 1428.120259] CPU: 0 PID: 32217 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1428.127549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.127556] Call Trace: [ 1428.127582] dump_stack+0x172/0x1f0 [ 1428.127603] should_fail.cold+0xa/0x1b [ 1428.127622] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1428.127639] ? lock_downgrade+0x810/0x810 [ 1428.127657] ? ___might_sleep+0x163/0x280 [ 1428.127674] __should_failslab+0x121/0x190 [ 1428.127690] should_failslab+0x9/0x14 [ 1428.127703] kmem_cache_alloc_node_trace+0x270/0x720 [ 1428.127725] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1428.127747] __kmalloc_node+0x3d/0x70 [ 1428.143310] kvmalloc_node+0x68/0x100 [ 1428.143330] __list_lru_init+0x4aa/0x6e0 [ 1428.143350] sget_userns+0x84d/0xd30 [ 1428.143364] ? kill_litter_super+0x60/0x60 [ 1428.143385] ? ns_test_super+0x50/0x50 [ 1428.143398] ? ns_test_super+0x50/0x50 [ 1428.143410] ? kill_litter_super+0x60/0x60 [ 1428.143422] sget+0x10c/0x150 [ 1428.143438] mount_bdev+0xff/0x3c0 [ 1428.143452] ? xfs_test_remount_options+0x90/0x90 [ 1428.143467] xfs_fs_mount+0x35/0x40 [ 1428.225836] mount_fs+0x106/0x3ff [ 1428.229305] ? emergency_thaw_all+0x1a0/0x1a0 [ 1428.233804] ? __init_waitqueue_head+0x36/0x90 [ 1428.238401] vfs_kern_mount.part.0+0x6f/0x410 [ 1428.242911] do_mount+0x581/0x2d30 [ 1428.246463] ? copy_mount_options+0x41/0x440 [ 1428.250887] ? copy_mount_string+0x40/0x40 [ 1428.255129] ? kmem_cache_alloc_trace+0x354/0x760 [ 1428.259992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.265544] ? copy_mount_options+0x30e/0x440 [ 1428.270055] ksys_mount+0xdb/0x150 [ 1428.273600] __x64_sys_mount+0xbe/0x150 [ 1428.277581] do_syscall_64+0x103/0x610 [ 1428.281477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.286668] RIP: 0033:0x45a89a [ 1428.289872] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1428.309303] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1428.317016] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1428.324283] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1428.331553] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1428.338818] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1428.346101] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1428.379337] gfs2: invalid mount option: coù [ 1428.384343] gfs2: can't parse mount arguments 06:46:46 executing program 2 (fault-call:0 fault-nth:76): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:46 executing program 1: socket$inet6(0xa, 0x5, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000001c0)=0xb) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20040, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000340)=""/94) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000100)=""/59) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:46 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfffffed1) 06:46:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000100), &(0x7f0000000040)=0x6e) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69743d3078301c30303030303130302c00000000000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1d) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x80) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f00000000c0)) syncfs(r1) 06:46:46 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl(r0, 0x20, &(0x7f0000000040)="e526a95d953a68e1874d49879542f5cdff72ca1f65e6d6dfcf950a8059385581a12b3f1f906975094c521abd842de988512f3a5d5e6ef42aba0f5c") 06:46:46 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1428.524231] FAULT_INJECTION: forcing a failure. [ 1428.524231] name failslab, interval 1, probability 0, space 0, times 0 [ 1428.570778] CPU: 0 PID: 32269 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1428.578111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1428.587469] Call Trace: [ 1428.590070] dump_stack+0x172/0x1f0 [ 1428.593717] should_fail.cold+0xa/0x1b [ 1428.597610] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1428.602721] ? lock_downgrade+0x810/0x810 [ 1428.606889] ? ___might_sleep+0x163/0x280 [ 1428.611046] __should_failslab+0x121/0x190 [ 1428.615285] should_failslab+0x9/0x14 [ 1428.619093] kmem_cache_alloc_trace+0x2d1/0x760 [ 1428.623767] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1428.628883] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1428.633829] __list_lru_init+0x3d3/0x6e0 [ 1428.637903] sget_userns+0x84d/0xd30 [ 1428.641621] ? kill_litter_super+0x60/0x60 [ 1428.645859] ? ns_test_super+0x50/0x50 [ 1428.649749] ? ns_test_super+0x50/0x50 [ 1428.653638] ? kill_litter_super+0x60/0x60 [ 1428.657887] sget+0x10c/0x150 [ 1428.661000] mount_bdev+0xff/0x3c0 [ 1428.664541] ? xfs_test_remount_options+0x90/0x90 [ 1428.669396] xfs_fs_mount+0x35/0x40 [ 1428.673031] mount_fs+0x106/0x3ff [ 1428.676497] ? emergency_thaw_all+0x1a0/0x1a0 [ 1428.681000] ? __init_waitqueue_head+0x36/0x90 [ 1428.685592] vfs_kern_mount.part.0+0x6f/0x410 [ 1428.690115] do_mount+0x581/0x2d30 [ 1428.693666] ? copy_mount_options+0x41/0x440 [ 1428.698088] ? copy_mount_string+0x40/0x40 [ 1428.702327] ? kmem_cache_alloc_trace+0x354/0x760 [ 1428.707174] ? _copy_from_user+0xdd/0x150 [ 1428.711334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1428.716875] ? copy_mount_options+0x30e/0x440 [ 1428.721377] ksys_mount+0xdb/0x150 [ 1428.724923] __x64_sys_mount+0xbe/0x150 [ 1428.728912] do_syscall_64+0x103/0x610 [ 1428.732817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1428.738095] RIP: 0033:0x45a89a [ 1428.741294] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1428.760197] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xfffffffffffffccf) [ 1428.767907] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1428.775178] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1428.782445] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1428.789713] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1428.796979] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:47 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r2 = getpgid(0xffffffffffffffff) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80000, 0x0) ioctl$NBD_DISCONNECT(r3, 0xab08) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x8, 0x862, 0x4, 0x20, 0x0, 0x6, 0x9808, 0x8, 0x2, 0x1, 0x2, 0x8, 0x2, 0x5, 0x6, 0x8001, 0x4, 0x8001, 0x200, 0x7, 0x1000000000, 0x40, 0x9, 0x84bd, 0x7f, 0x7, 0x8, 0x2, 0x8001, 0xfffffffffffffff8, 0x8, 0x2, 0x5, 0x80000000, 0x6, 0x81, 0x0, 0xffff, 0x7, @perf_bp={&(0x7f0000000000), 0xc}, 0x200, 0x7, 0x3, 0x5, 0x8, 0x0, 0x3}, r2, 0x0, r1, 0x2) [ 1428.865306] gfs2: invalid mount option: commit=0x000000100 [ 1428.894926] gfs2: can't parse mount arguments 06:46:47 executing program 2 (fault-call:0 fault-nth:77): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:47 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x88600, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x1) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:47 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:47 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x81, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x210) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0x6, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x19) [ 1428.998290] gfs2: invalid mount option: commit=0x000000100 [ 1429.024341] gfs2: can't parse mount arguments 06:46:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000001c0)={r3, 0x9d, "844a74134fec836c494b1b132ee3e07cd169a88984157cc78d97b233bd9fb12123ce9f1ca7e74792cff14a9f085ad7f6c09e87070118c0bdc07fc32d415e95367081aa5afb525ba5eae50cd353b470a1d5b53015b1d374b444b16747d4b870f88be5fc12b6b0988930e9d9a09b96fe6edb94065f4c2e7411ca3c73e3846b4d61e193510a3af3eae3d2718f37cc269f4a7a85ccde4f96200c3152b36278"}, &(0x7f0000000280)=0xa5) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="636f5d0a69743d307830300000000030317030303030303075b601ec66785d4d302c00"]) syncfs(r0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x201) dup(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x402000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) 06:46:47 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x5, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:47 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xc0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080)=0x5, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:47 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1429.297217] FAULT_INJECTION: forcing a failure. [ 1429.297217] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.310946] CPU: 1 PID: 32303 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1429.318243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.327599] Call Trace: [ 1429.330199] dump_stack+0x172/0x1f0 [ 1429.333834] should_fail.cold+0xa/0x1b [ 1429.337722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1429.342831] ? lock_downgrade+0x810/0x810 [ 1429.346990] ? ___might_sleep+0x163/0x280 [ 1429.351143] __should_failslab+0x121/0x190 [ 1429.355381] should_failslab+0x9/0x14 [ 1429.359187] kmem_cache_alloc_trace+0x2d1/0x760 [ 1429.363872] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1429.368805] __list_lru_init+0x3d3/0x6e0 [ 1429.372874] sget_userns+0x84d/0xd30 [ 1429.376584] ? kill_litter_super+0x60/0x60 [ 1429.380820] ? ns_test_super+0x50/0x50 [ 1429.384707] ? ns_test_super+0x50/0x50 [ 1429.388595] ? kill_litter_super+0x60/0x60 [ 1429.392831] sget+0x10c/0x150 [ 1429.395940] mount_bdev+0xff/0x3c0 [ 1429.399482] ? xfs_test_remount_options+0x90/0x90 [ 1429.404325] xfs_fs_mount+0x35/0x40 [ 1429.407960] mount_fs+0x106/0x3ff [ 1429.411413] ? emergency_thaw_all+0x1a0/0x1a0 [ 1429.415913] ? __init_waitqueue_head+0x36/0x90 [ 1429.420507] vfs_kern_mount.part.0+0x6f/0x410 [ 1429.425010] do_mount+0x581/0x2d30 [ 1429.428559] ? copy_mount_options+0x41/0x440 [ 1429.432975] ? copy_mount_string+0x40/0x40 [ 1429.437209] ? kmem_cache_alloc_trace+0x354/0x760 [ 1429.442056] ? _copy_from_user+0xdd/0x150 [ 1429.446210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.451748] ? copy_mount_options+0x30e/0x440 [ 1429.456270] ksys_mount+0xdb/0x150 [ 1429.459814] __x64_sys_mount+0xbe/0x150 [ 1429.464035] do_syscall_64+0x103/0x610 [ 1429.467929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1429.473116] RIP: 0033:0x45a89a [ 1429.476312] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1429.496512] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1429.504224] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1429.511493] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1429.518769] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1429.526041] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1429.533308] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:47 executing program 3: syslog(0x0, &(0x7f0000000180)=""/200, 0xc8) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1429.564162] gfs2: invalid mount option: co] [ 1429.564162] it=0x00 [ 1429.590724] gfs2: can't parse mount arguments 06:46:47 executing program 2 (fault-call:0 fault-nth:78): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:47 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:47 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfffffffffffffffa, 0xc083) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x10000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) write(r2, &(0x7f0000000000)="d2345e52500bcc", 0x7) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0)={0x4}, 0x4) 06:46:47 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200001, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x144) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6ca000000000000) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6e25) 06:46:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:47 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1429.769098] gfs2: commit mount option requires a positive numeric argument [ 1429.805162] gfs2: can't parse mount arguments [ 1429.808224] FAULT_INJECTION: forcing a failure. 06:46:47 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x28000, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x6, 0x1, 0xfffffffffffffffb, {0x0, 0x1c9c380}, 0xa2a, 0xffffffffffffff7f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0x0) 06:46:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xc0200, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e22, 0x79, @remote, 0x401}, r2}}, 0x38) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000001c0)={0x7, 0x0, 0x7f, 0x7, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1429.808224] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.834334] CPU: 0 PID: 32348 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1429.841642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1429.841649] Call Trace: [ 1429.841673] dump_stack+0x172/0x1f0 [ 1429.841693] should_fail.cold+0xa/0x1b [ 1429.841710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1429.841729] ? lock_downgrade+0x810/0x810 [ 1429.857410] ? ___might_sleep+0x163/0x280 [ 1429.870503] __should_failslab+0x121/0x190 [ 1429.870523] should_failslab+0x9/0x14 [ 1429.870540] kmem_cache_alloc_trace+0x2d1/0x760 [ 1429.887369] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1429.892497] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1429.897434] __list_lru_init+0x3d3/0x6e0 [ 1429.901503] sget_userns+0x84d/0xd30 [ 1429.901519] ? kill_litter_super+0x60/0x60 [ 1429.901536] ? ns_test_super+0x50/0x50 [ 1429.901549] ? ns_test_super+0x50/0x50 [ 1429.901566] ? kill_litter_super+0x60/0x60 [ 1429.901579] sget+0x10c/0x150 [ 1429.901595] mount_bdev+0xff/0x3c0 [ 1429.901608] ? xfs_test_remount_options+0x90/0x90 [ 1429.901623] xfs_fs_mount+0x35/0x40 [ 1429.901640] mount_fs+0x106/0x3ff [ 1429.901658] ? emergency_thaw_all+0x1a0/0x1a0 [ 1429.944538] ? __init_waitqueue_head+0x36/0x90 [ 1429.949149] vfs_kern_mount.part.0+0x6f/0x410 [ 1429.953668] do_mount+0x581/0x2d30 [ 1429.957222] ? copy_mount_options+0x41/0x440 [ 1429.961651] ? copy_mount_string+0x40/0x40 [ 1429.965908] ? kmem_cache_alloc_trace+0x354/0x760 [ 1429.970771] ? _copy_from_user+0xdd/0x150 [ 1429.974936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1429.980482] ? copy_mount_options+0x30e/0x440 [ 1429.985090] ksys_mount+0xdb/0x150 [ 1429.988640] __x64_sys_mount+0xbe/0x150 [ 1429.992631] do_syscall_64+0x103/0x610 [ 1429.996534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.001737] RIP: 0033:0x45a89a 06:46:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x400000, 0x0) openat$cgroup_type(r1, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x42) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x80}, &(0x7f00000000c0)=0x8) ioctl(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000003c0)={0x5084f74d, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0xfd00, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}) syz_open_dev$dmmidi(0x0, 0x0, 0x80000000) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f00000001c0)) getpeername$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) syz_open_dev$adsp(0x0, 0x0, 0x10000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYBLOB="06000809000000a3dc875ca933698528f4dd76f1d70600ffff8200f16208047fff750ea47cdefeb6c4ac053ba202902433"], 0x18) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0xe000000a}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x80000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(r2, 0x34040) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1d) 06:46:48 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f0000000100)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000340)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@dev={0xfe, 0x80, [], 0x1d}, @in6=@empty, 0x4e24, 0x6a6, 0x4e21, 0x8, 0x0, 0xa0, 0x20, 0x87, r3, r4}, {0x2, 0x0, 0x48f7, 0x7, 0x200000000000, 0x1, 0x95f2, 0xffffffffffffa112}, {0x100000001, 0x7fff, 0x8000000000000, 0x401}, 0x7, 0x6e6bbb, 0x0, 0x1, 0x2, 0x3}, {{@in=@broadcast, 0x4d3, 0xff}, 0x2, @in6=@local, 0x3507, 0x1, 0x3, 0x3ff, 0x8000, 0xfffffffffffffffa, 0x4}}, 0xe8) [ 1430.004935] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1430.023944] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1430.031677] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1430.038959] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1430.046243] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1430.053526] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1430.060803] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:48 executing program 2 (fault-call:0 fault-nth:79): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:48 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f00000000c0)={@multicast2, @rand_addr=0x6}, 0x8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:48 executing program 1: socket$inet6(0xa, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000380)=0x101, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000001c0)={0x100000001, 0xfffffffffffffa4e}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) sync_file_range(r2, 0x4199, 0x7, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000240)={r5, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80000000, 0x7, 0xbcc, 0x4, 0x2}, &(0x7f0000000100)=0x98) 06:46:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='commit=0x000\'000100000000,\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) setuid(r1) 06:46:48 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1430.286804] gfs2: invalid mount option: commit=0x000'000100000000 [ 1430.317185] FAULT_INJECTION: forcing a failure. [ 1430.317185] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.331932] gfs2: can't parse mount arguments [ 1430.353842] CPU: 0 PID: 32382 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1430.361158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1430.370515] Call Trace: [ 1430.373125] dump_stack+0x172/0x1f0 [ 1430.376771] should_fail.cold+0xa/0x1b [ 1430.380673] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1430.385801] ? lock_downgrade+0x810/0x810 [ 1430.389971] ? ___might_sleep+0x163/0x280 [ 1430.394129] __should_failslab+0x121/0x190 [ 1430.398375] should_failslab+0x9/0x14 [ 1430.402185] kmem_cache_alloc_trace+0x2d1/0x760 [ 1430.406867] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1430.411994] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1430.416948] __list_lru_init+0x3d3/0x6e0 [ 1430.421047] sget_userns+0x84d/0xd30 [ 1430.424774] ? kill_litter_super+0x60/0x60 [ 1430.429015] ? ns_test_super+0x50/0x50 [ 1430.432908] ? ns_test_super+0x50/0x50 [ 1430.436800] ? kill_litter_super+0x60/0x60 [ 1430.441040] sget+0x10c/0x150 [ 1430.444155] mount_bdev+0xff/0x3c0 [ 1430.447705] ? xfs_test_remount_options+0x90/0x90 [ 1430.452558] xfs_fs_mount+0x35/0x40 [ 1430.456190] mount_fs+0x106/0x3ff [ 1430.459652] ? emergency_thaw_all+0x1a0/0x1a0 [ 1430.464154] ? __init_waitqueue_head+0x36/0x90 [ 1430.468750] vfs_kern_mount.part.0+0x6f/0x410 [ 1430.473260] do_mount+0x581/0x2d30 [ 1430.476892] ? copy_mount_options+0x41/0x440 [ 1430.481310] ? copy_mount_string+0x40/0x40 [ 1430.485546] ? kmem_cache_alloc_trace+0x354/0x760 [ 1430.490398] ? _copy_from_user+0xdd/0x150 [ 1430.494559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1430.500107] ? copy_mount_options+0x30e/0x440 [ 1430.504612] ksys_mount+0xdb/0x150 [ 1430.508160] __x64_sys_mount+0xbe/0x150 [ 1430.512144] do_syscall_64+0x103/0x610 [ 1430.516060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1430.521248] RIP: 0033:0x45a89a [ 1430.524441] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1430.543349] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:46:48 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:48 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000080)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0xfffffffffffffffe, 0x84) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8c0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000200), 0x0) 06:46:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'ip6_vti0\x00', @broadcast}) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) 06:46:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x0, 0x300) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1430.551061] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1430.558333] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1430.565608] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1430.572883] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1430.580157] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1430.721959] gfs2: commit mount option requires a positive numeric argument [ 1430.735898] gfs2: can't parse mount arguments 06:46:49 executing program 2 (fault-call:0 fault-nth:80): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:49 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:49 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000040)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000900000000000000040000f10000000005000000000000000900000000000000ff0100000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000ff7f00000000000000040000000000000500000000000000000000000000000000000000000000000008000000000000000000000000000001040000000000007139000000000000060000000000000000000000000000000000000000000000000400000000000000000000000000000101000000000000040000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000030001000000000002000000000000000300000000000000000000000000000f000000000000000001200000000000000000000000000000"]) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x541d) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fanotify_init(0x42, 0x40801) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) write$binfmt_elf32(r0, 0x0, 0x0) [ 1430.829706] gfs2: commit mount option requires a positive numeric argument [ 1430.857657] gfs2: can't parse mount arguments 06:46:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x2000, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x401, 0x80000001, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x200001b) [ 1430.945227] FAULT_INJECTION: forcing a failure. [ 1430.945227] name failslab, interval 1, probability 0, space 0, times 0 [ 1430.987819] CPU: 0 PID: 32421 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1430.995125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1431.004477] Call Trace: [ 1431.007074] dump_stack+0x172/0x1f0 [ 1431.010720] should_fail.cold+0xa/0x1b [ 1431.014630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1431.019747] ? lock_downgrade+0x810/0x810 [ 1431.023909] ? ___might_sleep+0x163/0x280 [ 1431.028067] __should_failslab+0x121/0x190 [ 1431.032308] should_failslab+0x9/0x14 [ 1431.036114] kmem_cache_alloc_trace+0x2d1/0x760 [ 1431.040800] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1431.045915] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1431.050864] __list_lru_init+0x3d3/0x6e0 [ 1431.054941] sget_userns+0x84d/0xd30 [ 1431.058672] ? kill_litter_super+0x60/0x60 [ 1431.062916] ? ns_test_super+0x50/0x50 [ 1431.066810] ? ns_test_super+0x50/0x50 [ 1431.070696] ? kill_litter_super+0x60/0x60 [ 1431.074940] sget+0x10c/0x150 [ 1431.078051] mount_bdev+0xff/0x3c0 [ 1431.081593] ? xfs_test_remount_options+0x90/0x90 [ 1431.086447] xfs_fs_mount+0x35/0x40 [ 1431.090084] mount_fs+0x106/0x3ff [ 1431.093547] ? emergency_thaw_all+0x1a0/0x1a0 [ 1431.098049] ? __init_waitqueue_head+0x36/0x90 [ 1431.102641] vfs_kern_mount.part.0+0x6f/0x410 [ 1431.107150] do_mount+0x581/0x2d30 [ 1431.110703] ? copy_mount_options+0x41/0x440 [ 1431.115121] ? copy_mount_string+0x40/0x40 [ 1431.119364] ? kmem_cache_alloc_trace+0x354/0x760 [ 1431.124223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.129763] ? copy_mount_options+0x30e/0x440 [ 1431.134272] ksys_mount+0xdb/0x150 06:46:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x6, 0xba, 0x8, 0x2, 0x0, 0x1, 0x200, 0x1, 0x6, 0x9341, 0x8, 0x200, 0x3, 0x7, 0x2, 0x6, 0x3f12, 0x6, 0x9, 0x8, 0xff, 0x6, 0xffffffffffff7fff, 0x2, 0x8, 0x7f, 0x2, 0x10000, 0x8000, 0x2b0, 0x40, 0x600, 0x5, 0x2, 0xfffffffffffffffd, 0x2, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0xffff}, 0x0, 0xfff, 0x3, 0xf, 0x7ff, 0x3, 0x200}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r2 = getpgid(0xffffffffffffffff) wait4(r2, &(0x7f0000000000), 0x40000000, &(0x7f0000000180)) [ 1431.137821] __x64_sys_mount+0xbe/0x150 [ 1431.141801] do_syscall_64+0x103/0x610 [ 1431.145698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1431.150993] RIP: 0033:0x45a89a [ 1431.154191] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1431.173101] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1431.180819] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:49 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 06:46:49 executing program 1: socket$inet6(0xa, 0x5, 0xfffffffffffffffe) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x2, 0x87, 0x2, 0x6, 0xffffffffffffffff}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={r2, 0x81, "fdb03a7c82bbd1ca109a39737584b81277f73b87766d228d061bb27751c2b36b0db8563d71902d0f57e8a8a1771a70ebf222132d52e9e5566f497e64d9f0f88156add29b94a5654141d934fe05a60e06c05135f7deeb39b9532359c034a77f5c7db66243821a58f8c39b68b473f35a3ea4cf4ed8b680b4bc2cf199579629f45b81"}, &(0x7f0000000100)=0x89) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x1, 0x2) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0xc400) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000080)={{0x7, @name="5bdc3d1f86cd61dc34c23ca034ca581a19146ed80a26bcf6ecb43d0e21d6628d"}, 0x8, 0xd0, 0x7}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001180)={r1, &(0x7f0000000180)="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", &(0x7f00000000c0)=""/99}, 0x18) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1431.188089] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1431.195424] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1431.202698] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1431.209969] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:49 executing program 2 (fault-call:0 fault-nth:81): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000100)={0x0, 0x6, 0x1, 0x1, 0x30000000000, 0x0, 0x8}) modify_ldt$read(0x0, &(0x7f0000000180)=""/96, 0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000001200)={'vcan0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) semget$private(0x0, 0x1, 0x40) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000200)=""/4096) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000080)=""/77) fdatasync(r1) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000001240), &(0x7f0000001280)=0x4) 06:46:49 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xf3, "d7bf4b5dd276223fbe518bafd0aa5d1ae6101a81f483bab40d426501e004847d5a401f99b4fa45c56cc2edb184f664f13207dda2df1ff825b60771ab8a90e5592bec28886e6aad692cbf82553a57447c094d267f97ffea998f3694c32f125def8d9b979676aaef76752babd218d89e502f1cc3b714d7987c67dc7c024e23b02400775b381c83f88e58e944226e72fe4e90f25cc58621fdc319db7e2821fabab18b25e72e6f5d80985a9eb63e9f3c38ae52c09e8a21a80250217669e5e670d039359af9aca3c23345dd63721643cde3e6ad761b4f40dbf6fa407998b11f0fc993eeba7941c243e0f0f8775f3a91477fee942589"}, &(0x7f0000000040)=0xfb) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r2, 0xffffffffffffff7f, 0xfffffffffffffffe}, &(0x7f0000000100)=0x8) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) finit_module(r1, &(0x7f00000001c0)='/ #*%\x00\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x3, &(0x7f0000000440)="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") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1431.302748] gfs2: commit mount option requires a positive numeric argument [ 1431.325581] gfs2: can't parse mount arguments 06:46:49 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0xc800, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$TCFLSH(r0, 0x540b, 0x303) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000080)={0x3, 0x1}) [ 1431.429438] FAULT_INJECTION: forcing a failure. [ 1431.429438] name failslab, interval 1, probability 0, space 0, times 0 [ 1431.491563] CPU: 1 PID: 32450 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1431.498887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1431.508242] Call Trace: [ 1431.510845] dump_stack+0x172/0x1f0 [ 1431.514478] should_fail.cold+0xa/0x1b [ 1431.518368] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1431.523479] ? lock_downgrade+0x810/0x810 [ 1431.527639] ? ___might_sleep+0x163/0x280 [ 1431.531795] __should_failslab+0x121/0x190 [ 1431.536046] should_failslab+0x9/0x14 [ 1431.539846] kmem_cache_alloc_trace+0x2d1/0x760 [ 1431.544519] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1431.549655] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1431.554592] __list_lru_init+0x3d3/0x6e0 [ 1431.558665] sget_userns+0x84d/0xd30 [ 1431.562381] ? kill_litter_super+0x60/0x60 [ 1431.566635] ? ns_test_super+0x50/0x50 [ 1431.570522] ? ns_test_super+0x50/0x50 [ 1431.574411] ? kill_litter_super+0x60/0x60 [ 1431.578655] sget+0x10c/0x150 [ 1431.581770] mount_bdev+0xff/0x3c0 [ 1431.585312] ? xfs_test_remount_options+0x90/0x90 [ 1431.590159] xfs_fs_mount+0x35/0x40 [ 1431.593792] mount_fs+0x106/0x3ff [ 1431.597250] ? emergency_thaw_all+0x1a0/0x1a0 [ 1431.601747] ? __init_waitqueue_head+0x36/0x90 [ 1431.606340] vfs_kern_mount.part.0+0x6f/0x410 [ 1431.610843] do_mount+0x581/0x2d30 [ 1431.614393] ? copy_mount_options+0x41/0x440 [ 1431.618805] ? copy_mount_string+0x40/0x40 [ 1431.623045] ? kmem_cache_alloc_trace+0x354/0x760 [ 1431.627900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1431.633439] ? copy_mount_options+0x30e/0x440 [ 1431.637947] ksys_mount+0xdb/0x150 [ 1431.641497] __x64_sys_mount+0xbe/0x150 [ 1431.645479] do_syscall_64+0x103/0x610 [ 1431.649372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1431.654562] RIP: 0033:0x45a89a [ 1431.657757] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1431.676658] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1431.684367] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:49 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_RELDISP(r0, 0x5605) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1431.691644] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1431.698915] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1431.706198] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1431.713465] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1431.733431] gfs2: commit mount option requires a positive numeric argument 06:46:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1d) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x80) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f00000000c0)) syncfs(r1) [ 1431.750571] gfs2: can't parse mount arguments 06:46:49 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:49 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x80000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x7, 0x8002, 0x1, 0x2, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r3, 0x800, 0x20}, &(0x7f00000001c0)=0xc) socket$inet_sctp(0x2, 0x1, 0x84) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x708, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) pselect6(0x40, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x0, 0x1000}, 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x2000000000, 0x87}, &(0x7f0000000000), 0x0) 06:46:49 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x400, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x20000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000380)) fcntl$getflags(r2, 0x409) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f00000001c0)) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x400, 0x2000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) memfd_create(&(0x7f00000000c0)='/dev/snapshot\x00', 0x1) write$sndseq(r4, &(0x7f0000000280)=[{0x7, 0x2, 0x7, 0x9, @tick=0x5, {0xa59d, 0x7}, {0x8, 0x4}, @result={0x7fffffff, 0x1}}, {0xe9a, 0x3e59, 0xfee, 0x2b145209, @tick=0x7, {0x3, 0x74}, {0x10000}, @connect={{0xfec, 0x17}, {0x4, 0x7f}}}, {0x1, 0x40, 0x8001, 0x10000, @tick=0xfff, {0x9, 0x5}, {0xfcfb, 0x2}, @raw32={[0x10001, 0x7, 0x9]}}, {0x17, 0x81, 0xf5e2, 0x7, @tick=0x200, {0x8, 0x12a00000000}, {0x7, 0x8}, @time}, {0x1000, 0x200, 0xffffffff, 0x9, @tick=0x6, {0x9, 0x100000000}, {0x80000000, 0x7}, @time=@time={0x0, 0x1c9c380}}], 0xf0) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) 06:46:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) 06:46:50 executing program 2 (fault-call:0 fault-nth:82): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1431.936099] gfs2: commit mount option requires a positive numeric argument [ 1431.951194] gfs2: can't parse mount arguments 06:46:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r1, 0x0, 0xfda2) r2 = dup3(r1, r0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2b, &(0x7f0000000000), 0x4) r3 = msgget(0x2, 0x80) r4 = geteuid() fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x1, r4, r5, r6, r7, 0x4, 0x6}, 0xffffffff, 0x80000000, 0x4, 0xcb, 0x27d, 0x0, r8, 0xffffffffffffffff}) 06:46:50 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x3ffffffd, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000440)=0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000040)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x44}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000100)='./file0\x00', r3, r4) ioctl(r2, 0x100000890d, &(0x7f0000000080)="0a224378eb31880c0b2910c92f3b9123b2cfdb24982d471a0826024dc7d0") getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000540)={0x0, 0x1}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000005c0)={r5, @in6={{0xa, 0x4e21, 0x4, @rand_addr="f588c1dafd010a8c913a10f46c02d7f5", 0x8}}, 0x0, 0x2, 0xfffffffffffffffa, 0x2d0, 0x4}, &(0x7f0000000680)=0x98) perf_event_open$cgroup(&(0x7f0000000480)={0x4, 0x70, 0x2000200000000000, 0xe00000000, 0x7a1, 0x6, 0x0, 0x10000000000000, 0x4, 0x3, 0x7fffffff, 0x1ce, 0x1000, 0x800, 0x9e52, 0x4, 0x2, 0x200000000000, 0x8000, 0x3, 0x8, 0x80000000, 0x81, 0x10001, 0x0, 0x7, 0xfa, 0xffffffffffff143c, 0xa86, 0x9, 0x736, 0x4, 0x7, 0x80000001, 0x4, 0x7, 0x7fff, 0x9, 0x0, 0x3, 0x0, @perf_config_ext={0x5, 0x3f}, 0x1000, 0x1, 0x7, 0x6, 0x3f, 0x2, 0x509}, r1, 0xffffffffffffffff, r1, 0x8) r6 = msgget(0x3, 0x400) msgctl$IPC_STAT(r6, 0x2, &(0x7f0000000240)=""/225) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000500)=r0) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000006c0)={0x29, 0x6, 0x0, {0x5}}, 0x29) 06:46:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x408000, 0x0) r2 = add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="db24d965ce63ef5293034307a68746bea721e81c79f7617c515243a9fbd56f9b3082dad8c2e467ca09588a5b5cc759db298a4b8aa5b42336c92d63ae0f782d7036d40ae90b000794c607b83f96c37b855754d2c809f747c9cadd5ced73c2cc33620f9fb2a0f6fc7b64e65b79a73d6c9ed6ba46608ae0841dc17b236c39be1e7efaa8eab9ca20e8070baf23486399a4eb996f7e5703b6bf1c799c42e82d23e458e2f9a394ef08a29a7cc3e3a0719bba3d8b069d2cf733d75573b3d1cd307661c48a27e5a464c670", 0xc7, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r2, &(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x2}, r3) sendto$inet(r1, &(0x7f0000000080)="856cf37e412c247a1a1957333f91cb4f7cf0e45fc7801efd24027ed73fd0f8091c849e61216b28ca14e3e83a89518c8028b46af2080805f5b23904ada2d6cd90581ec86ab4360c9bdaf98351601ada31419e618275bd2dc4e04354558b70de5e29b7ac84f67e6510e4960e585a9c7668f1e6799ff0722f98ffa41252a0bccbdad7fb7169eb", 0x85, 0x800, &(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x7, 0x2, 0x7, 0x2, 0x0, 0x4, 0x0, 0x8, 0x7fffffff, 0x8, 0x7, 0x2, 0x1, 0x7d6, 0xa3e, 0x4, 0x0, 0x305, 0x5, 0x2f4381bb, 0x2, 0x0, 0x0, 0x1, 0xcaf, 0x9, 0x4, 0x3f, 0x6, 0x1000, 0x7, 0x7, 0x2, 0x3, 0x100000000, 0xbb, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x9}, 0x4, 0x4ed, 0x2, 0x6, 0x5, 0x2, 0xfffffffffffff47f}, 0x0, 0x7, r1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000280)={0x5, 0x0, 0x9, 'queue1\x00'}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20800, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1432.056292] FAULT_INJECTION: forcing a failure. [ 1432.056292] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.102896] CPU: 0 PID: 32497 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1432.110204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1432.119691] Call Trace: [ 1432.122401] dump_stack+0x172/0x1f0 [ 1432.126037] should_fail.cold+0xa/0x1b [ 1432.129937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1432.135051] ? lock_downgrade+0x810/0x810 [ 1432.139207] ? ___might_sleep+0x163/0x280 [ 1432.143362] __should_failslab+0x121/0x190 [ 1432.147616] should_failslab+0x9/0x14 06:46:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20000000400000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1432.151424] kmem_cache_alloc_trace+0x2d1/0x760 [ 1432.156100] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1432.161213] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1432.166155] __list_lru_init+0x3d3/0x6e0 [ 1432.170228] sget_userns+0x84d/0xd30 [ 1432.173957] ? kill_litter_super+0x60/0x60 [ 1432.178202] ? ns_test_super+0x50/0x50 [ 1432.182099] ? ns_test_super+0x50/0x50 [ 1432.185989] ? kill_litter_super+0x60/0x60 [ 1432.190236] sget+0x10c/0x150 [ 1432.193351] mount_bdev+0xff/0x3c0 [ 1432.196897] ? xfs_test_remount_options+0x90/0x90 [ 1432.201747] xfs_fs_mount+0x35/0x40 [ 1432.205378] mount_fs+0x106/0x3ff [ 1432.208844] ? emergency_thaw_all+0x1a0/0x1a0 [ 1432.213349] ? __init_waitqueue_head+0x36/0x90 [ 1432.217943] vfs_kern_mount.part.0+0x6f/0x410 [ 1432.222449] do_mount+0x581/0x2d30 [ 1432.225996] ? copy_mount_options+0x41/0x440 [ 1432.230419] ? copy_mount_string+0x40/0x40 [ 1432.234658] ? kmem_cache_alloc_trace+0x354/0x760 [ 1432.239517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.245060] ? copy_mount_options+0x30e/0x440 [ 1432.249563] ksys_mount+0xdb/0x150 06:46:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x6, 0x2, 0x6, 0x673, 0xd, 0x8a, 0x1, 0xa7a, 0x2, 0x3}) [ 1432.253122] __x64_sys_mount+0xbe/0x150 [ 1432.257102] do_syscall_64+0x103/0x610 [ 1432.261008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.266192] RIP: 0033:0x45a89a [ 1432.269389] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1432.288291] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1432.296519] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a 06:46:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:50 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x100000000) [ 1432.303791] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1432.311057] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1432.318331] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1432.325601] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:50 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000100)=""/100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x7, &(0x7f0000000640)=[{&(0x7f0000000280)="b90c23dd70042cbb569cfa111be85d60d5d024266f7852daa89604c676d92c0c38b32e6d5dce07c80808896395c8fd18756d2f2cd99b07195a020a0ca78db45e4d1d95ac8cd0b99e15fcf4d30a14ad02184bbf6ed869d16f0a917847c482f526f752e32c3b3b7bfb86936c2514fe565a3dc5337d27beaa08bdb763ac5c21b3d09941bcdf2ac3984920d558d32ef2bbf64432", 0x92, 0x9}, {&(0x7f00000001c0)="8fa117596da8c828e746cee9bd121babbfe3dbc2c458e2077cfac7503ef174521083633fc966f1e10c8c98bcf9f31f3c5bfa9bd77b2c262aa173513fe22201c3ae60d6", 0x43, 0x4}, {&(0x7f0000000340)="e28b08f6cdb8353926e40137a345a2e065865f1ad175eaabb23ac5ce1b9adb8f0f9ee9e60c6b6f49d8afd55e45bedd1942322546267930d81e73fafe8415713a418340ce7e2ae1a370b2ce5a658c51299b7ee9297b2248c9", 0x58, 0x5699}, {&(0x7f00000003c0)="477171d9bfe965d7064ea1900707bd527a41841c7a8a0abd1d4a331f61224edb54723b22d6ef476f57f6366547a018460d3b23b10c226354254916bc245e70ee07f054a2bde0cd4986fe098becb109c265fd1f46d89bae243c2e058e38c594ccef1c37394a63cd53", 0x68, 0xa98}, {&(0x7f0000000440)="f7cdbd3bfc27a492e750e3c5d9bc4f72443f2951e82eab3a3f4b8f141299440e45bae5bbdb2bc1145132355c70ce05c08aa386b81a8cf0dc0c43cde71ab9bfd2716fbbd91825825909c4c717fa9c4871abc41968478a013a16aa5e449f4d535ec7244d6177db917df4ad15565f52c2b5bf6fca30404ea979710bbc970d50b29a7c494dbbe3b292f865912f8a97edd754e071a1545c6c6bddec86f5c23490f880a756cb0e887069bf5ac56e770bea0ed0dd7f2d9672671ef21a5845d19ba0b6fd093fe94dc8737b90aa65d3a56f1f0e1643ad14a1eb606c9ab646e8", 0xdb, 0x100000000}, {&(0x7f0000000540)="6e81a8d41c9e387982c3607bfa141ae3af5c27547ac4fc112e663cfaadaf810fe6c379e9c4558c3a0f4f9e416f63f2d13a5381e2571bce0b8383c50d29a8eb86739bff447bfc2abad7abe364e49e8d13ae97210546a2b569fa358848502bbae025c35418c3", 0x65, 0xd0ad}, {&(0x7f00000005c0)="9d71078ad5038c1855eb109a812e285832ae7be247a2431b3d936d8fb9c2bf25dca302bc1e67fe5538825386641f451be868e98502c9ed479f041e6bd0b67032bd1a56d89a46f6b6eab1bf4d3f8b23db1a2a8806b87b9593ac1b9c64f0f12f7ae3e6b5289c7307a09d52108801b69da19071eb33645599c911691ee0dfac", 0x7e, 0x200}], 0x10000, &(0x7f0000000780)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@session={'session', 0x3d, 0x5e}}, {@norock='norock'}, {@session={'session', 0x3d, 0x4b}}, {@nojoliet='nojoliet'}, {@session={'session', 0x3d, 0x31}}], [{@subj_user={'subj_user', 0x3d, 'commit'}}, {@obj_type={'obj_type', 0x3d, 'nodev'}}, {@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, 'trustedppp0}[ppp0'}}, {@euid_eq={'euid', 0x3d, r3}}, {@permit_directio='permit_directio'}, {@pcr={'pcr', 0x3d, 0x3b}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:46:50 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1432.387213] gfs2: commit mount option requires a positive numeric argument [ 1432.395085] gfs2: can't parse mount arguments 06:46:50 executing program 2 (fault-call:0 fault-nth:83): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:50 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0000000000faffffffffff3cb9df45797bd7b60c62bedd3741298d33d5c14c2b3487399e1d9a6d0ba6b7a2d361adc4990453184214aa5a6c455f9606b59ed73eaae04aa2a6fabf1c143e67a4df8eb62b72439a9c85dcdf2c71") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:50 executing program 5: prctl$PR_SET_TSC(0x1a, 0x3) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000001400)=0x9, 0x4) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'nlmon0\x00', 0x2}) 06:46:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000140)={0x2, 0x2, @raw_data=[0x9, 0x7f, 0x7, 0x9, 0x2, 0x5, 0x7f, 0x10000, 0x3b0381af, 0x8, 0x91de, 0xbd, 0x7, 0x7ff, 0x2000000, 0x4]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000100)={0x8001004, 0x9, 0x3}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x88) 06:46:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1432.485918] gfs2: commit mount option requires a positive numeric argument [ 1432.501476] gfs2: can't parse mount arguments 06:46:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x69a, 0x7fff, 0xa9, 0x400, 0x0, 0x5}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:50 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0xfffffffffffffffe, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="806f6d6d69743d3078303030303030303130303030303030302c00"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f0000000140)=0x8) 06:46:50 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000100)=""/100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x7, &(0x7f0000000640)=[{&(0x7f0000000280)="b90c23dd70042cbb569cfa111be85d60d5d024266f7852daa89604c676d92c0c38b32e6d5dce07c80808896395c8fd18756d2f2cd99b07195a020a0ca78db45e4d1d95ac8cd0b99e15fcf4d30a14ad02184bbf6ed869d16f0a917847c482f526f752e32c3b3b7bfb86936c2514fe565a3dc5337d27beaa08bdb763ac5c21b3d09941bcdf2ac3984920d558d32ef2bbf64432", 0x92, 0x9}, {&(0x7f00000001c0)="8fa117596da8c828e746cee9bd121babbfe3dbc2c458e2077cfac7503ef174521083633fc966f1e10c8c98bcf9f31f3c5bfa9bd77b2c262aa173513fe22201c3ae60d6", 0x43, 0x4}, {&(0x7f0000000340)="e28b08f6cdb8353926e40137a345a2e065865f1ad175eaabb23ac5ce1b9adb8f0f9ee9e60c6b6f49d8afd55e45bedd1942322546267930d81e73fafe8415713a418340ce7e2ae1a370b2ce5a658c51299b7ee9297b2248c9", 0x58, 0x5699}, {&(0x7f00000003c0)="477171d9bfe965d7064ea1900707bd527a41841c7a8a0abd1d4a331f61224edb54723b22d6ef476f57f6366547a018460d3b23b10c226354254916bc245e70ee07f054a2bde0cd4986fe098becb109c265fd1f46d89bae243c2e058e38c594ccef1c37394a63cd53", 0x68, 0xa98}, {&(0x7f0000000440)="f7cdbd3bfc27a492e750e3c5d9bc4f72443f2951e82eab3a3f4b8f141299440e45bae5bbdb2bc1145132355c70ce05c08aa386b81a8cf0dc0c43cde71ab9bfd2716fbbd91825825909c4c717fa9c4871abc41968478a013a16aa5e449f4d535ec7244d6177db917df4ad15565f52c2b5bf6fca30404ea979710bbc970d50b29a7c494dbbe3b292f865912f8a97edd754e071a1545c6c6bddec86f5c23490f880a756cb0e887069bf5ac56e770bea0ed0dd7f2d9672671ef21a5845d19ba0b6fd093fe94dc8737b90aa65d3a56f1f0e1643ad14a1eb606c9ab646e8", 0xdb, 0x100000000}, {&(0x7f0000000540)="6e81a8d41c9e387982c3607bfa141ae3af5c27547ac4fc112e663cfaadaf810fe6c379e9c4558c3a0f4f9e416f63f2d13a5381e2571bce0b8383c50d29a8eb86739bff447bfc2abad7abe364e49e8d13ae97210546a2b569fa358848502bbae025c35418c3", 0x65, 0xd0ad}, {&(0x7f00000005c0)="9d71078ad5038c1855eb109a812e285832ae7be247a2431b3d936d8fb9c2bf25dca302bc1e67fe5538825386641f451be868e98502c9ed479f041e6bd0b67032bd1a56d89a46f6b6eab1bf4d3f8b23db1a2a8806b87b9593ac1b9c64f0f12f7ae3e6b5289c7307a09d52108801b69da19071eb33645599c911691ee0dfac", 0x7e, 0x200}], 0x10000, &(0x7f0000000780)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@session={'session', 0x3d, 0x5e}}, {@norock='norock'}, {@session={'session', 0x3d, 0x4b}}, {@nojoliet='nojoliet'}, {@session={'session', 0x3d, 0x31}}], [{@subj_user={'subj_user', 0x3d, 'commit'}}, {@obj_type={'obj_type', 0x3d, 'nodev'}}, {@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, 'trustedppp0}[ppp0'}}, {@euid_eq={'euid', 0x3d, r3}}, {@permit_directio='permit_directio'}, {@pcr={'pcr', 0x3d, 0x3b}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1432.646290] FAULT_INJECTION: forcing a failure. [ 1432.646290] name failslab, interval 1, probability 0, space 0, times 0 06:46:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget(0x1, 0x3, 0x18) semop(r1, &(0x7f00000000c0)=[{0x3, 0x9, 0x1800}, {0x7, 0x4, 0x1800}, {0x0, 0x7, 0x800}, {0x3, 0xcc0, 0x800}, {0x3, 0xfffffffffffffffa, 0x1000}, {0x2, 0x7, 0x1000}, {0x3, 0xa0, 0x800}, {0x1, 0x7, 0x1000}, {0x1, 0x0, 0x1000}, {0x1, 0xa8, 0x1000}], 0xa) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1432.710788] CPU: 0 PID: 32542 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1432.718131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1432.727484] Call Trace: [ 1432.730091] dump_stack+0x172/0x1f0 [ 1432.733733] should_fail.cold+0xa/0x1b [ 1432.737628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1432.742743] ? lock_downgrade+0x810/0x810 [ 1432.746907] ? ___might_sleep+0x163/0x280 [ 1432.751075] __should_failslab+0x121/0x190 [ 1432.755320] should_failslab+0x9/0x14 06:46:50 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x5, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1432.759127] kmem_cache_alloc_trace+0x2d1/0x760 [ 1432.763822] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1432.768938] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1432.773879] __list_lru_init+0x3d3/0x6e0 [ 1432.777961] sget_userns+0x84d/0xd30 [ 1432.781683] ? kill_litter_super+0x60/0x60 [ 1432.785926] ? ns_test_super+0x50/0x50 [ 1432.789827] ? ns_test_super+0x50/0x50 [ 1432.793723] ? kill_litter_super+0x60/0x60 [ 1432.797960] sget+0x10c/0x150 [ 1432.801084] mount_bdev+0xff/0x3c0 [ 1432.804710] ? xfs_test_remount_options+0x90/0x90 [ 1432.804729] xfs_fs_mount+0x35/0x40 [ 1432.804752] mount_fs+0x106/0x3ff [ 1432.804768] ? emergency_thaw_all+0x1a0/0x1a0 [ 1432.821129] ? __init_waitqueue_head+0x36/0x90 [ 1432.825719] vfs_kern_mount.part.0+0x6f/0x410 [ 1432.825740] do_mount+0x581/0x2d30 [ 1432.825760] ? copy_mount_string+0x40/0x40 [ 1432.825780] ? copy_mount_options+0x242/0x440 [ 1432.842584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1432.848129] ? copy_mount_options+0x30e/0x440 [ 1432.852634] ksys_mount+0xdb/0x150 [ 1432.856190] __x64_sys_mount+0xbe/0x150 [ 1432.860184] do_syscall_64+0x103/0x610 [ 1432.864087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1432.869275] RIP: 0033:0x45a89a [ 1432.872487] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1432.891394] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1432.899107] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1432.906381] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1432.913653] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1432.920925] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1432.928196] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1432.950532] gfs2: commit mount option requires a positive numeric argument 06:46:51 executing program 2 (fault-call:0 fault-nth:84): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:51 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:51 executing program 5: kexec_load(0x0, 0x7, &(0x7f0000000500)=[{&(0x7f0000000000)="ea02ce4f578f4b4abf72a9db358386026947a8ddd0f5dc020bffdb51867125297bd1337aa5af8c566ff3f773e3193eb4ec14ed8b846951f1675ee0ac91c22b", 0x3f, 0x1000, 0x26b}, {&(0x7f0000000180)="cc0a8ac2a397ee5beae1ff9132b35a9f07effc78d678e3f857406754c919e8f191dad4503c131621427285bdb675fb9d895a05d4a087a9406c83d876c8f03a95915d7a1fb099d4286a6533381eb64161d9d07bec5e80c54539f291c049f4a9bf3d6e6b4b8ffac566687e026f0edde51b36a356508bc810602437fe367a7b37a328c4c7949b64cf4dbb9cf0ea32966997ff4f917d3d302747915d07d94c6b68fb4ce075d377874649771340dbf814075b7b3198419f2645a2bb6fab2e5712bc661b922b80f823a52cf2527e2f8f28995411cfc59483e7f629e48443", 0xdb, 0x100000001, 0x800}, {&(0x7f0000000080)="c11b976f31cfd7d9f29672c98c181fabebc05fcaa8c154be056ef31b417e04a73d770a639b28349c4abece", 0x2b, 0x2c, 0x7}, {&(0x7f0000000280)="1d1f7915a9c8963887fba66015b2722a1cad5c37cbf8d362fdb726f5863408bbe7ff466a8fc8c861d438715bed5123bbbe1889b57ead5dc7f712c4575e048628307055fcfdde7ae3a8821f2c7c0bd8ac42c953a3aaf07d163b8a10bc4ddc1120d5ec05bf1d07e2b00f18b04290b57628904ae490f6f4e44269bb003a0fce9e8ca0f5f42b315655d87def56d1141471009a7c5cd274dc97fc9a46c731f96692530af7fa83010c749abd8691298b03d19faa8929951fc1cc3393602847ca5412fde66b86d5c0c2b3766bff762b687ebb599609cf5ab2b522f1fb19", 0xda, 0x6, 0x9}, {&(0x7f00000000c0)="4e728dc94f9acbe8ab578d55c683668b3d765019ac8ee99e917b45288fc4c2577ddc71c7f91ebb4984a64655c2ce066c18bb8dab6b15e41402c65fb6a117ae293257b40e8e7951aaa040fc7cd68a0726f2255b4657d04c28f8dce55f5507e59f60adeff9ab6c645e4e01feffa9534d533d45ceac", 0x74, 0x9, 0x6}, {&(0x7f0000000380)="e51d763bccb186ae46a7e1e6c15c96452ca1df5979005246d3ed2f95d9291f0dfa5b271d6120fc6113e0498bea20ba3a6524e716227198150f837fbc909541c33bf2df070b772ce3679cbce3ded3085ba8390aab1438be345150cb663a0f597651bcb1b66529cabf461ae5903b1793ce671dc98cc2", 0x75, 0xc7, 0x7fff}, {&(0x7f0000000400)="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", 0xfe, 0x7, 0x2}], 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000640)=0x2) 06:46:51 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x440000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1432.951398] gfs2: invalid mount option: €ommit=0x0000000100000000 [ 1432.968071] gfs2: can't parse mount arguments [ 1432.980908] gfs2: can't parse mount arguments 06:46:51 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='cmmmit000,\x00']) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r4 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x4, 0x40001) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000580)=0x0) ptrace$peek(0x3, r5, &(0x7f00000005c0)) r6 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000340)={{0x2, 0x7, 0x8000, 0x93, '\x00', 0xd9cb}, 0x0, 0x3, 0x401, r6, 0x3, 0x0, 'syz1\x00', &(0x7f0000000300)=['selinuxwlan0\x00', 'sit0\x00', 'IPVS\x00'], 0x17, [], [0x800, 0x1, 0x101, 0x9]}) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="ac0000baf08941d1a7f9f908aa4400", @ANYRES16=r3, @ANYBLOB="04002cbd7000fddbdf2503000000080006008000000008000600020000007c0003000800010000000000080001000200000014000600fe8000000000000000000000000000aa080007004e21000014000600fe8000000000000000000000000000bb08000300010000001400020073697430000000000000000000000000080001000100000014000600ff0100000000000000000000000000010c00010008000b0073697000"], 0xac}, 0x1, 0x0, 0x0, 0x4000000}, 0x2004c810) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000480)=[{r0, 0xc000}, {r2, 0x400}], 0x2, 0xfff) 06:46:51 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x80000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") fadvise64(r1, 0x35, 0x3, 0x7) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f0000000040)=[{}, {}, {}, {}]}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) r3 = geteuid() syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2, &(0x7f0000000300)=[{&(0x7f0000000280)="0e8042ac6b1221b42b2564d7640cd81e16a5b3", 0x13, 0x8}, {&(0x7f00000002c0), 0x0, 0x6}], 0x980000, &(0x7f0000000480)=ANY=[@ANYBLOB='shortname=winnt,uni_xlate=0,shortname=winnt,measure,func=KEXEC_KERNEL_CHECK,hash,fsuuid=e35r175f-9f;a-54}5-4d6{-b\x001d3fwv,appraise,smackfsdef=\\,subj_user=vboxnet1$trusted@cgroupGPLcgroup,fowner<', @ANYRESDEC=r2, @ANYBLOB=',euid<', @ANYRESDEC=0xee01, @ANYBLOB=',fowner<', @ANYRESDEC=r3, @ANYBLOB=',s']) setrlimit(0x7, &(0x7f0000000000)={0x5ef1678e, 0x3f}) 06:46:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = dup2(r0, r0) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000180)={0x7, 0x1, @raw_data=[0xa04, 0x5, 0x6, 0x40, 0x100000001, 0x80000000, 0x5, 0x5, 0x20, 0x8001, 0x80, 0xffff, 0x441d, 0xffffffff80000000, 0x6, 0xfffffffffffffffd]}) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="2cd4195d66df6efaf5492bfb3f376089d4f03b13c131010654126c53a27e4063e868aea41fe7fef6fb7572ffa245831e4849f494908afc0a6b29780701f79da79e1ab94b13fae0b97ee1ed7f2b15d27721") [ 1433.120044] FAULT_INJECTION: forcing a failure. [ 1433.120044] name failslab, interval 1, probability 0, space 0, times 0 [ 1433.138533] CPU: 0 PID: 32579 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1433.145836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.145844] Call Trace: [ 1433.145870] dump_stack+0x172/0x1f0 [ 1433.145890] should_fail.cold+0xa/0x1b [ 1433.145910] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1433.145925] ? lock_downgrade+0x810/0x810 [ 1433.145944] ? ___might_sleep+0x163/0x280 [ 1433.145963] __should_failslab+0x121/0x190 [ 1433.145982] should_failslab+0x9/0x14 [ 1433.145996] kmem_cache_alloc_node_trace+0x270/0x720 [ 1433.146010] ? kmem_cache_alloc_trace+0x354/0x760 [ 1433.146027] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1433.146043] __kmalloc_node+0x3d/0x70 [ 1433.146060] kvmalloc_node+0x68/0x100 [ 1433.192048] __list_lru_init+0x4aa/0x6e0 [ 1433.192070] sget_userns+0x84d/0xd30 06:46:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x7530}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1433.192086] ? kill_litter_super+0x60/0x60 [ 1433.192105] ? ns_test_super+0x50/0x50 [ 1433.192125] ? ns_test_super+0x50/0x50 [ 1433.192137] ? kill_litter_super+0x60/0x60 [ 1433.192150] sget+0x10c/0x150 [ 1433.192168] mount_bdev+0xff/0x3c0 [ 1433.192180] ? xfs_test_remount_options+0x90/0x90 [ 1433.192198] xfs_fs_mount+0x35/0x40 [ 1433.205903] mount_fs+0x106/0x3ff [ 1433.205924] ? emergency_thaw_all+0x1a0/0x1a0 [ 1433.205944] ? __init_waitqueue_head+0x36/0x90 [ 1433.205966] vfs_kern_mount.part.0+0x6f/0x410 [ 1433.213802] do_mount+0x581/0x2d30 [ 1433.213819] ? copy_mount_options+0x41/0x440 [ 1433.213841] ? copy_mount_string+0x40/0x40 [ 1433.277940] ? kmem_cache_alloc_trace+0x354/0x760 [ 1433.282803] ? _copy_from_user+0xdd/0x150 [ 1433.286966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.292517] ? copy_mount_options+0x30e/0x440 [ 1433.297021] ksys_mount+0xdb/0x150 [ 1433.297041] __x64_sys_mount+0xbe/0x150 [ 1433.297060] do_syscall_64+0x103/0x610 [ 1433.297079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.308428] RIP: 0033:0x45a89a [ 1433.308445] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1433.308453] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1433.308468] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1433.308479] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1433.345978] gfs2: invalid mount option: cmmmit000 [ 1433.350669] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 06:46:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x4}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x10000000000018, 0x0, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) ioctl$KDDISABIO(r0, 0x4b37) 06:46:51 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1433.350679] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1433.350689] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:51 executing program 2 (fault-call:0 fault-nth:85): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x4}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x10000000000018, 0x0, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1433.547935] FAULT_INJECTION: forcing a failure. [ 1433.547935] name failslab, interval 1, probability 0, space 0, times 0 [ 1433.566463] gfs2: can't parse mount arguments [ 1433.572966] CPU: 0 PID: 32610 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1433.580257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1433.589613] Call Trace: [ 1433.592205] dump_stack+0x172/0x1f0 06:46:51 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000240)) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000040)=0x62ae) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x13) 06:46:51 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1433.595834] should_fail.cold+0xa/0x1b [ 1433.599739] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1433.604852] ? lock_downgrade+0x810/0x810 [ 1433.609006] ? ___might_sleep+0x163/0x280 [ 1433.613165] __should_failslab+0x121/0x190 [ 1433.617420] should_failslab+0x9/0x14 [ 1433.621226] kmem_cache_alloc_trace+0x2d1/0x760 [ 1433.625925] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1433.631047] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1433.635986] __list_lru_init+0x3d3/0x6e0 [ 1433.640053] sget_userns+0x84d/0xd30 [ 1433.643781] ? kill_litter_super+0x60/0x60 [ 1433.648029] ? ns_test_super+0x50/0x50 [ 1433.651918] ? ns_test_super+0x50/0x50 [ 1433.655809] ? kill_litter_super+0x60/0x60 [ 1433.660050] sget+0x10c/0x150 [ 1433.663169] mount_bdev+0xff/0x3c0 [ 1433.666716] ? xfs_test_remount_options+0x90/0x90 [ 1433.671571] xfs_fs_mount+0x35/0x40 [ 1433.675195] mount_fs+0x106/0x3ff [ 1433.675210] ? emergency_thaw_all+0x1a0/0x1a0 [ 1433.675226] ? __init_waitqueue_head+0x36/0x90 [ 1433.687723] vfs_kern_mount.part.0+0x6f/0x410 [ 1433.692241] do_mount+0x581/0x2d30 [ 1433.695779] ? copy_mount_options+0x41/0x440 [ 1433.695799] ? copy_mount_string+0x40/0x40 [ 1433.704425] ? kmem_cache_alloc_trace+0x354/0x760 [ 1433.710929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1433.710944] ? copy_mount_options+0x30e/0x440 [ 1433.710966] ksys_mount+0xdb/0x150 [ 1433.720974] __x64_sys_mount+0xbe/0x150 [ 1433.720994] do_syscall_64+0x103/0x610 [ 1433.721015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1433.721027] RIP: 0033:0x45a89a [ 1433.721041] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1433.721048] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1433.767345] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1433.774619] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1433.781902] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1433.789172] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1433.796439] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:52 executing program 4: rt_sigsuspend(&(0x7f0000000040)={0x200}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:52 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20048d0}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xf8, r1, 0x30, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x63}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8001}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}]}, 0xf8}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x27ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x1d) 06:46:52 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f00000000c0)={0x1000, 0x40, @value=0x5}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000000)={0x9, 0x8, 0x9, 0x7, 0xdc, 0x8000}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xfffffffffffffd09) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x101, 0x2, 0x1, 0x7, 0x5, 0x6}) fsetxattr$security_smack_transmute(r2, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) 06:46:52 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) times(&(0x7f0000000040)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000100)={0x3, 0x7f}) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xffff}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}}}, 0x84) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x80000000001, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:52 executing program 2 (fault-call:0 fault-nth:86): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:52 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 06:46:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f00000000c0)={0x1000, 0x40, @value=0x5}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000000)={0x9, 0x8, 0x9, 0x7, 0xdc, 0x8000}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, 0x0, 0xfffffffffffffd09) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x101, 0x2, 0x1, 0x7, 0x5, 0x6}) fsetxattr$security_smack_transmute(r2, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) 06:46:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:52 executing program 1: r0 = socket$inet6(0xa, 0x800, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x280000, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000080)={0x33, @rand_addr=0x7f, 0x4e22, 0x3, 'fo\x00', 0x20, 0x100000000, 0x67}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={r0}) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x5, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1434.034031] FAULT_INJECTION: forcing a failure. [ 1434.034031] name failslab, interval 1, probability 0, space 0, times 0 [ 1434.058329] gfs2: commit mount option requires a positive numeric argument [ 1434.075764] gfs2: can't parse mount arguments [ 1434.084014] CPU: 0 PID: 32636 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1434.091307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1434.100663] Call Trace: [ 1434.103264] dump_stack+0x172/0x1f0 [ 1434.106905] should_fail.cold+0xa/0x1b [ 1434.110811] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1434.115934] ? lock_downgrade+0x810/0x810 [ 1434.120097] ? ___might_sleep+0x163/0x280 [ 1434.124260] __should_failslab+0x121/0x190 [ 1434.128512] should_failslab+0x9/0x14 [ 1434.132321] kmem_cache_alloc_trace+0x2d1/0x760 [ 1434.137011] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1434.142133] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1434.147074] __list_lru_init+0x3d3/0x6e0 [ 1434.151144] sget_userns+0x84d/0xd30 [ 1434.154875] ? kill_litter_super+0x60/0x60 [ 1434.159119] ? ns_test_super+0x50/0x50 [ 1434.163016] ? ns_test_super+0x50/0x50 [ 1434.166909] ? kill_litter_super+0x60/0x60 [ 1434.171163] sget+0x10c/0x150 [ 1434.174283] mount_bdev+0xff/0x3c0 [ 1434.177920] ? xfs_test_remount_options+0x90/0x90 06:46:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x408800, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) sendto$llc(r2, &(0x7f0000000080)="39bbca65cfd8fb762af08b2212f0122370e32da656ae201227d651960446b10dfad007a65c97bfd8ecc6ef53fa8ad9da451f4f045ae057d9b9c4141d455ddcd2c771e23bb22fd5dd4c27dc2f149e72665864c8581852fe28726e7a2aa624921033b17e6ad5be", 0x66, 0x40, &(0x7f0000000100)={0x1a, 0x30f, 0x0, 0x8, 0xffff, 0x9395, @remote}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) [ 1434.182767] xfs_fs_mount+0x35/0x40 [ 1434.186395] mount_fs+0x106/0x3ff [ 1434.189857] ? emergency_thaw_all+0x1a0/0x1a0 [ 1434.194353] ? __init_waitqueue_head+0x36/0x90 [ 1434.198947] vfs_kern_mount.part.0+0x6f/0x410 [ 1434.203460] do_mount+0x581/0x2d30 [ 1434.207011] ? copy_mount_string+0x40/0x40 [ 1434.211262] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 1434.216805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1434.222442] ? copy_mount_options+0x30e/0x440 [ 1434.226969] ksys_mount+0xdb/0x150 [ 1434.230514] __x64_sys_mount+0xbe/0x150 06:46:52 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) [ 1434.234501] do_syscall_64+0x103/0x610 [ 1434.238398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1434.243592] RIP: 0033:0x45a89a [ 1434.246791] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1434.265695] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1434.273671] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1434.280942] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1434.288205] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1434.295921] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1434.303192] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1434.837018] gfs2: commit mount option requires a positive numeric argument [ 1434.848927] gfs2: can't parse mount arguments 06:46:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200000, 0x40) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000100)={0x3, 0x7ff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:46:53 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x44040, 0x0) bind$x25(r0, &(0x7f0000000080)={0x9, @remote={[], 0x2}}, 0x12) 06:46:53 executing program 2 (fault-call:0 fault-nth:87): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41000100}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xe0, r2, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x18000000000000}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd3ca}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x26}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfad}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffc01}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xdf0a}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffff9}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x810}, 0x4050) name_to_handle_at(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0xc3, 0x4f, "ff35a051733fe3b05a175844bf38bf97937c5dd8071be2cadb2898cc1a353f291785817a27d1ba3ee449c77d83cdd40a5609a27acf66da5e171fe6cecbf4c9029fcb94705c1998f3988e055f3249e7acf5bc7c3b27065884f5990ca0263946ec1b3521924e43b846887d3f4b5efa2f45e773f9a331bd0b617cbf9486e245d5cbacbe8de9bde4080674da1301c47021d65e0b6df5d5bb805bc632b0dbcceee573c4fce1615ba213dae3712efaefdb870a67e441816e3170c4210ee0"}, &(0x7f0000000400), 0x1400) 06:46:53 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 06:46:53 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000240)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1434.964131] FAULT_INJECTION: forcing a failure. [ 1434.964131] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.013636] gfs2: commit mount option requires a positive numeric argument [ 1435.024988] CPU: 1 PID: 32669 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1435.032288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1435.041662] Call Trace: [ 1435.041690] dump_stack+0x172/0x1f0 [ 1435.041714] should_fail.cold+0xa/0x1b [ 1435.041734] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1435.041749] ? lock_downgrade+0x810/0x810 [ 1435.041764] ? ___might_sleep+0x163/0x280 [ 1435.041782] __should_failslab+0x121/0x190 [ 1435.065273] should_failslab+0x9/0x14 [ 1435.065293] kmem_cache_alloc_trace+0x2d1/0x760 [ 1435.065310] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1435.065329] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1435.083089] __list_lru_init+0x3d3/0x6e0 [ 1435.083114] sget_userns+0x84d/0xd30 [ 1435.083130] ? kill_litter_super+0x60/0x60 [ 1435.083152] ? ns_test_super+0x50/0x50 [ 1435.095854] ? ns_test_super+0x50/0x50 [ 1435.095870] ? kill_litter_super+0x60/0x60 [ 1435.095885] sget+0x10c/0x150 [ 1435.095903] mount_bdev+0xff/0x3c0 [ 1435.118746] ? xfs_test_remount_options+0x90/0x90 [ 1435.123604] xfs_fs_mount+0x35/0x40 [ 1435.127241] mount_fs+0x106/0x3ff [ 1435.130703] ? emergency_thaw_all+0x1a0/0x1a0 [ 1435.135204] ? __init_waitqueue_head+0x36/0x90 [ 1435.139801] vfs_kern_mount.part.0+0x6f/0x410 [ 1435.144315] do_mount+0x581/0x2d30 [ 1435.147860] ? copy_mount_options+0x41/0x440 [ 1435.153156] ? copy_mount_string+0x40/0x40 [ 1435.157412] ? kmem_cache_alloc_trace+0x354/0x760 06:46:53 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000080)={0x3, 0x8}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) write$tun(r0, &(0x7f0000000240)={@void, @void, @mpls={[{0x3, 0x0, 0x641, 0x7}, {0x7ff, 0x9, 0x0, 0x400}, {0x7ff, 0x2, 0xee, 0x1}, {0x8, 0x510aab12, 0x88, 0x3f}, {0x8f, 0x1, 0x5, 0x4}, {0x6c19, 0x1, 0x8001, 0x4}, {0x100000000, 0x0, 0x1ff, 0x7}, {0x43b, 0xffffffffffffff9f, 0x5, 0x3}, {0x5d, 0x3, 0x9, 0x6}], @llc={@snap={0xaa, 0xab, ' ', "791d9c", 0x6004, "614ffae9772bb58c235e8f7afbf467edce63556e6a6aafe378f48570e8af6b5fcfb97a42c5aece82af3b03c500664ba9118610ab07ad96e82d6076a60e12f4eb6060b8fff288afae1d0d9f8b5d35b621058b7b3bac3bcb50588ccc68cf52f98734b77948724fb74f8be51d435b01a0d67138c4f4eef8314c4cc85db010ed457ffeae72a299d243ce14e0b492383ecbd91fad335ca1e6df9d5b2d8a40a8cb6bf873c4d04e2c8adc0ef722d28fdeefe8b48a608ca4c8a06b302d5b0211989b16a346045fd76cdb93c2aef18f7d51d02f1ac5ba7c1e417579cf944ae5d86d954a23ca8724145541"}}}}, 0x112) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x1ad347d3, &(0x7f0000000100)=0x1e3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:53 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 06:46:53 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 06:46:53 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xaf9, 0x101041) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) accept4$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, &(0x7f0000000240)=0x10, 0x80000) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000100)=0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1435.157440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.157456] ? copy_mount_options+0x30e/0x440 [ 1435.157476] ksys_mount+0xdb/0x150 [ 1435.175860] __x64_sys_mount+0xbe/0x150 [ 1435.179841] do_syscall_64+0x103/0x610 [ 1435.179864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1435.179876] RIP: 0033:0x45a89a [ 1435.179889] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 06:46:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xf8, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000000c0)={'nat\x00', 0x0, 0x4, 0xa4, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f0000000180)=""/164}, &(0x7f0000000240)=0x78) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') syz_init_net_socket$netrom(0x6, 0x5, 0x0) [ 1435.179899] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1435.211028] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1435.211037] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1435.211045] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1435.211054] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1435.211062] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1435.219236] gfs2: can't parse mount arguments 06:46:53 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 06:46:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:53 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000040)={0x8, 0x8}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000000c0)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="419b71db767bfd1d8e2ba06da5cdf6cc5843e4a09fac58ddd2902bbb11009a6e4256d2f4e66b04d531a86d67fd70055f", 0x30, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000002c0)={r2, 0x7, 0x5}, 0x0, &(0x7f0000000300)="b107db2d4bf1753c111848f16fa4158d9acee84870feb994f35109399f6bbeb9564bae6496d0864de507656b98cc42e5e2826518f0a967d838f6a5cb0b1427b2ed93090c3309c919741966bcfbb70bde65c1aa2745332a6cd5fad76b3e1d723deb6510d340954e4ace25b3811d847192329045732a35794d05e478c0fcfed9862f9f33849cd5728a04d3a51e5d5c0fa7ac43edc5449d1b000547191e9a6e647a3442f9ee06e3cfacde336bd3dccc01e768db9a4e29b0db9611fdd08f6fb79a1b0c9fa5e86864cd89b6b768b35c55d1dfe6a8c2d6f3c03cc133", &(0x7f0000000400)=""/188) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0xbf0000, 0x5, 0x200, [], &(0x7f0000000100)={0x9b0a73, 0x80, [], @value64=0x8}}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000004c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x20000, 0x0) 06:46:53 executing program 2 (fault-call:0 fault-nth:88): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:46:53 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='^\xa6)!\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='/dev/nullb0\x00', r1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x88000, 0x0) setsockopt$inet6_int(r1, 0x29, 0xc9, &(0x7f0000000080)=0x6, 0x4) 06:46:53 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 06:46:53 executing program 3 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) [ 1435.472171] gfs2: commit mount option requires a positive numeric argument [ 1435.509572] gfs2: can't parse mount arguments 06:46:53 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$NBD_DO_IT(r1, 0xab03) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x0, 0x5d, 0x9b, &(0x7f0000000240)="eecfe7e3f2a5fab434831629aee4afc68f174856647c2b19c7a0decd891e9300159d656b2eedea4aa690c6877be48d583a675f92d18bc57791b78bda512c8a0e2836f05ade775e4e1dc5962c000fc13d235611aae502a7e2c851184c9dcf97c46b161141444f80a8c9253564c244c16340cc634a8d04525cb97f6ee1c573757f4818189350a38999ccc7ee85825a8265b261312098466f3601b053"}) [ 1435.542514] FAULT_INJECTION: forcing a failure. [ 1435.542514] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.557986] Bluetooth: hci0: Frame reassembly failed (-84) [ 1435.569152] CPU: 0 PID: 32708 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1435.576452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1435.586411] Call Trace: [ 1435.589008] dump_stack+0x172/0x1f0 [ 1435.592649] should_fail.cold+0xa/0x1b [ 1435.596540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1435.601646] ? lock_downgrade+0x810/0x810 [ 1435.605796] ? ___might_sleep+0x163/0x280 [ 1435.609946] __should_failslab+0x121/0x190 [ 1435.614189] should_failslab+0x9/0x14 [ 1435.617993] kmem_cache_alloc_trace+0x2d1/0x760 [ 1435.622664] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1435.627770] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1435.632706] __list_lru_init+0x3d3/0x6e0 [ 1435.636771] sget_userns+0x84d/0xd30 [ 1435.640489] ? kill_litter_super+0x60/0x60 [ 1435.644725] ? ns_test_super+0x50/0x50 [ 1435.648620] ? ns_test_super+0x50/0x50 [ 1435.652509] ? kill_litter_super+0x60/0x60 [ 1435.656745] sget+0x10c/0x150 [ 1435.659946] mount_bdev+0xff/0x3c0 [ 1435.663485] ? xfs_test_remount_options+0x90/0x90 [ 1435.668333] xfs_fs_mount+0x35/0x40 [ 1435.671980] mount_fs+0x106/0x3ff [ 1435.675452] ? emergency_thaw_all+0x1a0/0x1a0 [ 1435.679954] ? __init_waitqueue_head+0x36/0x90 [ 1435.684563] vfs_kern_mount.part.0+0x6f/0x410 [ 1435.689069] do_mount+0x581/0x2d30 [ 1435.692616] ? copy_mount_options+0x41/0x440 [ 1435.697030] ? copy_mount_string+0x40/0x40 [ 1435.701266] ? kmem_cache_alloc_trace+0x354/0x760 [ 1435.706122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1435.711664] ? copy_mount_options+0x30e/0x440 [ 1435.716166] ksys_mount+0xdb/0x150 [ 1435.719717] __x64_sys_mount+0xbe/0x150 [ 1435.723707] do_syscall_64+0x103/0x610 [ 1435.727623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1435.732810] RIP: 0033:0x45a89a [ 1435.736004] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1435.754901] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1435.762737] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1435.770027] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1435.777292] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1435.784562] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:46:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) fcntl$setsig(r0, 0xa, 0x26) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) [ 1435.791839] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1435.817163] gfs2: commit mount option requires a positive numeric argument [ 1435.829085] gfs2: can't parse mount arguments 06:46:54 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sched_yield() ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:46:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d30784a3030303030303130303030303030302c009e6a313fec81fb404c1535baf319f734dcc371e812bea97fffb38a3adf42d1edc66121d91c4e0061872427e8a6e1b6a6229b197c1b65d56c92dae1ed9836f15f1c4c6d214ec1c2803493e6c58ef5f673df7b07d4f4db6c75cabdb3ac93d08ed1753510f8b4001f18d695187a219dbd23d96da17fc9974671bcaca35b631d209dd95cb24dcd94ec14b4abcb71b1d94f1e89f386976414a4f33e66e34112"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x3, 0x8000) 06:46:54 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x200000000000003, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:46:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x400800, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x2, 0xfffffffffffffab6, 0xa, 0xffffffffffffff00, 0x1, 0x7}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 06:46:54 executing program 2 (fault-call:0 fault-nth:89): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1435.981455] gfs2: invalid mount option: commit=0xJ000000100000000 [ 1435.987729] gfs2: can't parse mount arguments [ 1436.070324] FAULT_INJECTION: forcing a failure. [ 1436.070324] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.087248] CPU: 0 PID: 32737 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1436.094559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.103919] Call Trace: [ 1436.106629] dump_stack+0x172/0x1f0 [ 1436.110268] should_fail.cold+0xa/0x1b [ 1436.114166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1436.119280] ? lock_downgrade+0x810/0x810 [ 1436.123449] ? ___might_sleep+0x163/0x280 [ 1436.127778] __should_failslab+0x121/0x190 [ 1436.132026] should_failslab+0x9/0x14 [ 1436.135832] kmem_cache_alloc_trace+0x2d1/0x760 [ 1436.140510] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1436.145628] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1436.150580] __list_lru_init+0x3d3/0x6e0 [ 1436.154650] sget_userns+0x84d/0xd30 [ 1436.158365] ? kill_litter_super+0x60/0x60 [ 1436.162610] ? ns_test_super+0x50/0x50 [ 1436.166499] ? ns_test_super+0x50/0x50 [ 1436.170478] ? kill_litter_super+0x60/0x60 [ 1436.174719] sget+0x10c/0x150 [ 1436.177829] mount_bdev+0xff/0x3c0 [ 1436.181375] ? xfs_test_remount_options+0x90/0x90 [ 1436.186482] xfs_fs_mount+0x35/0x40 [ 1436.190125] mount_fs+0x106/0x3ff [ 1436.193593] ? emergency_thaw_all+0x1a0/0x1a0 [ 1436.198102] ? __init_waitqueue_head+0x36/0x90 [ 1436.202700] vfs_kern_mount.part.0+0x6f/0x410 [ 1436.207207] do_mount+0x581/0x2d30 [ 1436.210751] ? copy_mount_options+0x41/0x440 [ 1436.215174] ? copy_mount_string+0x40/0x40 [ 1436.219419] ? kmem_cache_alloc_trace+0x354/0x760 [ 1436.224277] ? _copy_from_user+0xdd/0x150 [ 1436.228443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1436.233990] ? copy_mount_options+0x30e/0x440 [ 1436.238502] ksys_mount+0xdb/0x150 [ 1436.242050] __x64_sys_mount+0xbe/0x150 [ 1436.246032] do_syscall_64+0x103/0x610 [ 1436.250191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1436.256946] RIP: 0033:0x45a89a [ 1436.260146] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1436.279054] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1436.286789] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1436.294596] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1436.301870] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1436.309141] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:46:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp6\x00') ioctl$sock_netdev_private(r1, 0x89fc, &(0x7f00000001c0)="dec5d619cdee702d6d292c1a024259b3e28363a2f10f74c024330a51cc") ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000180)={{0x3, @name="a892f395d15de12145257dd8126781548046c489b4b0e3ff8fc736a283dcd444"}, 0x8, 0x7ff, 0x1000}) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x2, &(0x7f0000000100)=0xfffffffffffffeb7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:46:54 executing program 1: socket$inet6(0xa, 0x5, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0xcd5, 0xfffffffffffffffc) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000001c0)={r1, 0x1}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008913, &(0x7f0000000240)="0adc1f023c123f3188a070") getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000002c0)=0xc) fcntl$setown(r2, 0x8, r4) r5 = socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000300)={0x5}, 0x4) [ 1436.316418] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:46:54 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 1436.427780] gfs2: commit mount option requires a positive numeric argument [ 1436.455957] gfs2: can't parse mount arguments [ 1436.521974] gfs2: commit mount option requires a positive numeric argument [ 1436.529040] gfs2: can't parse mount arguments [ 1437.570751] Bluetooth: hci0: command 0x1003 tx timeout [ 1437.576240] Bluetooth: hci0: sending frame failed (-49) [ 1439.650754] Bluetooth: hci0: command 0x1001 tx timeout [ 1439.656150] Bluetooth: hci0: sending frame failed (-49) [ 1441.730714] Bluetooth: hci0: command 0x1009 tx timeout [ 1445.811097] FAULT_INJECTION: forcing a failure. [ 1445.811097] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.828785] CPU: 0 PID: 32714 Comm: syz-executor.3 Not tainted 5.0.0-rc7+ #79 [ 1445.836070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1445.845426] Call Trace: [ 1445.848026] dump_stack+0x172/0x1f0 [ 1445.851674] should_fail.cold+0xa/0x1b [ 1445.855577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1445.860690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1445.866231] ? __cancel_work_timer+0x313/0x520 [ 1445.870814] ? try_to_grab_pending+0x710/0x710 [ 1445.875405] __should_failslab+0x121/0x190 [ 1445.879651] should_failslab+0x9/0x14 [ 1445.883454] kmem_cache_alloc_node+0x56/0x710 [ 1445.887959] __alloc_skb+0xd5/0x5e0 [ 1445.891590] ? skb_scrub_packet+0x440/0x440 [ 1445.895920] ? lock_downgrade+0x810/0x810 [ 1445.900066] ? hci_dev_open+0x220/0x220 [ 1445.904053] hci_sock_dev_event+0xf3/0x590 [ 1445.908297] hci_unregister_dev+0x253/0x820 [ 1445.912627] hci_uart_tty_close+0x206/0x260 [ 1445.916957] ? hci_uart_close+0x50/0x50 [ 1445.920942] tty_ldisc_close.isra.0+0x100/0x180 [ 1445.925626] tty_set_ldisc+0x1f8/0x690 [ 1445.929532] tty_ioctl+0xe69/0x14d0 [ 1445.933163] ? tty_vhangup+0x30/0x30 [ 1445.936888] ? mark_held_locks+0x100/0x100 [ 1445.941133] ? proc_fail_nth_write+0x9d/0x1e0 [ 1445.945629] ? proc_cwd_link+0x1d0/0x1d0 [ 1445.949704] ? __fget+0x340/0x540 [ 1445.953159] ? ___might_sleep+0x163/0x280 [ 1445.957308] ? __might_sleep+0x95/0x190 [ 1445.961284] ? tty_vhangup+0x30/0x30 [ 1445.964998] do_vfs_ioctl+0xd6e/0x1390 [ 1445.968889] ? selinux_file_ioctl+0x46f/0x5e0 [ 1445.973389] ? selinux_file_ioctl+0x125/0x5e0 [ 1445.977887] ? ioctl_preallocate+0x210/0x210 [ 1445.982299] ? selinux_file_mprotect+0x620/0x620 [ 1445.987059] ? iterate_fd+0x360/0x360 [ 1445.990949] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1445.996495] ? fput+0x128/0x1a0 [ 1445.999787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.005330] ? security_file_ioctl+0x93/0xc0 [ 1446.009749] ksys_ioctl+0xab/0xd0 [ 1446.013207] __x64_sys_ioctl+0x73/0xb0 [ 1446.017105] do_syscall_64+0x103/0x610 [ 1446.021003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1446.026285] RIP: 0033:0x457e29 [ 1446.029480] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1446.048380] RSP: 002b:00007f1710148c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:47:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) 06:47:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002e008183ad5de0713c444d3c048801eba0070000002339a0053571cc37153e3776f9835b3f0004000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x400, 0x0) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f0000000380)={@null=' \x00', 0x0, 'bpq0\x00'}) recvmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x2, 0x0}}], 0x1, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getresuid(&(0x7f00000000c0), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) setreuid(r5, r6) 06:47:04 executing program 2 (fault-call:0 fault-nth:90): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:47:04 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000500)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x7c, r3, 0x104, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r1}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xbf7d}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8001}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40040}, 0x20048001) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000240)="b21a7a3a283dbbb8a94b5b9079a58cee1187efa92cee646e47efe69fa277f030dcd48466eaf7f19b50af2d42bd96426f3f9bf7b7ece5620615ade8d5f62e2c8d5c826ff83e7a3bbe5229e623daf7d28fc182e5d2b9cd47e4be154f7a82812a760fa76b98b6df47c1fc6befcb80ad9f5662226ccaf75ddb2b5102917a074ef98afaa895b6a1aa0f075375c668c215ff2bf3a6ccfd050edfc9bf885f0a5eb5f8acfe078d569fd05e77c0c7a4244fe973bf3b8c84706ce092daa94bc052776d68a21e1ed9c153b355303e751fa6bfd18f3e9763d4d4e337", 0xd6}, {&(0x7f0000000380)="928ea62a8a5f8baa1a512b6518d063f82ba1c28f711273ea7acbdae62e2ae20fd0cd84fd8580781a945b60877ed76c04fe58df7db9dd8063b66dd6f4a7ab9d7d1cc1dad991bd1f3eb5108875f4dce9f0a1724c5104a910c82343ba679a4a36cc64cdcc4a791661aadfb324455e0bae9c7a2cccc1aa16bee282556c8a11310b88e2d1116d49b0bb831e9f6080b579fc717c7cbb1c4bf52e08f5bb8e8977bca6d4294f3268e383c779bb8599a32729383ee48443c2cd998aad8b539f2ec9a112914a3b6038a32d23dc72fa145d0566a78679c0ff0c982ef116015990b96a3ba2", 0xdf}, {&(0x7f0000000040)="63fdd3ec1d765808a213e32f8eb5d2f5b188422cd398c8477046c594754586c27c51f3c02288e2370c9b2b3f89304d0374b6f296c11e4d869e72b42bb45856eb73edf84822cc41200c8ef24f570f60329d87", 0x52}], 0x3, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl(r2, 0x8, &(0x7f0000000140)="750d8d") socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000480)={0x0, 0x0, 0x4, 0x40, &(0x7f0000ffe000/0x2000)=nil, 0x6}) 06:47:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x40000) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1b) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:47:04 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 1446.056089] RAX: ffffffffffffffda RBX: 00007f1710148c90 RCX: 0000000000457e29 [ 1446.063352] RDX: 0000000020000180 RSI: 0000000000005423 RDI: 0000000000000005 [ 1446.070619] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1446.077900] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f17101496d4 [ 1446.085166] R13: 00000000004c2117 R14: 00000000004d49d8 R15: 0000000000000006 [ 1446.165195] FAULT_INJECTION: forcing a failure. [ 1446.165195] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.177825] gfs2: commit mount option requires a positive numeric argument [ 1446.204903] gfs2: can't parse mount arguments [ 1446.232813] CPU: 0 PID: 32765 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1446.240134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.249493] Call Trace: [ 1446.252099] dump_stack+0x172/0x1f0 [ 1446.255734] should_fail.cold+0xa/0x1b [ 1446.259642] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1446.264752] ? lock_downgrade+0x810/0x810 [ 1446.268916] ? ___might_sleep+0x163/0x280 [ 1446.273074] __should_failslab+0x121/0x190 [ 1446.277312] should_failslab+0x9/0x14 [ 1446.281114] kmem_cache_alloc_trace+0x2d1/0x760 [ 1446.285787] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1446.290905] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1446.296371] __list_lru_init+0x3d3/0x6e0 [ 1446.300443] sget_userns+0x84d/0xd30 [ 1446.304166] ? kill_litter_super+0x60/0x60 [ 1446.308409] ? ns_test_super+0x50/0x50 [ 1446.312297] ? ns_test_super+0x50/0x50 [ 1446.316183] ? kill_litter_super+0x60/0x60 [ 1446.320420] sget+0x10c/0x150 [ 1446.323533] mount_bdev+0xff/0x3c0 [ 1446.327080] ? xfs_test_remount_options+0x90/0x90 [ 1446.331935] xfs_fs_mount+0x35/0x40 [ 1446.335588] mount_fs+0x106/0x3ff [ 1446.339060] ? emergency_thaw_all+0x1a0/0x1a0 [ 1446.343559] ? __init_waitqueue_head+0x36/0x90 [ 1446.348155] vfs_kern_mount.part.0+0x6f/0x410 [ 1446.352702] do_mount+0x581/0x2d30 [ 1446.356245] ? copy_mount_options+0x41/0x440 [ 1446.360659] ? copy_mount_string+0x40/0x40 [ 1446.364906] ? kmem_cache_alloc_trace+0x354/0x760 [ 1446.369753] ? _copy_from_user+0xdd/0x150 [ 1446.373917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.379456] ? copy_mount_options+0x30e/0x440 [ 1446.383967] ksys_mount+0xdb/0x150 [ 1446.387514] __x64_sys_mount+0xbe/0x150 [ 1446.391505] do_syscall_64+0x103/0x610 [ 1446.395408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1446.400599] RIP: 0033:0x45a89a [ 1446.403813] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1446.422715] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:47:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:47:04 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r1, 0x10, &(0x7f0000000100)={&(0x7f0000000040)=""/110, 0x6e, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r2, 0x4) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") write$FUSE_STATFS(r0, &(0x7f0000000280)={0x60, 0xfffffffffffffff5, 0x7, {{0x40, 0x3cbf38c3, 0x16, 0x8, 0x4, 0x800, 0x7, 0x9e}}}, 0x60) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1446.430428] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1446.437698] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1446.444983] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1446.452253] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1446.459525] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:47:04 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000280)={[{0x497, 0x80000001, 0x9, 0x6, 0x48000000000000, 0x2, 0x1, 0x3b7, 0x3ff, 0x800, 0x5, 0x7, 0x3}, {0x3, 0x9, 0x1, 0x68280000000000, 0xbff3, 0x2e3a, 0x4b, 0x200, 0x5, 0x9, 0xff, 0x401, 0x800}, {0x10001, 0xfff, 0x7ff, 0x1d030d11, 0xffffffffffffffff, 0x2d688f3, 0x9, 0x0, 0x800, 0x80, 0x8, 0x2, 0x6}], 0x81}) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$getregset(0x4204, r1, 0x200, &(0x7f0000000100)={&(0x7f0000000040)=""/10, 0xa}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x43) [ 1446.478819] Bluetooth: hci0: Frame reassembly failed (-84) 06:47:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x1d) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x6, 0x100) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f00000000c0)="d91600303e2e0f01d10f0d2f440f20c0663505000000440f22c0b8b9000f00d0642e0f6431f7362027f2ab66b80500000066b9ade5a79d0f01d966b8070000000f23c00f21f86635000003000f23f8", 0x4f}], 0x1, 0x2, &(0x7f00000001c0)=[@dstype3={0x7, 0x8}], 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r2}) fstat(r1, &(0x7f00000002c0)) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000380)={&(0x7f0000000340)=[0x5], 0x1, 0x20, 0xfffffffffffffffd, 0xfffffffffffffbff, 0x1, 0x373f3e3b, {0x400, 0x9, 0x4, 0xfffffffffffff13b, 0x4, 0xffffffffffffffff, 0x8, 0x3e7a, 0x3, 0x4, 0x5, 0xc326, 0x6bd9, 0x3, "a26e658bff1651bffe17c5264d2cd39124c7cdccf7f71927f4b6ce5f9378d3c9"}}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000280)={r3, r4}) 06:47:04 executing program 1: socket$inet6(0xa, 0x80007, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:04 executing program 2 (fault-call:0 fault-nth:91): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1446.621481] gfs2: commit mount option requires a positive numeric argument [ 1446.638704] gfs2: can't parse mount arguments [ 1446.705779] FAULT_INJECTION: forcing a failure. [ 1446.705779] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.706081] gfs2: commit mount option requires a positive numeric argument [ 1446.729563] gfs2: can't parse mount arguments [ 1446.739672] CPU: 1 PID: 333 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1446.746812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.756169] Call Trace: [ 1446.758754] dump_stack+0x172/0x1f0 [ 1446.762389] should_fail.cold+0xa/0x1b [ 1446.766263] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1446.771355] ? lock_downgrade+0x810/0x810 [ 1446.775488] ? ___might_sleep+0x163/0x280 [ 1446.779631] __should_failslab+0x121/0x190 [ 1446.783876] should_failslab+0x9/0x14 [ 1446.787676] kmem_cache_alloc_trace+0x2d1/0x760 [ 1446.792332] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1446.797423] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1446.802337] __list_lru_init+0x3d3/0x6e0 [ 1446.806398] sget_userns+0x84d/0xd30 [ 1446.810094] ? kill_litter_super+0x60/0x60 [ 1446.814400] ? ns_test_super+0x50/0x50 [ 1446.818269] ? ns_test_super+0x50/0x50 [ 1446.822137] ? kill_litter_super+0x60/0x60 [ 1446.826361] sget+0x10c/0x150 [ 1446.829455] mount_bdev+0xff/0x3c0 [ 1446.832990] ? xfs_test_remount_options+0x90/0x90 [ 1446.837855] xfs_fs_mount+0x35/0x40 [ 1446.841469] mount_fs+0x106/0x3ff [ 1446.844904] ? emergency_thaw_all+0x1a0/0x1a0 [ 1446.849381] ? __init_waitqueue_head+0x36/0x90 [ 1446.853952] vfs_kern_mount.part.0+0x6f/0x410 [ 1446.858428] do_mount+0x581/0x2d30 [ 1446.861973] ? copy_mount_options+0x41/0x440 [ 1446.866375] ? copy_mount_string+0x40/0x40 [ 1446.870679] ? kmem_cache_alloc_trace+0x354/0x760 [ 1446.875505] ? _copy_from_user+0xdd/0x150 [ 1446.879640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1446.885161] ? copy_mount_options+0x30e/0x440 [ 1446.889641] ksys_mount+0xdb/0x150 [ 1446.893169] __x64_sys_mount+0xbe/0x150 [ 1446.897148] do_syscall_64+0x103/0x610 [ 1446.901042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1446.906237] RIP: 0033:0x45a89a [ 1446.909419] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1446.928302] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1446.935996] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1446.943267] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1446.950519] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1446.957771] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1446.965037] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1448.530774] Bluetooth: hci0: command 0x1003 tx timeout [ 1448.536240] Bluetooth: hci0: sending frame failed (-49) [ 1450.610831] Bluetooth: hci0: command 0x1001 tx timeout [ 1450.616264] Bluetooth: hci0: sending frame failed (-49) [ 1452.690808] Bluetooth: hci0: command 0x1009 tx timeout 06:47:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x2, &(0x7f0000000180)) 06:47:14 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000240)={"fb3dc02bce15635ea46e23dc1d44f54647c341d0b0e07023ceb686e00bfea21695b7d08ab4cab912f47b2588ad3c7862890ea34c7510d50d88da5f08c6b70d4522c56a5ba25ba23991108f76651634541022872ba700615c2418b69364a30ac67bc52728264d65158a0fc9990c7ab2cecdadb2bc685d32256c2729bf74fb26c36a3d4181227b78d38e65f959a0b596223c5d91aa732ed1cd60780e4a7e2edbb7f3c56f1cb081cb97813bec37c46e5d17b19959c5baa606a19a493654c1f1f84f6f321763b92b62a7a4723c356ab5560203b916a648693a10df259647825a35bb0d2a199d4eee7d4fd89927386e61fa2f14b355cb08b8f44860075f52d706a68732f13b5a66845c162d06563bd42c9274b7beeaac24978a71ebf1892dfd5305376614c04e1c1d6c675f0a37d63a47613f225c05704ffae3712c3972a650869935df32546d27cdf448583fd497ca0929d51171aa8e1d8eb3bf59c41e0b4968a390fb959d9a38fd02cd69eec20956c7137d38faca55670c741f91fdfd238f19973760e7163aafa4d59f3bc4325cad1abd6b774ce22ba7df526c160f9c079739373032ac5fbde2811f81a071143899be10feb6f2b47e9e41c8189481bdb95f3f9cdc00ccef25ada4b2f5262b9a55088946d88b89ad0d62ccbaba08cf20dbcb3362fa28728a4392c366b54b3c864ecb31abe748fb4be696f0bd31f9e389fdcd3fa14dc346f9b64ae6d6ec8bf4a6c768ef693c735720366f0bb51760ccaeed444f91d8d73252fb914903c20eea5117219854a15eb50b9f6b39577e5a22c7313f29de2563acfbbf131498dba6ff5ce98bcfcccde7048837b51fe5b29535b2ee0f425e2513d29c78a380ec572e7da13c4f3fafeb543c664e7aa920d183f0cece07f8dda83509847e20211f689ab686ab60087b204604338c4b85b25e7a9bccf913ba60e031e1a784864a18e37da586021dcc8e4753b9d806bd44dd449a560478dba3848cc3de1bdbcb035753275e1aca33120e6a89b3885883dfca1e1d4fea0f512f4cb115cd0bcf88da9f49200128c19062569f58ba1cfe716491c72d5986057da7e89fadb818fc6761883f6ce61b4d6c2a5752e61d0cb35d50887136c24967b8613ed86e8abbda62d2b259899d0219a29b519491eed99a64cb5ae2e8a532d371565462cb7852598de9882f17825b36923a58f3d9b9780378085cf9e3065134ef3156ffbe225eefbc113613b8ec70871ba1b715e4fe7ec1102ef1d849b7aa9e8f557616ff158b826be71080dbbbc60915693800053a79d47803924ba20c5cd732fa3d5a529a725b5940ce0a9d4f3397033d8f7151db70c413390972a89bb0cf6ac05d89ddf0541103c01147325c5f5b40ef21bd868d3382e74022e8512581aae3ca496f51a0ee37fc587f06e24fac98290e9bc4fdf8f8b2aeda47b558bc09c0fac89289"}) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffff7, 0xa000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000180)={{0x7, 0x7, 0x4, 0x0, 'syz0\x00', 0x10000}, 0x1ce5, 0x0, 0x5, r2, 0x1, 0x9, 'syz1\x00', &(0x7f0000000100)=['/dev/ptmx\x00'], 0xa, [], [0x3, 0x4, 0x1ff, 0x9]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:47:14 executing program 0 (fault-call:6 fault-nth:0): openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="5f4e5cb013f445e9034c29981ba7246f007f194a0d128974c5496d07962371926d171560bbd0aadf77d3a6159fada56b0dc278aac64dca2d6d1cf00e5b59369c2b16e9db1238db2f6a421d1dd9f4b81fb4ae277affdaf5fd6f036efc3e5ca73b", 0x60, 0x3f}], 0x2040080, &(0x7f0000000200)='gfs2\x00') 06:47:14 executing program 2 (fault-call:0 fault-nth:92): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1456.756770] FAULT_INJECTION: forcing a failure. [ 1456.756770] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.761261] gfs2: commit mount option requires a positive numeric argument [ 1456.795341] CPU: 0 PID: 350 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1456.802496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.811857] Call Trace: [ 1456.814468] dump_stack+0x172/0x1f0 [ 1456.818123] should_fail.cold+0xa/0x1b [ 1456.822033] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1456.827152] ? lock_downgrade+0x810/0x810 [ 1456.831322] ? ___might_sleep+0x163/0x280 [ 1456.835485] __should_failslab+0x121/0x190 [ 1456.835550] gfs2: can't parse mount arguments [ 1456.839729] should_failslab+0x9/0x14 [ 1456.839744] kmem_cache_alloc_trace+0x2d1/0x760 [ 1456.839762] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1456.857815] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1456.862766] __list_lru_init+0x3d3/0x6e0 [ 1456.866842] sget_userns+0x84d/0xd30 [ 1456.870569] ? kill_litter_super+0x60/0x60 [ 1456.874819] ? ns_test_super+0x50/0x50 [ 1456.878721] ? ns_test_super+0x50/0x50 [ 1456.882618] ? kill_litter_super+0x60/0x60 [ 1456.886862] sget+0x10c/0x150 [ 1456.890008] mount_bdev+0xff/0x3c0 [ 1456.893578] ? xfs_test_remount_options+0x90/0x90 [ 1456.898439] xfs_fs_mount+0x35/0x40 [ 1456.902081] mount_fs+0x106/0x3ff 06:47:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000080)=@netrom) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) 06:47:15 executing program 1: socket$inet6(0xa, 0x5, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x689e, 0xbe}], 0x1) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100)=0x5, 0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x7, 0xf, 0xf297, 0x200, "e067d9b4d7ad798f4836f9100b13f100c39acecb37e4f6d4cb0ab5f6bbc2656a"}) 06:47:15 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1456.905551] ? emergency_thaw_all+0x1a0/0x1a0 [ 1456.910068] ? __init_waitqueue_head+0x36/0x90 [ 1456.914668] vfs_kern_mount.part.0+0x6f/0x410 [ 1456.919188] do_mount+0x581/0x2d30 [ 1456.922741] ? copy_mount_options+0x41/0x440 [ 1456.922761] ? copy_mount_string+0x40/0x40 [ 1456.922778] ? kmem_cache_alloc_trace+0x354/0x760 [ 1456.922801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.922815] ? copy_mount_options+0x30e/0x440 [ 1456.931938] ksys_mount+0xdb/0x150 [ 1456.931956] __x64_sys_mount+0xbe/0x150 [ 1456.931976] do_syscall_64+0x103/0x610 [ 1456.931995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.932005] RIP: 0033:0x45a89a [ 1456.932018] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1456.932025] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1456.932038] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1456.932047] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1456.932054] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1456.932063] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1456.932069] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1457.035112] Bluetooth: hci0: Frame reassembly failed (-84) 06:47:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1d) [ 1457.054425] Bluetooth: hci0: Frame reassembly failed (-84) [ 1457.068632] Bluetooth: hci1: Frame reassembly failed (-84) [ 1457.076958] Bluetooth: hci1: Frame reassembly failed (-84) 06:47:15 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:15 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) r0 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000240)="ffc7245fdad2277a3ff2633f503e42d96163a344ee531445009137ef49d7000e19abb2c6433fcfba24919538002a67541d9856c60a0c54a407a9bc9fd7d1e2b25fea8f74852c39bdaeb6faa1af48c05289efcca6a57d7ffcc7bec45bdfbe278d890fe54324be34435dd580873dbb6dc3481a687dad3c02b99584a07bdbf4d28c9c728f0ba72ec699232e63fe87e069823db04e976deb21f84566adbd526c0930a3a4ee34241a", 0xa6, 0xfffffffffffffff9) r1 = request_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000300)='/dev/nullb0\x00', 0xfffffffffffffff9) keyctl$negate(0xd, r0, 0x6, r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1457.197231] gfs2: commit mount option requires a positive numeric argument [ 1457.214863] gfs2: can't parse mount arguments [ 1459.090761] Bluetooth: hci1: command 0x1003 tx timeout [ 1459.096194] Bluetooth: hci0: command 0x1003 tx timeout [ 1459.102094] Bluetooth: hci1: Frame reassembly failed (-84) [ 1459.107176] Bluetooth: hci0: sending frame failed (-49) [ 1461.170715] Bluetooth: hci1: command 0x1001 tx timeout [ 1461.170720] Bluetooth: hci0: command 0x1001 tx timeout [ 1461.170791] Bluetooth: hci0: sending frame failed (-49) [ 1461.187359] Bluetooth: hci1: Frame reassembly failed (-84) [ 1463.250765] Bluetooth: hci1: command 0x1009 tx timeout [ 1463.256116] Bluetooth: hci0: command 0x1009 tx timeout 06:47:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x4b47, &(0x7f0000000180)) 06:47:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x0, 0xe160, 0x8, 0x8, 0x1}) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x42) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) 06:47:25 executing program 2 (fault-call:0 fault-nth:93): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:47:25 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:25 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x15, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) write$selinux_context(r0, &(0x7f0000000040)='system_u:object_r:iptables_exec_t:s0\x00', 0x25) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000240)={0x8, 0x1, 'client1\x00', 0xffffffff80000005, "afd75ae3917647a1", "4237d9daef99e86756842fabc751c5aab7cba46d50ff0940d08c1e9d903fde85", 0x3, 0xfffffffffffffffe}) 06:47:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f676d0500000000000000303034303130303030303030302c00"]) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x60200, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1467.711856] FAULT_INJECTION: forcing a failure. [ 1467.711856] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.730487] gfs2: invalid mount option: cogm [ 1467.740873] gfs2: can't parse mount arguments 06:47:25 executing program 1: socket$inet6(0xa, 0x5, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1467.765200] CPU: 1 PID: 387 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1467.772333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.772341] Call Trace: [ 1467.772365] dump_stack+0x172/0x1f0 [ 1467.772384] should_fail.cold+0xa/0x1b [ 1467.791828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1467.796948] ? lock_downgrade+0x810/0x810 [ 1467.801111] ? ___might_sleep+0x163/0x280 [ 1467.805355] __should_failslab+0x121/0x190 [ 1467.809600] should_failslab+0x9/0x14 06:47:25 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x9}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xe) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, {0xa, 0x4e22, 0x0, @mcast2}, 0x6, [0xfffffffffffff9e3, 0x0, 0x4, 0x3, 0x40, 0x9, 0x100000000]}, 0x5c) [ 1467.813409] kmem_cache_alloc_trace+0x2d1/0x760 [ 1467.818091] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1467.823205] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1467.828159] __list_lru_init+0x3d3/0x6e0 [ 1467.832235] sget_userns+0x84d/0xd30 [ 1467.835953] ? kill_litter_super+0x60/0x60 [ 1467.835972] ? ns_test_super+0x50/0x50 [ 1467.835989] ? ns_test_super+0x50/0x50 [ 1467.836004] ? kill_litter_super+0x60/0x60 [ 1467.847979] sget+0x10c/0x150 [ 1467.855296] mount_bdev+0xff/0x3c0 [ 1467.858837] ? xfs_test_remount_options+0x90/0x90 [ 1467.858857] xfs_fs_mount+0x35/0x40 [ 1467.858875] mount_fs+0x106/0x3ff [ 1467.858891] ? emergency_thaw_all+0x1a0/0x1a0 [ 1467.875259] ? __init_waitqueue_head+0x36/0x90 [ 1467.879848] vfs_kern_mount.part.0+0x6f/0x410 [ 1467.879869] do_mount+0x581/0x2d30 [ 1467.879883] ? copy_mount_options+0x41/0x440 [ 1467.879900] ? copy_mount_string+0x40/0x40 [ 1467.879920] ? kmem_cache_alloc_trace+0x354/0x760 [ 1467.901800] ? _copy_from_user+0xdd/0x150 [ 1467.905954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 06:47:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/4096) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000001800)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001180)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001340)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000001440)=0xe8) sendmsg$nl_route(r2, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x40800002}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)=@ipv4_getroute={0x1c, 0x1a, 0x101, 0x70bd2c, 0x25dfdbfb, {0x2, 0x14, 0x80, 0x5, 0xfd, 0x3, 0xc8, 0x7, 0x2000}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x10) fstat(r1, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() ioctl$VT_WAITACTIVE(r2, 0x5607) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x20800, &(0x7f0000001500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',max_read=0x2000000000000004,blksize=0x0000000000000400,default_permissions,appraise,fowner>', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB=',subj_user=/dev/ptmx\x00,subj_type=/dev/ptmx\x00,\x00']) readlink(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=""/148, 0x94) r8 = add_key$keyring(&(0x7f0000001680)='keyring\x00', &(0x7f00000017c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r8) [ 1467.908648] Bluetooth: hci0: Frame reassembly failed (-84) [ 1467.911501] ? copy_mount_options+0x30e/0x440 [ 1467.911523] ksys_mount+0xdb/0x150 [ 1467.911542] __x64_sys_mount+0xbe/0x150 [ 1467.911561] do_syscall_64+0x103/0x610 [ 1467.911581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1467.911592] RIP: 0033:0x45a89a [ 1467.911606] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1467.911613] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1467.911626] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1467.911637] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1467.982549] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1467.989826] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1467.997099] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1468.007023] Bluetooth: hci1: Frame reassembly failed (-84) 06:47:26 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:47:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="a4a7106c"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/94) [ 1468.145327] gfs2: invalid mount option: ¤§l [ 1468.149876] gfs2: can't parse mount arguments [ 1469.970725] Bluetooth: hci0: command 0x1003 tx timeout [ 1469.976196] Bluetooth: hci0: sending frame failed (-49) [ 1470.050868] Bluetooth: hci1: command 0x1003 tx timeout [ 1470.056543] Bluetooth: hci1: Frame reassembly failed (-84) [ 1472.050715] Bluetooth: hci0: command 0x1001 tx timeout [ 1472.056117] Bluetooth: hci0: sending frame failed (-49) [ 1472.130953] Bluetooth: hci1: command 0x1001 tx timeout [ 1472.136485] Bluetooth: hci1: Frame reassembly failed (-84) [ 1474.130701] Bluetooth: hci0: command 0x1009 tx timeout [ 1474.210865] Bluetooth: hci1: command 0x1009 tx timeout 06:47:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x4b49, &(0x7f0000000180)) 06:47:36 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000240)={{0x8, 0x5}, 'port1\x00', 0x20, 0x20000, 0x673, 0xfffffffffffffffd, 0x9, 0x2, 0x7ff, 0x0, 0x4, 0x118}) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000300)={"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"}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 06:47:36 executing program 2 (fault-call:0 fault-nth:94): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:47:36 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x300}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r0, 0x5427) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x21a000, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000180)=""/234) 06:47:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x1, @rand_addr="beb138fe46f6b267b36b5fadaeeedfbf", 0x5}, @in6={0xa, 0x4e21, 0x7, @ipv4={[], [], @local}, 0x9}, @in6={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in6={0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e21, 0x7fffffff, @rand_addr="79b465b16bbe4a4a460d864a82989916", 0x4}], 0xac) [ 1478.592490] FAULT_INJECTION: forcing a failure. [ 1478.592490] name failslab, interval 1, probability 0, space 0, times 0 [ 1478.634733] gfs2: commit mount option requires a positive numeric argument [ 1478.634823] CPU: 1 PID: 426 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1478.644071] Bluetooth: hci0: Frame reassembly failed (-84) [ 1478.649052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1478.649058] Call Trace: [ 1478.649081] dump_stack+0x172/0x1f0 [ 1478.649102] should_fail.cold+0xa/0x1b [ 1478.674132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1478.677691] gfs2: can't parse mount arguments 06:47:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x400801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) ioctl$TIOCNXCL(r0, 0x540d) 06:47:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1d) [ 1478.679243] ? check_preemption_disabled+0x48/0x290 [ 1478.679262] ? ___might_sleep+0x163/0x280 [ 1478.679279] __should_failslab+0x121/0x190 [ 1478.697134] should_failslab+0x9/0x14 [ 1478.700944] __kmalloc+0x2dc/0x740 [ 1478.704501] ? match_wildcard+0x320/0x320 [ 1478.708658] ? kmem_alloc+0xd2/0x200 [ 1478.712385] kmem_alloc+0xd2/0x200 [ 1478.715950] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1478.721498] xfs_alloc_buftarg+0x2a/0x2e0 [ 1478.725654] xfs_open_devices+0x250/0x560 [ 1478.729811] ? xfs_blkdev_put+0x30/0x30 06:47:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f0000000280)=@v2={0x5, 0x0, 0x4, 0xffff, 0x8e, "0610cb6eb66686f4c794fd4ffa0d153dfb58743eadd30e79404c03f1bcd1f57502630930917a34668e3e45e803eb560957e8e4ee014ed3fc0a87204ffad1d155caf10f63ab9732eeaa57348c31a0cf782b51d067d0b002273c81897d704dba13a44003496614c7b758508a606b2015e243eec80ca4c620f7a0ee5be5edb4616e322a76e0e9e1689828ee52a98f55"}, 0x98, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1478.733793] ? set_blocksize+0x2bf/0x340 [ 1478.737870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1478.743423] ? sb_set_blocksize+0xe4/0x110 [ 1478.747671] xfs_fs_fill_super+0x6f7/0x14f0 [ 1478.752037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1478.757590] mount_bdev+0x307/0x3c0 [ 1478.761222] ? xfs_test_remount_options+0x90/0x90 [ 1478.766079] xfs_fs_mount+0x35/0x40 [ 1478.769723] mount_fs+0x106/0x3ff [ 1478.773195] ? emergency_thaw_all+0x1a0/0x1a0 [ 1478.777699] ? __init_waitqueue_head+0x36/0x90 06:47:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40000000, 0x0, 0x835, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) [ 1478.782301] vfs_kern_mount.part.0+0x6f/0x410 [ 1478.786807] do_mount+0x581/0x2d30 [ 1478.790353] ? copy_mount_options+0x41/0x440 [ 1478.794770] ? copy_mount_string+0x40/0x40 [ 1478.799014] ? kmem_cache_alloc_trace+0x354/0x760 [ 1478.803870] ? _copy_from_user+0xdd/0x150 [ 1478.808027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1478.813573] ? copy_mount_options+0x30e/0x440 [ 1478.818078] ksys_mount+0xdb/0x150 [ 1478.821622] __x64_sys_mount+0xbe/0x150 [ 1478.825611] do_syscall_64+0x103/0x610 [ 1478.829510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1478.834734] RIP: 0033:0x45a89a [ 1478.837931] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1478.856831] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1478.864542] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1478.871812] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 06:47:37 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x900}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:37 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, r2, 0x40f, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x0, 0x8, @l2={'ib', 0x3a, 'eql\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4008014}, 0x800) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x22}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x7, 0x9, 0xfffffffffffffffa, 0xfff, r4}, &(0x7f0000000340)=0x10) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x7aed, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000200), 0x0) [ 1478.879080] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1478.886347] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1478.893617] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1479.076788] XFS (loop2): Invalid superblock magic number [ 1480.690751] Bluetooth: hci0: command 0x1003 tx timeout [ 1480.696350] Bluetooth: hci0: sending frame failed (-49) [ 1481.882136] audit: type=1400 audit(4294968460.030:127): avc: denied { map } for pid=566 comm="syz-executor.5" path="/root/syz-executor.5" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1482.110725] IPVS: ftp: loaded support on port[0] = 21 [ 1482.705019] chnl_net:caif_netlink_parms(): no params data found [ 1482.770765] Bluetooth: hci0: command 0x1001 tx timeout [ 1482.776165] Bluetooth: hci0: sending frame failed (-49) [ 1482.942785] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.949239] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.957137] device bridge_slave_0 entered promiscuous mode [ 1482.965171] device bridge_slave_1 left promiscuous mode [ 1482.971285] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.021683] device bridge_slave_0 left promiscuous mode [ 1483.027214] bridge0: port 1(bridge_slave_0) entered disabled state [ 1484.850762] Bluetooth: hci0: command 0x1009 tx timeout 06:47:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x5409, &(0x7f0000000180)) 06:47:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x40240) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x400000, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20) 06:47:46 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x34000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:46 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000040)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x24c, &(0x7f00000000c0)={0x0, 0x80000000}, 0x0, &(0x7f0000000140)={0x1bb}, &(0x7f0000000080), 0x0) 06:47:46 executing program 2 (fault-call:0 fault-nth:95): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:47:46 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)={{0x1cf, 0x80000000, 0x8, 0x2fc, 0xd7, 0x0, 0x11a, 0x3bda}, "b588787adf9811fb6547b5a18e7f27ff2207952d034e10a76ca7d88d317463ea3fc43dba6dc8f35218ac02365c83b510975be7b87759c6134d1f474bee7692aa244e0d3b6a8719128a8f675a4bf521023970c47a", [[], []]}, 0x274) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000040)=0xc80) [ 1488.782510] gfs2: commit mount option requires a positive numeric argument [ 1488.790163] gfs2: can't parse mount arguments [ 1488.797746] FAULT_INJECTION: forcing a failure. [ 1488.797746] name failslab, interval 1, probability 0, space 0, times 0 [ 1488.831058] Bluetooth: hci0: Frame reassembly failed (-84) [ 1488.838838] CPU: 0 PID: 578 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1488.845960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.855321] Call Trace: [ 1488.857932] dump_stack+0x172/0x1f0 [ 1488.861579] should_fail.cold+0xa/0x1b [ 1488.865474] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1488.870592] ? check_preemption_disabled+0x48/0x290 [ 1488.875621] ? ___might_sleep+0x163/0x280 [ 1488.879777] __should_failslab+0x121/0x190 [ 1488.884020] should_failslab+0x9/0x14 [ 1488.887820] __kmalloc+0x2dc/0x740 [ 1488.891363] ? match_wildcard+0x320/0x320 [ 1488.895515] ? kmem_alloc+0xd2/0x200 [ 1488.899241] kmem_alloc+0xd2/0x200 [ 1488.902802] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1488.908346] xfs_alloc_buftarg+0x2a/0x2e0 [ 1488.912500] xfs_open_devices+0x250/0x560 [ 1488.916651] ? xfs_blkdev_put+0x30/0x30 [ 1488.920629] ? set_blocksize+0x2bf/0x340 [ 1488.924694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1488.930235] ? sb_set_blocksize+0xe4/0x110 [ 1488.934475] xfs_fs_fill_super+0x6f7/0x14f0 [ 1488.938798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1488.944345] mount_bdev+0x307/0x3c0 [ 1488.947970] ? xfs_test_remount_options+0x90/0x90 [ 1488.952823] xfs_fs_mount+0x35/0x40 [ 1488.956454] mount_fs+0x106/0x3ff [ 1488.959916] ? emergency_thaw_all+0x1a0/0x1a0 [ 1488.964417] ? __init_waitqueue_head+0x36/0x90 [ 1488.969018] vfs_kern_mount.part.0+0x6f/0x410 [ 1488.973538] do_mount+0x581/0x2d30 [ 1488.977094] ? copy_mount_options+0x41/0x440 [ 1488.981530] ? copy_mount_string+0x40/0x40 [ 1488.985765] ? kmem_cache_alloc_trace+0x354/0x760 [ 1488.990621] ? _copy_from_user+0xdd/0x150 [ 1488.994779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1489.000323] ? copy_mount_options+0x30e/0x440 [ 1489.004843] ksys_mount+0xdb/0x150 [ 1489.008393] __x64_sys_mount+0xbe/0x150 [ 1489.012377] do_syscall_64+0x103/0x610 [ 1489.016272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1489.021456] RIP: 0033:0x45a89a [ 1489.024654] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1489.043567] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1489.051281] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1489.058551] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1489.065825] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1489.073097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:47:47 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc0f023c023f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=""/4096, &(0x7f0000000040)=0x1000) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1489.080364] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 06:47:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYRES32=0x0]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r0, r1, 0x80000) [ 1489.223518] XFS (loop2): Invalid superblock magic number [ 1489.289444] gfs2: not a GFS2 filesystem 06:47:47 executing program 2 (fault-call:0 fault-nth:96): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1489.380540] FAULT_INJECTION: forcing a failure. [ 1489.380540] name failslab, interval 1, probability 0, space 0, times 0 [ 1489.416083] CPU: 0 PID: 605 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1489.423234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1489.432593] Call Trace: [ 1489.435203] dump_stack+0x172/0x1f0 [ 1489.438852] should_fail.cold+0xa/0x1b [ 1489.442764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1489.447880] ? lock_downgrade+0x810/0x810 [ 1489.452042] ? ___might_sleep+0x163/0x280 [ 1489.456203] __should_failslab+0x121/0x190 [ 1489.460834] should_failslab+0x9/0x14 [ 1489.464733] kmem_cache_alloc_trace+0x2d1/0x760 [ 1489.469423] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1489.474542] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1489.479480] __list_lru_init+0x3d3/0x6e0 [ 1489.483552] sget_userns+0x84d/0xd30 [ 1489.487283] ? kill_litter_super+0x60/0x60 [ 1489.491529] ? ns_test_super+0x50/0x50 [ 1489.495422] ? ns_test_super+0x50/0x50 [ 1489.499332] ? kill_litter_super+0x60/0x60 [ 1489.503580] sget+0x10c/0x150 [ 1489.506707] mount_bdev+0xff/0x3c0 [ 1489.510252] ? xfs_test_remount_options+0x90/0x90 [ 1489.515102] xfs_fs_mount+0x35/0x40 [ 1489.518742] mount_fs+0x106/0x3ff [ 1489.522222] ? emergency_thaw_all+0x1a0/0x1a0 [ 1489.526729] ? __init_waitqueue_head+0x36/0x90 [ 1489.531327] vfs_kern_mount.part.0+0x6f/0x410 [ 1489.535837] do_mount+0x581/0x2d30 [ 1489.539385] ? copy_mount_options+0x41/0x440 [ 1489.543808] ? copy_mount_string+0x40/0x40 [ 1489.548047] ? kmem_cache_alloc_trace+0x354/0x760 [ 1489.552911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1489.558465] ? copy_mount_options+0x30e/0x440 [ 1489.562986] ksys_mount+0xdb/0x150 [ 1489.566544] __x64_sys_mount+0xbe/0x150 [ 1489.570525] do_syscall_64+0x103/0x610 [ 1489.574427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1489.579705] RIP: 0033:0x45a89a [ 1489.582902] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1489.601815] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1489.609535] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1489.616816] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1489.624092] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1489.631366] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1489.638641] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1490.026530] gfs2: not a GFS2 filesystem [ 1490.033386] device hsr_slave_1 left promiscuous mode [ 1490.077001] device hsr_slave_0 left promiscuous mode [ 1490.125916] team0 (unregistering): Port device team_slave_1 removed [ 1490.149689] team0 (unregistering): Port device team_slave_0 removed [ 1490.176742] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1490.266587] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1490.420594] bond0 (unregistering): Released all slaves [ 1490.575271] bridge0: port 2(bridge_slave_1) entered blocking state [ 1490.584384] bridge0: port 2(bridge_slave_1) entered disabled state [ 1490.598781] device bridge_slave_1 entered promiscuous mode [ 1490.644770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1490.660312] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1490.733381] team0: Port device team_slave_0 added [ 1490.745416] team0: Port device team_slave_1 added [ 1490.850839] Bluetooth: hci0: command 0x1003 tx timeout [ 1490.856213] Bluetooth: hci0: sending frame failed (-49) [ 1490.870364] device hsr_slave_0 entered promiscuous mode [ 1490.911057] device hsr_slave_1 entered promiscuous mode [ 1491.057588] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1491.095369] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1491.114521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1491.135043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1491.157797] 8021q: adding VLAN 0 to HW filter on device team0 [ 1491.179953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1491.196761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1491.208349] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.214761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.246973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1491.254579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1491.268618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1491.288071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.294489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1491.327559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1491.358468] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1491.390269] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1491.408342] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1491.419906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1491.434999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1491.446446] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1491.468764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1491.490452] 8021q: adding VLAN 0 to HW filter on device batadv0 06:47:49 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x3, 0x7ff, 0x2}) fremovexattr(r0, &(0x7f00000000c0)=@random={'system.', '/dev/ptmx\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x204040, 0xe2) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000180)=""/224) setsockopt$ax25_int(r2, 0x101, 0xf, &(0x7f0000000080)=0x8, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) 06:47:49 executing program 2 (fault-call:0 fault-nth:97): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:47:49 executing program 1: socket$inet6(0xa, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000080)={0x3e, 0x9, 0x35}) [ 1491.678158] FAULT_INJECTION: forcing a failure. [ 1491.678158] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.739352] CPU: 0 PID: 624 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1491.746504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1491.755876] Call Trace: [ 1491.758477] dump_stack+0x172/0x1f0 [ 1491.762115] should_fail.cold+0xa/0x1b [ 1491.766009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1491.771580] ? lock_downgrade+0x810/0x810 [ 1491.775735] ? ___might_sleep+0x163/0x280 [ 1491.779889] __should_failslab+0x121/0x190 [ 1491.784136] should_failslab+0x9/0x14 [ 1491.787942] __kmalloc+0x2dc/0x740 [ 1491.791489] ? __list_lru_init+0xd5/0x6e0 [ 1491.795652] __list_lru_init+0xd5/0x6e0 [ 1491.799639] xfs_alloc_buftarg+0x120/0x2e0 [ 1491.803885] xfs_open_devices+0x250/0x560 [ 1491.808050] ? xfs_blkdev_put+0x30/0x30 [ 1491.812038] ? set_blocksize+0x2bf/0x340 [ 1491.816121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1491.821671] ? sb_set_blocksize+0xe4/0x110 [ 1491.825937] xfs_fs_fill_super+0x6f7/0x14f0 [ 1491.830271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1491.835820] mount_bdev+0x307/0x3c0 [ 1491.839446] ? xfs_test_remount_options+0x90/0x90 [ 1491.844293] xfs_fs_mount+0x35/0x40 [ 1491.847926] mount_fs+0x106/0x3ff [ 1491.851384] ? emergency_thaw_all+0x1a0/0x1a0 [ 1491.855882] ? __init_waitqueue_head+0x36/0x90 [ 1491.860479] vfs_kern_mount.part.0+0x6f/0x410 [ 1491.865002] do_mount+0x581/0x2d30 [ 1491.868564] ? copy_mount_options+0x41/0x440 [ 1491.872978] ? copy_mount_string+0x40/0x40 [ 1491.877213] ? kmem_cache_alloc_trace+0x354/0x760 [ 1491.882067] ? _copy_from_user+0xdd/0x150 [ 1491.886221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1491.891763] ? copy_mount_options+0x30e/0x440 [ 1491.896275] ksys_mount+0xdb/0x150 [ 1491.899829] __x64_sys_mount+0xbe/0x150 [ 1491.903811] do_syscall_64+0x103/0x610 [ 1491.907706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1491.912896] RIP: 0033:0x45a89a [ 1491.916094] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1491.934997] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1491.942713] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1491.949985] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1491.957268] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1491.964536] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1491.971805] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1492.930801] Bluetooth: hci0: command 0x1001 tx timeout [ 1492.936307] Bluetooth: hci0: sending frame failed (-49) [ 1495.010851] Bluetooth: hci0: command 0x1009 tx timeout 06:47:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x540b, &(0x7f0000000180)) 06:47:57 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x400300}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0x1, 0x4) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x3b54464f, 0x10000) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7ff) ioperm(0x2, 0x8, 0xfff) 06:47:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0x8000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90053, r1, 0x1b) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000180)=""/221) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x8010, r0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x100, 0x0) 06:47:57 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$inet_sctp(0x2, 0x1, 0x84) clock_gettime(0x0, &(0x7f0000000040)) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000003c0)=0x9) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0x52, "5dc877c9ffebc0e1aaaa441eccb83b7753c328aa983f5ac0380a2ab010aea6e53e3ce2da58d00b3294a13d24969e041b0ca99ac88b24bc4f9072fba2fe110c998f5b629b4408f72fa6b7620a8fca18c9641a"}, &(0x7f0000000080)=0x5a) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x101, 0x203, 0xec, 0x2, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r4, 0x2, 0x5, 0x81, 0xffffffffffff0000, 0xffff, 0x7f, 0x4, {r5, @in={{0x2, 0x4e22, @rand_addr=0x6}}, 0xd7, 0xdd2, 0xf3f, 0xfffffffffffffffd, 0x8}}, &(0x7f0000000380)=0xb0) 06:47:57 executing program 2 (fault-call:0 fault-nth:98): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1499.015839] FAULT_INJECTION: forcing a failure. [ 1499.015839] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.029609] gfs2: commit mount option requires a positive numeric argument [ 1499.043418] CPU: 1 PID: 649 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1499.050556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.060012] Call Trace: [ 1499.062631] dump_stack+0x172/0x1f0 [ 1499.066274] should_fail.cold+0xa/0x1b [ 1499.070198] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1499.075323] ? lock_downgrade+0x810/0x810 [ 1499.079489] ? ___might_sleep+0x163/0x280 [ 1499.083653] __should_failslab+0x121/0x190 [ 1499.087900] ? cancel_delayed_work+0x2d0/0x2d0 [ 1499.087917] should_failslab+0x9/0x14 [ 1499.087937] kmem_cache_alloc_trace+0x2d1/0x760 [ 1499.093410] gfs2: can't parse mount arguments [ 1499.096308] ? lockdep_init_map+0x10c/0x5b0 [ 1499.096328] ? cancel_delayed_work+0x2d0/0x2d0 [ 1499.096345] __kthread_create_on_node+0xf2/0x460 [ 1499.109809] ? kthread_parkme+0xb0/0xb0 [ 1499.109835] ? __lock_is_held+0xb6/0x140 [ 1499.119144] ? check_preemption_disabled+0x48/0x290 [ 1499.119164] ? cancel_delayed_work+0x2d0/0x2d0 [ 1499.119180] kthread_create_on_node+0xbb/0xf0 [ 1499.132194] ? __kthread_create_on_node+0x460/0x460 [ 1499.132214] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 1499.132230] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1499.132246] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1499.132272] init_rescuer.part.0+0x7d/0x190 [ 1499.146326] __alloc_workqueue_key+0xb0e/0xe00 [ 1499.146339] ? up_write+0x1c/0x150 [ 1499.146360] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1499.170495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.170515] ? xfs_open_devices+0x14a/0x560 [ 1499.170529] ? xfs_blkdev_put+0x30/0x30 [ 1499.184587] xfs_init_mount_workqueues+0x6d/0x6d0 [ 1499.184603] ? sb_set_blocksize+0xe4/0x110 [ 1499.184621] xfs_fs_fill_super+0x719/0x14f0 [ 1499.184638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.192905] mount_bdev+0x307/0x3c0 [ 1499.192921] ? xfs_test_remount_options+0x90/0x90 [ 1499.192937] xfs_fs_mount+0x35/0x40 [ 1499.192953] mount_fs+0x106/0x3ff [ 1499.202003] ? emergency_thaw_all+0x1a0/0x1a0 [ 1499.231806] ? __init_waitqueue_head+0x36/0x90 [ 1499.236399] vfs_kern_mount.part.0+0x6f/0x410 [ 1499.240907] do_mount+0x581/0x2d30 [ 1499.244460] ? copy_mount_options+0x41/0x440 [ 1499.248885] ? copy_mount_string+0x40/0x40 [ 1499.253125] ? kmem_cache_alloc_trace+0x354/0x760 [ 1499.257980] ? _copy_from_user+0xdd/0x150 06:47:57 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x2000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:57 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x2, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0xfa8b, 0x0, 0x7fff, 0x9, r1}, 0x10) exit_group(0x9) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000300)={0x4}) ioctl$KDSKBLED(r0, 0x4b65, 0x2) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000280)={0x0, 0x7530}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x5, 0x7) ioctl(r2, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f8788a0707243b08e5683d2e3eef48a85b8410100008000000000fa9cfb26") ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000002c0)={0x8, 0x0, 0x1, r3}) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa3714cf7dd54fd35) [ 1499.262148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.267693] ? copy_mount_options+0x30e/0x440 [ 1499.272205] ksys_mount+0xdb/0x150 [ 1499.275759] __x64_sys_mount+0xbe/0x150 [ 1499.279754] do_syscall_64+0x103/0x610 [ 1499.283664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.288855] RIP: 0033:0x45a89a [ 1499.292054] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 06:47:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000240)=""/154, &(0x7f0000000040)=0x9a) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:47:57 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x3000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1499.310961] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1499.318675] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1499.325945] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1499.333230] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1499.340498] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1499.347780] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1499.355588] audit: type=1400 audit(4294968477.450:128): avc: denied { map } for pid=643 comm="syz-executor.5" path="/dev/ptmx" dev="devtmpfs" ino=15077 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file permissive=1 06:47:57 executing program 5: r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000080)={{0x3, @null}, [@bcast, @bcast, @bcast, @rose, @bcast, @netrom, @bcast]}, &(0x7f0000000000)=0x48, 0x80000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1d) 06:47:57 executing program 2 (fault-call:0 fault-nth:99): syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1499.532500] FAULT_INJECTION: forcing a failure. [ 1499.532500] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.555424] CPU: 0 PID: 680 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #79 [ 1499.562568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.571925] Call Trace: [ 1499.574527] dump_stack+0x172/0x1f0 [ 1499.578167] should_fail.cold+0xa/0x1b [ 1499.582069] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1499.587183] ? lock_downgrade+0x810/0x810 [ 1499.591336] ? ___might_sleep+0x163/0x280 [ 1499.595495] __should_failslab+0x121/0x190 [ 1499.599737] should_failslab+0x9/0x14 [ 1499.603542] kmem_cache_alloc_node_trace+0x270/0x720 [ 1499.608651] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1499.613497] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1499.618606] alloc_worker+0x47/0x1c0 [ 1499.622321] init_rescuer.part.0+0x1f/0x190 [ 1499.626649] __alloc_workqueue_key+0xb0e/0xe00 [ 1499.631232] ? up_write+0x1c/0x150 [ 1499.634785] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1499.639818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.645377] ? xfs_open_devices+0x14a/0x560 [ 1499.649710] ? xfs_blkdev_put+0x30/0x30 [ 1499.653686] xfs_init_mount_workqueues+0x6d/0x6d0 [ 1499.658535] ? sb_set_blocksize+0xe4/0x110 [ 1499.662779] xfs_fs_fill_super+0x719/0x14f0 [ 1499.667107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.672654] mount_bdev+0x307/0x3c0 [ 1499.676278] ? xfs_test_remount_options+0x90/0x90 [ 1499.681139] xfs_fs_mount+0x35/0x40 [ 1499.684778] mount_fs+0x106/0x3ff [ 1499.688235] ? emergency_thaw_all+0x1a0/0x1a0 [ 1499.692742] ? __init_waitqueue_head+0x36/0x90 [ 1499.697336] vfs_kern_mount.part.0+0x6f/0x410 [ 1499.701839] do_mount+0x581/0x2d30 [ 1499.705409] ? copy_mount_options+0x41/0x440 [ 1499.709825] ? copy_mount_string+0x40/0x40 [ 1499.714062] ? kmem_cache_alloc_trace+0x354/0x760 [ 1499.718912] ? _copy_from_user+0xdd/0x150 [ 1499.723076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.728614] ? copy_mount_options+0x30e/0x440 [ 1499.733113] ksys_mount+0xdb/0x150 [ 1499.736663] __x64_sys_mount+0xbe/0x150 [ 1499.740644] do_syscall_64+0x103/0x610 [ 1499.744554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.749743] RIP: 0033:0x45a89a [ 1499.752935] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1499.771846] RSP: 002b:00007fb0e58d5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1499.779563] RAX: ffffffffffffffda RBX: 00007fb0e58d5b30 RCX: 000000000045a89a [ 1499.786838] RDX: 00007fb0e58d5ad0 RSI: 0000000020000180 RDI: 00007fb0e58d5af0 [ 1499.794109] RBP: 0000000020000180 R08: 00007fb0e58d5b30 R09: 00007fb0e58d5ad0 [ 1499.801376] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1499.808645] R13: 0000000000000000 R14: 00000000004dbcc8 R15: 0000000000000003 [ 1501.330720] Bluetooth: hci0: command 0x1003 tx timeout [ 1501.336137] Bluetooth: hci0: sending frame failed (-49) [ 1503.411417] Bluetooth: hci0: command 0x1001 tx timeout [ 1503.416817] Bluetooth: hci0: sending frame failed (-49) [ 1505.490724] Bluetooth: hci0: command 0x1009 tx timeout 06:48:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x540c, &(0x7f0000000180)) 06:48:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000100)=0x1, 0x4) r1 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x5, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000180)={0xa, {0x100000001, 0x2474, 0xca2, 0x9}}) syz_mount_image$gfs2(&(0x7f0000000400)='gfs2\x00', &(0x7f0000000440)='./file0\x00', 0xa21, 0x7, &(0x7f0000002840)=[{&(0x7f0000000480)="a250270661336f68fcdc2568a14163b68b287f5c93704f1790bef94afaa0a327606e33fabdb64afea49369b3863a92c0bf29046a8a1fe70a5ac7631def0607d241e3a48b325b93d108ed21d40a7d13baa91de43fb8020b4655a1802e7d9756d93ca617", 0x63, 0x40}, {&(0x7f0000000500)="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", 0x1000, 0x400}, {&(0x7f0000001500)="af83ab28655523c50041d62b412c3ee32da34fa79065d38e2f4647f77aa3b61ecd045783f7e4df8117c75ade9c31e19bf7eb380f0383d42614037245d3cec92925b0057ec89083330c7f3901b0847c04be9c7a0ef291e36a2153fdca52f5c415afcf6b81635127bac82e805e75e9554169837aa4274d92341fc0e598f13e3cc865baf8714ae73768dae20b4d2af9142b571525bc20777b4fa7d19f0b", 0x9c, 0x3}, {&(0x7f00000015c0)="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", 0x1000, 0x2}, {&(0x7f00000025c0)="19908091aaeff95ba51e63911615f7da6fee1718a2124c8e9e2c78b0cb0cebdaec41179f8ee7a0a4267122df14b6f24ef69095c851470fff32be8dbbf0468be07a40091949b25f285665c72135c083d722d425e782670b529014a9745a917eeb8bde23764afa09571e92cbedb3cbbb41249a28b530ef9237fa7270c4dc470b075f1e5015f2ac1ceb1363", 0x8a, 0x101}, {&(0x7f0000002680)="ebde0c51a86af33f0ec090fff3fd7697eb8e3eeb0f700743e154f71801985d8c49eeb93fb74d79ebd92d23c4976f48461543751346a03baaf9216e7b8580da58144196fabde1fa9aec4f0a00d5a84e544801db9511407cf6f94b220f19faeb3d38891621f2fbbbea79d5a1903c755f3ae26a595f386219fbf6682c1e590a6432b26ca1317b6b813fc16377edfb1daf8537fd41d9d4809f2e7601ec4531e50135cdbdc51630a12a354e2448c543c39150b68eb268813a03b0f53c086b6f2d024a52177ed850226fb0db3b841d5b51a67b2356a12c2c9d70cbe2e4c31ece13", 0xde, 0x800}, {&(0x7f0000002780)="4a0247940472c5183ca048da73f9f2bfb09d94d5273c45dd235aff3c9dd3758aa962cac9d0139e4818b255672f3480930bb785915e949d05354a3802bf3af68aa8f8bce0336d6b19a675c9139036dd69ed9937ba218646d747c415af04f0a315a757582d1b0adc38106e816a6f94a08503edcf72c3bb971d1d20d910e7c3c7346fbe733ffc2ac942a05a8b00ead97ab88ecedebb93c8bb119d", 0x99}], 0x119444, &(0x7f0000002900)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@discard='discard'}, {@nosuiddir='nosuiddir'}], [{@appraise='appraise'}, {@obj_role={'obj_role', 0x3d, '/dev/v4l-subdev#\x00'}}]}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000300)={&(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x1, 0x3, 0x8, 0x2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="636f6d6d69743d307830303030303030313030303030303030e94f"]) recvfrom$inet(r0, &(0x7f0000000340)=""/125, 0x7d, 0x21, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) 06:48:07 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x9000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:07 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x280000, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) times(&(0x7f0000000040)) 06:48:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000080)=0x2) 06:48:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1509.917675] Bluetooth: hci0: Frame reassembly failed (-84) 06:48:08 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:08 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffff7ffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x9) [ 1509.970595] Bluetooth: hci1: Frame reassembly failed (-84) [ 1509.979140] gfs2: invalid mount option: commit=0x0000000100000000éO [ 1510.008832] gfs2: can't parse mount arguments 06:48:08 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:08 executing program 1: socket$inet6(0xa, 0x5, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x40000) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xc423, 0x325000) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x9c0, 0x0, 0xffffffffffffff96, 0x1, 0x1, 0x3, 0x7, 0x0, 0x400, 0x8, 0x1f}, 0xb) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1510.048244] XFS (loop2): Invalid superblock magic number 06:48:08 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1511.970748] Bluetooth: hci1: command 0x1003 tx timeout [ 1511.976340] Bluetooth: hci0: command 0x1003 tx timeout [ 1511.987329] Bluetooth: hci0: sending frame failed (-49) [ 1511.993194] Bluetooth: hci1: Frame reassembly failed (-84) [ 1514.050703] Bluetooth: hci0: command 0x1001 tx timeout [ 1514.056111] Bluetooth: hci0: sending frame failed (-49) [ 1514.061846] Bluetooth: hci1: command 0x1001 tx timeout [ 1514.067817] Bluetooth: hci1: Frame reassembly failed (-84) [ 1516.130696] Bluetooth: hci1: command 0x1009 tx timeout [ 1516.136079] Bluetooth: hci0: command 0x1009 tx timeout 06:48:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x540d, &(0x7f0000000180)) 06:48:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000080)='%fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:48:18 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffead, 0x0, 0x0, &(0x7f0000000240)={[{@commit={'commit', 0x3d, 0x100000000}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:48:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x280) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400)={0xffffffffffffffff}, 0x111, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000480)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000003c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) write$selinux_load(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xec) r3 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000380)=0xe8) setresuid(r3, 0x0, r4) 06:48:18 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x40030000000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:18 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000340)="437479026c38bf9bbd98767cce76c10db7c10f472c129ade5094eaf5512622fda66a6b796a7f861efb95f95546703980d91853eb6443416e83729d8e220e65e3ed6fb56315faddf3f2625703eb8d66984a4097bf1b7792bfd1c09ade3c0c7487b36bb23ea43f95e35d65f97da073aa74b1c260fdad7e10") write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000240)={0x0, @reserved}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="636f6d6d69743d50613b5bb836a32fca59152197eecf3063795fb93a0da5b930303000000000000000000000000000000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000240)={0x5, 0x3f, 0x6, 0xd05, 0x7ff}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x100000, 0x800) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000180)={[], 0x8, 0x80000000, 0x9, 0x69, 0x5, r4}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000280)={0x0, @speck128}) accept$alg(r3, 0x0, 0x0) 06:48:18 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x200000000000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:18 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2400, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x1, 0x4) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) clone(0x4210a000, &(0x7f0000000240)="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", &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000001240)="de4475460c2b17fd0fa48d70959de3df0fe3f41845b6151fc9219dc3248fb10de9c1cfe8f4663e40684e92fa54c5e64b85c6c0df881136d88955c5ef2357e722ceaecb0e1a0b608d770de8a736a82ebb86f92e8e33fd28dd5b040ca1170f3ab88734ce7a68fda183ff128d6fd85286e298ee927ff7b82fb1dd478a3a19d651c1") 06:48:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000080)='wfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1520.353783] gfs2: invalid mount option: commit=Pa;[¸6£/ÊY!—îÏ0cy_¹: ¥¹000 [ 1520.363978] IPVS: ftp: loaded support on port[0] = 21 [ 1520.369356] gfs2: can't parse mount arguments 06:48:18 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x300000000000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) r3 = gettid() kcmp(r2, r3, 0x7, r0, r0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="632f6d6d69743d3078303030303030303130303030303030302c00e770443317b1d8563d4b59ebc1a00880075ec8f1ed750e0411a3fd07d493d3cb6085746d7956aa07926d93971a56dc6303c5677841ae1eff16e27302d1a3e9f8acae2ecb55a2a40195a141ffc976142999db59c63b9053a2148e5696e51de9a45d6fc2e4e76d7db7218d691beb4b8c9c5987af35c51d8d7c8297eb0e641bdea20096b704fe93241c2e294c039550ab946866f4133acf3fe7c725fc322340e588fbfe22ef20479ac466820ed1a7fa47f540dda0ec0d00000000000000000000000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1520.565859] gfs2: invalid mount option: c/mmit=0x0000000100000000 [ 1520.586402] gfs2: can't parse mount arguments [ 1520.679562] gfs2: invalid mount option: c/mmit=0x0000000100000000 [ 1520.686507] gfs2: can't parse mount arguments [ 1522.290784] Bluetooth: hci0: command 0x1003 tx timeout [ 1522.296230] Bluetooth: hci0: sending frame failed (-49) [ 1524.370805] Bluetooth: hci0: command 0x1001 tx timeout [ 1524.376188] Bluetooth: hci0: sending frame failed (-49) [ 1526.450783] Bluetooth: hci0: command 0x1009 tx timeout 06:48:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x0) ioctl$TIOCSETD(r1, 0x5412, &(0x7f0000000180)) 06:48:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x12103f, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000280)={0x7, 0xf071, 0x7f, 0x17733911}, 0x10) syz_init_net_socket$ax25(0x3, 0x7, 0xcf) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000240)={0x6, "bd1e42ba5a0c649365921c707c8c3ba4950259eb312218268282f082260c957f", 0x1, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000200)={0x0, 0xfffffffffffffcbc, 0x1f, [], &(0x7f00000001c0)=0x7}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1d) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00d8260406cd70be6e4a620000000077a2cf25ecc0d44584"], 0x26, 0x3) 06:48:28 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:28 executing program 1: socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="a4fab74b78cd9a9f856faacec95741e9b945057278fee6fddd4d32a0449e2d", 0x1f, 0x3}, {&(0x7f00000001c0), 0x0, 0x101}], 0x1002000, &(0x7f00000003c0)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c6163746976655f6c6f67733d342c646566636f6e746578743d756e636f6e66696e65645f752c61707072616973652c636f6e746578743d756e636f6e66696e65645f752c001d853632dbde6e8dc4999f786ff40e7439d9e38856d36d51130ce54a62c0b71ed1a5a8d83f5e734e82628f3c9d3dd5084e1c6fd7727845652dea5569623ae26d063bb6f3b09a4b67d430ded47ef9ec7050e4c3a4835a450f4ec366f1f44937081de300b1a864330eb161f30ceac106ebe389b8fcb4a81904be244b9790a582e0bfe7e579ec21dce93f9fc6d37a96ababf58eb5eddac077c7dbc2d2c659118d41ba873e70b9635608c072a4d3f4a41284d8a961903b8cf935f0ab3daafd4d"]) socket$inet_sctp(0x2, 0x1, 0x84) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 06:48:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000080)='yfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:48:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6330303130303030303030302c0000d30900000000000000000000"]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1530.363458] gfs2: invalid mount option: c00100000000 06:48:28 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) pipe(&(0x7f0000000180)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pselect6(0x40, &(0x7f00000000c0)={0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 1530.398282] gfs2: can't parse mount arguments [ 1530.429703] Bluetooth: hci0: Frame reassembly failed (-84) [ 1530.441835] Bluetooth: hci0: Frame reassembly failed (-84) [ 1530.448302] BUG: unable to handle kernel paging request at ffffffffffffffd6 [ 1530.455414] #PF error: [normal kernel read fault] [ 1530.460254] PGD 8874067 P4D 8874067 PUD 8876067 PMD 0 [ 1530.465545] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1530.470041] CPU: 0 PID: 804 Comm: syz-executor.3 Not tainted 5.0.0-rc7+ #79 [ 1530.477134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.486504] RIP: 0010:h4_recv_buf+0x1ea/0xda0 [ 1530.490998] Code: b6 14 10 48 89 c8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 d7 0a 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 45 d0 4c 8d 60 70 <0f> b7 58 2a 4c 89 e0 48 c1 e8 03 0f b6 04 10 84 c0 74 08 3c 03 0f [ 1530.509896] RSP: 0018:ffff88804ae37a30 EFLAGS: 00010246 [ 1530.515246] RAX: ffffffffffffffac RBX: 0000000000000000 RCX: ffffffffffffffd6 [ 1530.522501] RDX: dffffc0000000000 RSI: ffffffff84ed2d12 RDI: 0000000000000005 [ 1530.529754] RBP: ffff88804ae37ab8 R08: ffff8880a35384c0 R09: 0000000000000003 [ 1530.537011] R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: 000000000000001c [ 1530.544279] R13: ffff8880911727c0 R14: ffff88804ae37b98 R15: 0000000000000001 [ 1530.551533] FS: 00007f1710149700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1530.559741] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1530.565607] CR2: ffffffffffffffd6 CR3: 00000000a08f2000 CR4: 00000000001426f0 [ 1530.572864] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1530.580126] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1530.587380] Call Trace: [ 1530.589957] ? __lock_is_held+0xb6/0x140 [ 1530.594011] ? check_preemption_disabled+0x48/0x290 [ 1530.599038] h4_recv+0xe4/0x200 [ 1530.602304] hci_uart_tty_receive+0x22b/0x530 [ 1530.606796] ? hci_uart_write_work+0x710/0x710 [ 1530.611369] tty_ioctl+0x936/0x14d0 [ 1530.614992] ? tty_vhangup+0x30/0x30 [ 1530.618692] ? mark_held_locks+0x100/0x100 [ 1530.622918] ? __fget+0x340/0x540 [ 1530.626371] ? ___might_sleep+0x163/0x280 [ 1530.630517] ? __might_sleep+0x95/0x190 [ 1530.634480] ? tty_vhangup+0x30/0x30 [ 1530.638182] do_vfs_ioctl+0xd6e/0x1390 [ 1530.642060] ? selinux_file_ioctl+0x46f/0x5e0 [ 1530.646538] ? selinux_file_ioctl+0x125/0x5e0 [ 1530.651017] ? ioctl_preallocate+0x210/0x210 [ 1530.655412] ? selinux_file_mprotect+0x620/0x620 [ 1530.660166] ? iterate_fd+0x360/0x360 [ 1530.663949] ? nsecs_to_jiffies+0x30/0x30 [ 1530.668085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1530.673611] ? security_file_ioctl+0x93/0xc0 [ 1530.678016] ksys_ioctl+0xab/0xd0 [ 1530.681456] __x64_sys_ioctl+0x73/0xb0 [ 1530.685340] do_syscall_64+0x103/0x610 [ 1530.689233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1530.694421] RIP: 0033:0x457e29 [ 1530.697598] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.716479] RSP: 002b:00007f1710148c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1530.724169] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1530.731421] RDX: 0000000020000180 RSI: 0000000000005412 RDI: 0000000000000005 [ 1530.738673] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1530.745925] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f17101496d4 [ 1530.753187] R13: 00000000004c2117 R14: 00000000004d49d8 R15: 00000000ffffffff [ 1530.760469] Modules linked in: [ 1530.763730] CR2: ffffffffffffffd6 [ 1530.767171] ---[ end trace 31d02bcdd9956b13 ]--- [ 1530.771913] RIP: 0010:h4_recv_buf+0x1ea/0xda0 [ 1530.776395] Code: b6 14 10 48 89 c8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 d7 0a 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 45 d0 4c 8d 60 70 <0f> b7 58 2a 4c 89 e0 48 c1 e8 03 0f b6 04 10 84 c0 74 08 3c 03 0f [ 1530.795280] RSP: 0018:ffff88804ae37a30 EFLAGS: 00010246 [ 1530.800641] RAX: ffffffffffffffac RBX: 0000000000000000 RCX: ffffffffffffffd6 [ 1530.807896] RDX: dffffc0000000000 RSI: ffffffff84ed2d12 RDI: 0000000000000005 [ 1530.815152] RBP: ffff88804ae37ab8 R08: ffff8880a35384c0 R09: 0000000000000003 [ 1530.822408] R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: 000000000000001c [ 1530.829662] R13: ffff8880911727c0 R14: ffff88804ae37b98 R15: 0000000000000001 [ 1530.836922] FS: 00007f1710149700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1530.845133] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1530.851000] CR2: ffffffffffffffd6 CR3: 00000000a08f2000 CR4: 00000000001426f0 [ 1530.858253] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1530.865507] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1530.872765] Kernel panic - not syncing: Fatal exception [ 1530.879220] Kernel Offset: disabled [ 1530.882842] Rebooting in 86400 seconds..