{@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:01 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1204.083198] XFS (loop5): Invalid superblock magic number 06:54:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}]}) 06:54:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:01 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1204.284402] XFS (loop5): unknown mount option [logbsize=]. [ 1204.312583] XFS (loop0): unknown mount option [smackfsroot=/dev/ppp]. [ 1204.315985] XFS (loop4): unknown mount option [allocsize=]. 06:54:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}]}) 06:54:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1204.353934] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. 06:54:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:01 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1204.459933] XFS (loop4): unknown mount option [allocsize=]. 06:54:01 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1204.505466] XFS (loop5): unknown mount option [logbsize=]. [ 1204.511502] XFS (loop0): unknown mount option [smackfsroot=/dev/ppp]. 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}]}) 06:54:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1204.688864] XFS (loop4): unknown mount option [allocsize=]. [ 1204.718778] XFS (loop5): unknown mount option [logbsize=]. [ 1204.722369] XFS (loop0): unknown mount option [smackfsroot=/dev/ppp]. 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1204.781536] XFS (loop4): unknown mount option [allocsize=]. 06:54:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}]}) 06:54:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.014303] XFS (loop0): unknown mount option [smackfsroot=/dev/ppp]. [ 1205.020125] XFS (loop5): unknown mount option [logbsize=]. [ 1205.051450] XFS (loop4): unknown mount option [allocsize=]. 06:54:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}]}) 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.075932] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. 06:54:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.117909] XFS (loop2): unknown mount option [logbsize=]. [ 1205.123077] XFS (loop0): unknown mount option [smackfsroot=/dev/ppp]. [ 1205.148249] XFS (loop4): invalid log iosize: 1 [not 12-30] [ 1205.159771] XFS (loop5): unknown mount option [logbsize=]. 06:54:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}]}) 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.219726] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. [ 1205.247085] XFS (loop0): unknown mount option [smackfsroot=/dev/ppp]. 06:54:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1205.270878] XFS (loop4): invalid log iosize: 1 [not 12-30] 06:54:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.333693] XFS (loop2): invalid log iosize: 1 [not 12-30] [ 1205.339668] XFS (loop5): unknown mount option [logbsize=]. 06:54:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}]}) 06:54:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1205.447687] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. [ 1205.486447] XFS (loop0): unknown mount option [allocsize=]. 06:54:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.511043] XFS (loop5): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1205.523289] XFS (loop4): invalid log iosize: 1 [not 12-30] 06:54:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}]}) 06:54:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.567023] XFS (loop2): invalid log iosize: 1 [not 12-30] 06:54:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1205.688385] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. [ 1205.723661] XFS (loop0): unknown mount option [allocsize=]. 06:54:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.766178] XFS (loop2): invalid log iosize: 1 [not 12-30] [ 1205.803892] XFS (loop4): unknown mount option [logbsize=]. 06:54:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1205.831978] XFS (loop5): unknown mount option [logbsize=]. 06:54:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}]}) [ 1205.903802] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. 06:54:03 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}]}) [ 1206.053465] XFS (loop0): unknown mount option [allocsize=]. [ 1206.065834] XFS (loop1): unknown mount option [smackfsroot=/dev/ppp]. [ 1206.075197] XFS (loop5): unknown mount option [logbsize=]. 06:54:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.134853] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. 06:54:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.193632] XFS (loop0): unknown mount option [allocsize=]. [ 1206.199730] XFS (loop4): unknown mount option [logbsize=]. [ 1206.224152] XFS (loop5): unknown mount option [logbsize=]. [ 1206.232726] XFS (loop1): unknown mount option [smackfsroot=/dev/ppp]. 06:54:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}]}) [ 1206.305808] XFS (loop3): unknown mount option [allocsize=]. 06:54:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.368873] XFS (loop1): unknown mount option [smackfsroot=/dev/ppp]. 06:54:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}]}) [ 1206.427367] XFS (loop5): unknown mount option [logbsize=]. [ 1206.433421] XFS (loop0): unknown mount option [allocsize=]. [ 1206.439644] XFS (loop4): unknown mount option [logbsize=]. [ 1206.461427] XFS (loop3): unknown mount option [allocsize=]. 06:54:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.555377] XFS (loop5): unknown mount option [logbsize=]. [ 1206.579844] XFS (loop0): unknown mount option [allocsize=]. [ 1206.589809] XFS (loop1): unknown mount option [smackfsroot=/dev/ppp]. [ 1206.592955] XFS (loop4): unknown mount option [logbsize=]. 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.610816] XFS (loop3): unknown mount option [allocsize=]. 06:54:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}]}) 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.767962] XFS (loop3): unknown mount option [allocsize=]. [ 1206.781934] XFS (loop0): invalid log iosize: 1 [not 12-30] [ 1206.806025] XFS (loop5): unknown mount option [logbsize=]. 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.865481] XFS (loop4): unknown mount option [logbsize=]. [ 1206.903474] XFS (loop1): unknown mount option [smackfsroot=/dev/ppp]. 06:54:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.948775] XFS (loop3): unknown mount option [allocsize=]. [ 1206.950211] XFS (loop0): invalid log iosize: 1 [not 12-30] 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1206.989902] XFS (loop5): unknown mount option [allocsize=]. 06:54:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.070187] XFS (loop4): unknown mount option [logbsize=]. [ 1207.091239] XFS (loop1): unknown mount option [smackfsroot=/dev/ppp]. 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.166654] XFS (loop0): invalid log iosize: 1 [not 12-30] [ 1207.178459] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1207.181349] XFS (loop3): unknown mount option [allocsize=]. 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.289627] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1207.297214] XFS (loop1): unknown mount option [allocsize=]. [ 1207.324539] XFS (loop0): unknown mount option [logbsize=]. 06:54:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.378860] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.436317] XFS (loop1): unknown mount option [allocsize=]. [ 1207.448800] XFS (loop4): unknown mount option [logbsize=]. 06:54:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.537058] XFS (loop0): unknown mount option [logbsize=]. 06:54:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.582818] XFS (loop1): unknown mount option [allocsize=]. [ 1207.596942] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. 06:54:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}]}) [ 1207.635162] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. 06:54:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.716292] XFS (loop0): unknown mount option [logbsize=]. [ 1207.739052] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. [ 1207.748148] XFS (loop4): unknown mount option [logbsize=]. [ 1207.750778] XFS (loop5): unknown mount option [logbsize=]. 06:54:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.778239] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. 06:54:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.823935] XFS (loop1): unknown mount option [allocsize=]. [ 1207.885351] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. [ 1207.901539] XFS (loop0): unknown mount option [logbsize=]. [ 1207.909799] XFS (loop4): unknown mount option [logbsize=]. [ 1207.921320] XFS (loop1): unknown mount option [allocsize=]. 06:54:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.932984] XFS (loop3): unknown mount option [smackfsroot=/dev/ppp]. 06:54:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1207.962184] XFS (loop5): unknown mount option [allocsize=]. 06:54:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.022288] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. [ 1208.045276] XFS (loop1): unknown mount option [allocsize=]. [ 1208.048190] XFS (loop3): unknown mount option [allocsize=]. [ 1208.056233] XFS (loop0): unknown mount option [logbsize=]. [ 1208.065098] XFS (loop4): unknown mount option [logbsize=]. 06:54:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.101560] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. 06:54:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36, 0x6d]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.171150] XFS (loop4): unknown mount option [logbsize=]. [ 1208.254340] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 1208.262080] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1208.269155] XFS (loop0): unknown mount option [logbsize=]. [ 1208.290737] XFS (loop3): unknown mount option [allocsize=]. 06:54:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@allocsize={'allocsize', 0x3d, [0x54]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.317512] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. 06:54:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.368033] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1208.370140] XFS (loop4): unknown mount option [logbsize=]. 06:54:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.427765] XFS (loop3): unknown mount option [allocsize=]. [ 1208.435210] XFS (loop1): invalid log iosize: 1 [not 12-30] 06:54:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36, 0x6d]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) [ 1208.489213] XFS (loop0): unknown mount option [logbsize=]. [ 1208.503851] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. 06:54:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.566325] XFS (loop3): unknown mount option [allocsize=]. [ 1208.572339] XFS (loop1): invalid log iosize: 1 [not 12-30] [ 1208.582813] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) 06:54:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.665503] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. [ 1208.689432] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1208.696533] XFS (loop0): unknown mount option [logbsize=]. 06:54:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.726680] XFS (loop3): unknown mount option [allocsize=]. [ 1208.751181] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}]}) 06:54:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.803911] XFS (loop1): unknown mount option [logbsize=]. 06:54:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.859862] XFS (loop0): unknown mount option [logbsize=]. [ 1208.879974] XFS (loop2): unknown mount option [allocsize=]. 06:54:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1208.964777] XFS (loop1): unknown mount option [logbsize=]. [ 1208.977474] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1208.987302] XFS (loop2): unknown mount option [allocsize=]. [ 1208.996370] XFS (loop3): unknown mount option [allocsize=]. [ 1209.007787] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 06:54:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.046647] XFS (loop1): unknown mount option [logbsize=]. [ 1209.081102] XFS (loop0): unknown mount option [logbsize=]. 06:54:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.120369] XFS (loop3): invalid log iosize: 1 [not 12-30] [ 1209.131209] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1209.134852] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1209.149557] XFS (loop1): unknown mount option [logbsize=]. [ 1209.150840] XFS (loop2): unknown mount option [allocsize=]. 06:54:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}]}) 06:54:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.263252] XFS (loop0): unknown mount option [logbsize=]. [ 1209.271311] XFS (loop1): unknown mount option [logbsize=]. [ 1209.272113] XFS (loop3): invalid log iosize: 1 [not 12-30] 06:54:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) [ 1209.344677] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1209.366081] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1209.376753] XFS (loop2): unknown mount option [allocsize=]. 06:54:06 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) [ 1209.435378] XFS (loop0): unknown mount option [logbsize=]. [ 1209.439157] XFS (loop3): invalid log iosize: 1 [not 12-30] 06:54:06 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.499803] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1209.536329] XFS (loop1): unknown mount option [logbsize=]. 06:54:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.545635] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1209.560759] XFS (loop2): unknown mount option [allocsize=]. 06:54:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) 06:54:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.684472] XFS (loop1): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.742278] XFS (loop2): unknown mount option [allocsize=]. [ 1209.749328] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1209.750464] XFS (loop3): unknown mount option [logbsize=]. [ 1209.775809] XFS (loop4): unknown mount option [logbsize=]. 06:54:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}]}) [ 1209.903857] XFS (loop2): invalid log iosize: 1 [not 12-30] [ 1209.933184] XFS (loop1): unknown mount option [logbsize=]. [ 1209.944986] XFS (loop4): unknown mount option [logbsize=]. 06:54:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1209.955076] XFS (loop3): unknown mount option [logbsize=]. 06:54:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1210.089729] XFS (loop3): unknown mount option [logbsize=]. [ 1210.093036] XFS (loop1): unknown mount option [logbsize=]. [ 1210.099538] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. [ 1210.111572] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1210.129115] XFS (loop4): unknown mount option [allocsize=]. 06:54:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1210.231392] XFS (loop3): unknown mount option [logbsize=]. 06:54:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x0, 0x54]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}]}) 06:54:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1210.300180] XFS (loop1): unknown mount option [logbsize=]. [ 1210.308043] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. [ 1210.319030] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1210.387813] XFS (loop4): unknown mount option [allocsize=]. [ 1210.411983] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1210.431695] XFS (loop3): unknown mount option [logbsize=]. 06:54:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x54]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) 06:54:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1210.455126] XFS (loop1): unknown mount option [logbsize=]. [ 1210.466914] XFS (loop2): unknown mount option [smackfsroot=/dev/ppp]. 06:54:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x0, 0x54]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1210.568773] XFS (loop1): unknown mount option [logbsize=]. [ 1210.603941] XFS (loop3): unknown mount option [logbsize=]. 06:54:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1210.619288] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x0, 0x54]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) [ 1210.697750] XFS (loop2): unknown mount option [allocsize=]. [ 1210.714040] XFS (loop1): unknown mount option [logbsize=]. [ 1210.715593] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1210.725791] XFS (loop4): unknown mount option [allocsize=]. 06:54:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1210.790000] XFS (loop0): unknown mount option [allocsize=]. [ 1210.820499] XFS (loop2): unknown mount option [allocsize=]. 06:54:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1210.834938] XFS (loop1): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) 06:54:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1210.944908] XFS (loop3): unknown mount option [logbsize=]. [ 1210.950766] XFS (loop4): unknown mount option [smackfsroot=/dev/ppp]. [ 1210.978401] XFS (loop2): unknown mount option [allocsize=]. 06:54:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1211.053608] XFS (loop1): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}]}) 06:54:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) [ 1211.140310] XFS (loop3): unknown mount option [logbsize=]. [ 1211.144407] XFS (loop2): unknown mount option [allocsize=]. 06:54:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x8, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="fa5b46e2f7208f68a89d99175fbd498e88bf7d133c4ba500be0f00b4", 0x1c, 0x6}, {&(0x7f00000002c0)="fc2371996d64e3f918caf005475c8b7f31e733d567d4a03061f037b76e05d4a6e81f7632193a849c650badcf84d199c073f8782b740700260fa4d40bb01c3dcc1eaca9f5a70f604b8a8ca4caf08145c398963eca45f2c7c620b203a8697ead21cdbc8a09b5cb2859d2044ebbb70b0efb863f0aa1523a111dd4478a19bfc583f2085f727065489a1ab3afd3b554586538fd1492dc51", 0x95, 0x7ff}, {&(0x7f0000000380)="ffd2701c8aeffcd71aac3f0a5de80ab7d30370ff0cc9fd930782788611b8c5499a3172c0ba32a23a98c5b9170cdc5b11573b3ceb5e58a07b6807bfad546a8368109fbad66caeb53b1158fe6d3eff84645b0841ea293aeb0e5022ae4b23226c18f4880107cb36119e677fc5a91505322966ddf3019fc78dc6b43afdb60b2df106312a320232ff0ab6a2f674a80c24ca115d7cf76a83d445a04d0f48027ec03688f8b57b642342b9278f43d021868f2e5b00b101fb90be7518bb8a8445cf622bd111fe4968209d0b9d35d57698023bdb1822d3df0855b31c638a2d8552365082ebb3d7e5d49383597e3561c297d2f333cdf796", 0xf2, 0x400}], 0x800001, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36, 0x54, 0x6d, 0x38, 0x31, 0x70, 0x38]}}, {@sunit={'sunit', 0x3d, 0x2}}, {@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1211.301753] XFS (loop1): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1211.321607] XFS (loop2): unknown mount option [allocsize=]. 06:54:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1211.362575] XFS (loop3): unknown mount option [logbsize=]. 06:54:09 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 1211.602982] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1211.633239] XFS (loop1): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1211.645002] XFS (loop3): unknown mount option [logbsize=]. [ 1211.693413] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1211.733867] XFS (loop2): unknown mount option [allocsize=]. 06:54:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) 06:54:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}]}) 06:54:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) [ 1211.953229] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1211.964543] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1211.970558] XFS (loop3): unknown mount option [logbsize=]. 06:54:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) 06:54:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}]}) [ 1211.994739] XFS (loop1): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.015201] XFS (loop2): invalid log iosize: 1 [not 12-30] 06:54:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1212.054907] XFS (loop3): unknown mount option [logbsize=]. 06:54:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) 06:54:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) [ 1212.096840] XFS (loop0): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.108033] XFS (loop1): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.125387] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1212.138535] XFS (loop2): invalid log iosize: 1 [not 12-30] 06:54:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}]}) [ 1212.138991] XFS (loop4): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.151828] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) 06:54:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x0]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1212.315666] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.322391] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1212.334501] XFS (loop2): invalid log iosize: 1 [not 12-30] 06:54:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 06:54:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 06:54:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1212.359732] XFS (loop0): unknown mount option [smackfsroot=/dev/ppp]. 06:54:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}]}) [ 1212.412912] XFS (loop1): unknown mount option [logbsize=]. 06:54:09 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x8, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="fa5b46e2f7208f68a89d99175fbd498e88bf7d133c4ba500be0f00b4", 0x1c, 0x6}, {&(0x7f00000002c0)="fc2371996d64e3f918caf005475c8b7f31e733d567d4a03061f037b76e05d4a6e81f7632193a849c650badcf84d199c073f8782b740700260fa4d40bb01c3dcc1eaca9f5a70f604b8a8ca4caf08145c398963eca45f2c7c620b203a8697ead21cdbc8a09b5cb2859d2044ebbb70b0efb863f0aa1523a111dd4478a19bfc583f2085f727065489a1ab3afd3b554586538fd1492dc51", 0x95, 0x7ff}, {&(0x7f0000000380)="ffd2701c8aeffcd71aac3f0a5de80ab7d30370ff0cc9fd930782788611b8c5499a3172c0ba32a23a98c5b9170cdc5b11573b3ceb5e58a07b6807bfad546a8368109fbad66caeb53b1158fe6d3eff84645b0841ea293aeb0e5022ae4b23226c18f4880107cb36119e677fc5a91505322966ddf3019fc78dc6b43afdb60b2df106312a320232ff0ab6a2f674a80c24ca115d7cf76a83d445a04d0f48027ec03688f8b57b642342b9278f43d021868f2e5b00b101fb90be7518bb8a8445cf622bd111fe4968209d0b9d35d57698023bdb1822d3df0855b31c638a2d8552365082ebb3d7e5d49383597e3561c297d2f333cdf796", 0xf2, 0x400}], 0x800001, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36, 0x54, 0x6d, 0x38, 0x31, 0x70, 0x38]}}, {@sunit={'sunit', 0x3d, 0x2}}, {@nogrpid}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36, 0x54, 0x6d]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:09 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1212.504689] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1212.545230] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.556173] XFS (loop2): invalid log iosize: 1 [not 12-30] 06:54:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 06:54:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}]}) 06:54:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@logbsize={'logbsize', 0x3d, [0x38]}}, {@pqnoenforce}, {@discard}, {@allocsize={'allocsize', 0x3d, [0x36, 0x54, 0x6d, 0x38, 0x31, 0x70, 0x38]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000080)) [ 1212.617848] print_req_error: I/O error, dev loop0, sector 0 06:54:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1abd00, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)=0x3) 06:54:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}]}) [ 1212.746420] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. [ 1212.757457] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.766594] XFS (loop2): invalid log iosize: 1 [not 12-30] 06:54:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) 06:54:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:10 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x6, 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)=0x2) [ 1212.875139] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1212.902003] XFS (loop5): unknown mount option [allocsize=]. 06:54:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) 06:54:10 executing program 1: pkey_mprotect(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) shmat(0x0, &(0x7f0000005000/0x4000)=nil, 0x4000) socket$inet_sctp(0x2, 0x1, 0x84) 06:54:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1212.937935] XFS (loop2): invalid log iosize: 1 [not 12-30] 06:54:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1213.064580] XFS (loop5): unknown mount option [allocsize=]. [ 1213.072275] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) r1 = openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200a80, 0x53) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000100)=0xede9) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000080)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4}) 06:54:10 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x1) [ 1213.170700] XFS (loop5): unknown mount option [allocsize=]. 06:54:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:10 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x6) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 06:54:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x6) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 06:54:10 executing program 4: statx(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x6000, 0x40, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_mount_image$btrfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5775, 0x5, &(0x7f0000000400)=[{&(0x7f0000000100)="d494498a174f83caffbdc7aaa4b2bcc5366acf716537ea08ac24e3e3723180d53598fb9b5edb7f24a2036a52f9e012929b4a4c6c6257158417", 0x39, 0x80000001}, {&(0x7f0000000140)="dda37be7a821c62ee93b86eb45e3d2a41f44c28ff702752276570acf0ff9089386350fe2f6d6f63863c30165b758e5d832a15b88238603c644127d27", 0x3c, 0x9}, {&(0x7f0000000180)="dd20081ec8f8572b7f3f1e32412a0afc21d84b391dd6b32f4d5cc0e0123aebe8205a49edcb2173a6ddfd9e9848967f8d36a6f6f9d1306df1b64c5d2298bcaf49d938c8e77da7d29cbfb19ecafb3f65fac95d3f8d01a8dd15f8fcedc495bbaf48ca60f2aeb72a5f", 0x67, 0x5}, {&(0x7f0000000200)="9f7fde1f54e89e09a0187c2f91688e982ad656b5421989328dac62b1772f715e2642ed7312f83061a7d72dca14b3666111cd071c2899316b8a6ac82f261898842e6b50ca325f32005d004db93f5a365f783675189d45ebd4470e757b8202d55a37692c082fba7255da67bd9537b77a6bb2a63f4b93671417ae5eb6905d62bc7028f76d0b7948dac6989cb99fceb30420aecbf6af17f73d28babd7ded518ae20c5652ad0004e3c5aa5f6f57700eade8370a0f1105d26bcfe06d3037c9f7927c725fde49a36cc5c3dbdbb6d3a6e1f0fb70", 0xd0, 0x17}, {&(0x7f0000000300)="82e7086c89c860d811afef1a7c4cf27df4bedc5cb894262badd251f768dc02e146530aec1f9ccb987760295763d322b2f7cc25af48c5abf02045ce3c68dd4c28b51c0c71495ebe4efa1aad1e9f8eecdbc57dda2fb3bd5a43510a2eadd0964aaf39f0f59ec03031b6c75663d78ca08418b56a9a530c27f174e97ebf7909a898c3a617141c079efb907a49ee9586166141cbae4f174c5f7187edf608ec821dfa8c2382cba286ebd1e99047f8b84bf78ae0de8cc5f55d58ce047692ae7cb32cbf78ae4c3b19ff708205e17bc7aed3", 0xcd, 0x4dc}], 0x1098424, &(0x7f00000005c0)={[{@treelog}, {@flushoncommit}, {@inode_cache}], [{@seclabel}, {@euid_eq}, {@fowner_gt={'fowner>', r0}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@measure}, {@obj_type={'obj_type', 0x3d, '/dev/ppp\x00'}}]}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)) r3 = syz_mount_image$gfs2(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x1, 0x4, &(0x7f0000000880)=[{&(0x7f0000000680)="323e726b5f49c63be92dfb000f46abcb5892543ba732e186d24d897775ec3787dae3ebd6269536db501303af30f0701391cd9e3e750176518947008478989737f51a2139f56786c6e2001f4af97f4b1fb5017ee71ec0522ae49078b8aec8fc5656e025c40259abafe86c88dd664c830789a4ca1ce1834d30", 0x78, 0x1}, {&(0x7f0000000700)="5afa5882ae942922dbae51f608466565fb0b860ced47e166bffc5504e4f1e53d5318a77bcfb4124b67d25ac03b52a0a50dedb63b8b6ec01c0a7a7fd0ce7341b7a93d7f48f7f06e434e20166ddfedcdde66e251ae451e19573115d768071b5224a1c0f26b18d80dc0d5ca72b2f7229dc8ae41b10f046621a42f9a635b4730494d5d3d4e1ffcb74b700407677c8b2652", 0x8f}, {&(0x7f00000007c0)="639ec29e08efba9be88a5127d8f99f43b514983e8477aa61e71b147fd6c92966de31f0b88b5ef0c94d196402ca8014b001391de9f31bfeee063b48c24b2283e6692a08a1ad3821", 0x47, 0x1f}, {&(0x7f0000000840), 0x0, 0x1f6200000}], 0x0, &(0x7f0000000900)={[{@quota_account}], [{@hash}, {@subj_user={'subj_user', 0x3d, 'syz'}}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) renameat2(r3, &(0x7f0000000680)='./file0\x00', r1, &(0x7f00000006c0)='./file0/file0\x00', 0x0) 06:54:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) [ 1213.325289] XFS (loop5): unknown mount option [allocsize=]. 06:54:10 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r1, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) 06:54:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1213.425572] XFS (loop5): unknown mount option [allocsize=]. 06:54:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) [ 1213.499439] gfs2: invalid mount option: hash 06:54:10 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@nogrpid}, {@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:11 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1213.544897] gfs2: can't parse mount arguments [ 1213.564689] XFS (loop3): unknown mount option [allocsize=]. 06:54:11 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80200, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:11 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1213.645312] XFS (loop5): unknown mount option [allocsize=]. 06:54:11 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80200, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1213.761544] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:11 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80200, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1213.856118] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. 06:54:11 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 3: modify_ldt$write(0x1, &(0x7f0000000000)={0x4, 0x1000, 0x2000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x10) modify_ldt$write(0x1, &(0x7f0000000040)={0x9, 0x20000000, 0xffffffffffffffff, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1}, 0x10) pkey_mprotect(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x2000004, 0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) shmat(0x0, &(0x7f0000005000/0x4000)=nil, 0x4000) 06:54:11 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1213.944839] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 2: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 1) 06:54:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80200, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:11 executing program 1: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x888000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 1: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 2: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) [ 1214.065402] XFS (loop5): unknown mount option [smackfsroot=/dev/ppp]. 06:54:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:11 executing program 1: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 2: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) [ 1214.146277] FAULT_INJECTION: forcing a failure. [ 1214.146277] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.174909] XFS (loop5): unknown mount option [allocsize=]. [ 1214.176609] CPU: 1 PID: 26100 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x888000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) [ 1214.188517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.197863] Call Trace: [ 1214.200453] dump_stack+0x1b2/0x281 [ 1214.204083] should_fail.cold+0x10a/0x149 [ 1214.208234] should_failslab+0xd6/0x130 [ 1214.212211] __kmalloc+0x2c1/0x400 [ 1214.215749] ? SyS_memfd_create+0xbc/0x3c0 [ 1214.219984] SyS_memfd_create+0xbc/0x3c0 [ 1214.224040] ? shmem_fcntl+0x120/0x120 [ 1214.227932] ? __do_page_fault+0x159/0xad0 [ 1214.232165] ? do_syscall_64+0x4c/0x640 [ 1214.236134] ? shmem_fcntl+0x120/0x120 [ 1214.240021] do_syscall_64+0x1d5/0x640 [ 1214.243913] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1214.249097] RIP: 0033:0x7f10c0394109 [ 1214.252801] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1214.260509] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0394109 [ 1214.268034] RDX: 00007f10bed08fe0 RSI: 0000000000000000 RDI: 00007f10c03ed1be [ 1214.275301] RBP: 0000000000000000 R08: 00007f10bed08fd8 R09: 00007f10bed091d0 [ 1214.282571] R10: 00007f10bed08fdc R11: 0000000000000246 R12: 0000000020000200 06:54:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 2) 06:54:11 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x888000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:11 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80200, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) [ 1214.289836] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 06:54:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:11 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:11 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f00000000c0)=""/184, 0xb8) 06:54:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) [ 1214.377839] XFS (loop5): unknown mount option [allocsize=]. 06:54:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80200, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:11 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1214.427909] FAULT_INJECTION: forcing a failure. [ 1214.427909] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.464352] CPU: 1 PID: 26153 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1214.472261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.481681] Call Trace: [ 1214.484273] dump_stack+0x1b2/0x281 [ 1214.487909] should_fail.cold+0x10a/0x149 [ 1214.490188] XFS (loop5): unknown mount option [allocsize=]. [ 1214.492058] should_failslab+0xd6/0x130 [ 1214.492072] kmem_cache_alloc+0x28e/0x3c0 [ 1214.492085] __d_alloc+0x2a/0xa20 [ 1214.509337] ? lock_downgrade+0x740/0x740 [ 1214.513496] __shmem_file_setup.part.0+0xcb/0x3c0 [ 1214.518348] ? shmem_create+0x30/0x30 [ 1214.522152] ? __alloc_fd+0x1be/0x490 [ 1214.525964] SyS_memfd_create+0x1fc/0x3c0 [ 1214.530118] ? shmem_fcntl+0x120/0x120 [ 1214.534007] ? __do_page_fault+0x159/0xad0 [ 1214.538245] ? do_syscall_64+0x4c/0x640 [ 1214.542219] ? shmem_fcntl+0x120/0x120 [ 1214.546226] do_syscall_64+0x1d5/0x640 [ 1214.550136] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1214.555334] RIP: 0033:0x7f10c0394109 [ 1214.559043] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1214.566751] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0394109 06:54:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 3) 06:54:12 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f00000000c0)=""/184, 0xb8) 06:54:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80200, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:12 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1214.574021] RDX: 00007f10bed08fe0 RSI: 0000000000000000 RDI: 00007f10c03ed1be [ 1214.581289] RBP: 0000000000000000 R08: 00007f10bed08fd8 R09: 00007f10bed091d0 [ 1214.588557] R10: 00007f10bed08fdc R11: 0000000000000246 R12: 0000000020000200 [ 1214.595825] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 06:54:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) [ 1214.678401] FAULT_INJECTION: forcing a failure. [ 1214.678401] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.703430] CPU: 1 PID: 26184 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1214.711338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.720694] Call Trace: [ 1214.723284] dump_stack+0x1b2/0x281 [ 1214.726921] should_fail.cold+0x10a/0x149 [ 1214.731070] should_failslab+0xd6/0x130 [ 1214.735046] kmem_cache_alloc+0x28e/0x3c0 [ 1214.739196] ? shmem_destroy_callback+0xa0/0xa0 [ 1214.743862] shmem_alloc_inode+0x18/0x40 [ 1214.747921] ? shmem_destroy_callback+0xa0/0xa0 [ 1214.752586] alloc_inode+0x5d/0x170 [ 1214.756206] new_inode+0x1d/0xf0 [ 1214.756443] XFS (loop5): unknown mount option [allocsize=]. [ 1214.759581] shmem_get_inode+0x8b/0x890 [ 1214.759598] __shmem_file_setup.part.0+0x104/0x3c0 [ 1214.759609] ? shmem_create+0x30/0x30 [ 1214.759617] ? __alloc_fd+0x1be/0x490 [ 1214.759631] SyS_memfd_create+0x1fc/0x3c0 [ 1214.785896] ? shmem_fcntl+0x120/0x120 [ 1214.789784] ? __do_page_fault+0x159/0xad0 [ 1214.794018] ? do_syscall_64+0x4c/0x640 [ 1214.797989] ? shmem_fcntl+0x120/0x120 [ 1214.801879] do_syscall_64+0x1d5/0x640 [ 1214.805775] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1214.810958] RIP: 0033:0x7f10c0394109 [ 1214.814661] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 06:54:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0x2) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:12 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f00000000c0)=""/184, 0xb8) 06:54:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, 0x0) [ 1214.822373] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0394109 [ 1214.829646] RDX: 00007f10bed08fe0 RSI: 0000000000000000 RDI: 00007f10c03ed1be [ 1214.836918] RBP: 0000000000000000 R08: 00007f10bed08fd8 R09: 00007f10bed091d0 [ 1214.844188] R10: 00007f10bed08fdc R11: 0000000000000246 R12: 0000000020000200 [ 1214.851456] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 06:54:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 4) 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, 0x0) 06:54:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:12 executing program 4: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, 0x0) [ 1214.973345] FAULT_INJECTION: forcing a failure. [ 1214.973345] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.997160] CPU: 1 PID: 26211 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1215.005079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.014430] Call Trace: [ 1215.017018] dump_stack+0x1b2/0x281 06:54:12 executing program 4: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) [ 1215.020653] should_fail.cold+0x10a/0x149 [ 1215.024805] should_failslab+0xd6/0x130 [ 1215.028783] kmem_cache_alloc+0x28e/0x3c0 [ 1215.032934] get_empty_filp+0x86/0x3f0 [ 1215.036821] alloc_file+0x23/0x440 [ 1215.040360] __shmem_file_setup.part.0+0x198/0x3c0 [ 1215.045291] ? shmem_create+0x30/0x30 [ 1215.049086] ? __alloc_fd+0x1be/0x490 [ 1215.052894] SyS_memfd_create+0x1fc/0x3c0 [ 1215.057038] ? shmem_fcntl+0x120/0x120 [ 1215.060922] ? __do_page_fault+0x159/0xad0 [ 1215.065150] ? do_syscall_64+0x4c/0x640 [ 1215.069120] ? shmem_fcntl+0x120/0x120 [ 1215.073010] do_syscall_64+0x1d5/0x640 [ 1215.076900] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1215.082082] RIP: 0033:0x7f10c0394109 [ 1215.085785] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1215.093493] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0394109 [ 1215.100754] RDX: 00007f10bed08fe0 RSI: 0000000000000000 RDI: 00007f10c03ed1be [ 1215.108016] RBP: 0000000000000000 R08: 00007f10bed08fd8 R09: 00007f10bed091d0 [ 1215.115281] R10: 00007f10bed08fdc R11: 0000000000000246 R12: 0000000020000200 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:12 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(0xffffffffffffffff, &(0x7f00000000c0)=""/184, 0xb8) 06:54:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 5) [ 1215.122543] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 [ 1215.136230] XFS (loop5): unknown mount option [allocsize=]. 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:12 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(0xffffffffffffffff, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1215.198219] FAULT_INJECTION: forcing a failure. [ 1215.198219] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.214161] CPU: 1 PID: 26236 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1215.222050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.231385] Call Trace: [ 1215.233963] dump_stack+0x1b2/0x281 [ 1215.237580] should_fail.cold+0x10a/0x149 [ 1215.241707] should_failslab+0xd6/0x130 [ 1215.245661] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1215.250311] apparmor_file_alloc_security+0x129/0x800 [ 1215.255489] security_file_alloc+0x66/0xa0 [ 1215.259707] ? selinux_is_enabled+0x5/0x50 [ 1215.263919] get_empty_filp+0x16b/0x3f0 [ 1215.267869] alloc_file+0x23/0x440 [ 1215.271385] __shmem_file_setup.part.0+0x198/0x3c0 [ 1215.276291] ? shmem_create+0x30/0x30 [ 1215.280066] ? __alloc_fd+0x1be/0x490 [ 1215.283847] SyS_memfd_create+0x1fc/0x3c0 [ 1215.287970] ? shmem_fcntl+0x120/0x120 [ 1215.291836] ? __do_page_fault+0x159/0xad0 [ 1215.296048] ? do_syscall_64+0x4c/0x640 [ 1215.299998] ? shmem_fcntl+0x120/0x120 [ 1215.303860] do_syscall_64+0x1d5/0x640 [ 1215.307728] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1215.312901] RIP: 0033:0x7f10c0394109 [ 1215.316593] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1215.324276] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0394109 [ 1215.331523] RDX: 00007f10bed08fe0 RSI: 0000000000000000 RDI: 00007f10c03ed1be [ 1215.338766] RBP: 0000000000000000 R08: 00007f10bed08fd8 R09: 00007f10bed091d0 06:54:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:12 executing program 4: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) 06:54:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 6) [ 1215.346009] R10: 00007f10bed08fdc R11: 0000000000000246 R12: 0000000020000200 [ 1215.353257] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 06:54:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) [ 1215.428092] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1215.464431] FAULT_INJECTION: forcing a failure. [ 1215.464431] name failslab, interval 1, probability 0, space 0, times 0 06:54:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000080)) 06:54:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) [ 1215.536510] CPU: 0 PID: 26251 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1215.544415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.553765] Call Trace: [ 1215.555687] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1215.556350] dump_stack+0x1b2/0x281 [ 1215.565581] should_fail.cold+0x10a/0x149 [ 1215.569734] should_failslab+0xd6/0x130 [ 1215.573706] kmem_cache_alloc+0x28e/0x3c0 [ 1215.577856] getname_flags+0xc8/0x550 [ 1215.581658] do_sys_open+0x1ce/0x410 [ 1215.585377] ? filp_open+0x60/0x60 [ 1215.588919] ? do_syscall_64+0x4c/0x640 [ 1215.592897] ? SyS_open+0x30/0x30 [ 1215.596357] do_syscall_64+0x1d5/0x640 [ 1215.600250] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1215.605428] RIP: 0033:0x7f10c0347024 [ 1215.609119] RSP: 002b:00007f10bed08eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1215.616803] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0347024 [ 1215.624053] RDX: 0000000000000002 RSI: 00007f10bed08fe0 RDI: 00000000ffffff9c [ 1215.631302] RBP: 00007f10bed08fe0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1215.638657] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1215.645912] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 7) 06:54:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}]}) 06:54:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 06:54:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1215.707630] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1215.735588] FAULT_INJECTION: forcing a failure. [ 1215.735588] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1215.747400] CPU: 0 PID: 26305 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1215.755263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.764598] Call Trace: [ 1215.767168] dump_stack+0x1b2/0x281 [ 1215.770777] should_fail.cold+0x10a/0x149 [ 1215.774905] __alloc_pages_nodemask+0x22c/0x2720 [ 1215.779648] ? static_obj+0x50/0x50 [ 1215.783259] ? trace_hardirqs_on+0x10/0x10 [ 1215.787470] ? __lock_acquire+0x5fc/0x3f20 [ 1215.791687] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1215.796506] ? __lock_acquire+0x5fc/0x3f20 [ 1215.800717] ? simple_xattr_get+0xe5/0x160 [ 1215.804929] ? fsnotify+0x974/0x11b0 [ 1215.808617] ? shmem_setattr+0x241/0xbf0 [ 1215.812654] ? __fsnotify_inode_delete+0x20/0x20 [ 1215.817383] cache_grow_begin+0x91/0x700 [ 1215.821418] ? fs_reclaim_release+0xd0/0x110 [ 1215.825802] ? check_preemption_disabled+0x35/0x240 [ 1215.830805] cache_alloc_refill+0x273/0x350 [ 1215.835112] kmem_cache_alloc+0x333/0x3c0 [ 1215.839247] getname_flags+0xc8/0x550 [ 1215.843028] do_sys_open+0x1ce/0x410 [ 1215.846719] ? filp_open+0x60/0x60 [ 1215.850239] ? do_syscall_64+0x4c/0x640 [ 1215.854191] ? SyS_open+0x30/0x30 [ 1215.857625] do_syscall_64+0x1d5/0x640 [ 1215.861492] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1215.866656] RIP: 0033:0x7f10c0347024 [ 1215.870340] RSP: 002b:00007f10bed08eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1215.878025] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0347024 [ 1215.885274] RDX: 0000000000000002 RSI: 00007f10bed08fe0 RDI: 00000000ffffff9c [ 1215.892520] RBP: 00007f10bed08fe0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1215.899766] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 06:54:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:13 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1215.907021] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x0, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]@]+'}}]}) 06:54:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 8) 06:54:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1215.973056] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1216.003627] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) 06:54:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}]}) 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1216.061201] FAULT_INJECTION: forcing a failure. [ 1216.061201] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.086949] XFS (loop2): unknown mount option [allocsize=]. [ 1216.116386] CPU: 1 PID: 26339 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1216.124294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.133674] Call Trace: [ 1216.136267] dump_stack+0x1b2/0x281 [ 1216.139901] should_fail.cold+0x10a/0x149 [ 1216.144150] should_failslab+0xd6/0x130 [ 1216.148129] kmem_cache_alloc+0x28e/0x3c0 [ 1216.152284] get_empty_filp+0x86/0x3f0 [ 1216.156171] path_openat+0x84/0x2970 [ 1216.159888] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1216.164737] ? path_lookupat+0x780/0x780 [ 1216.168809] ? trace_hardirqs_on+0x10/0x10 [ 1216.173041] ? fsnotify+0x974/0x11b0 [ 1216.176849] ? shmem_setattr+0x241/0xbf0 [ 1216.180914] do_filp_open+0x179/0x3c0 [ 1216.184717] ? may_open_dev+0xe0/0xe0 [ 1216.188520] ? __alloc_fd+0x1be/0x490 [ 1216.192332] ? lock_downgrade+0x740/0x740 [ 1216.196510] ? do_raw_spin_unlock+0x164/0x220 [ 1216.201005] ? _raw_spin_unlock+0x29/0x40 [ 1216.205151] ? __alloc_fd+0x1be/0x490 [ 1216.208955] do_sys_open+0x296/0x410 [ 1216.212668] ? filp_open+0x60/0x60 [ 1216.216214] ? do_syscall_64+0x4c/0x640 [ 1216.220207] ? SyS_open+0x30/0x30 [ 1216.223660] do_syscall_64+0x1d5/0x640 [ 1216.227548] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1216.232732] RIP: 0033:0x7f10c0347024 [ 1216.236435] RSP: 002b:00007f10bed08eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1216.244140] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0347024 [ 1216.251403] RDX: 0000000000000002 RSI: 00007f10bed08fe0 RDI: 00000000ffffff9c [ 1216.258674] RBP: 00007f10bed08fe0 R08: 0000000000000000 R09: 00007f10bed091d0 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) 06:54:13 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) [ 1216.265946] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1216.273298] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:13 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000080)) 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 9) [ 1216.323146] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) 06:54:13 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1216.400834] FAULT_INJECTION: forcing a failure. [ 1216.400834] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.423955] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1216.424366] CPU: 1 PID: 26381 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1216.437539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.446892] Call Trace: [ 1216.449490] dump_stack+0x1b2/0x281 [ 1216.453129] should_fail.cold+0x10a/0x149 [ 1216.457285] should_failslab+0xd6/0x130 [ 1216.461352] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1216.466030] apparmor_file_alloc_security+0x129/0x800 [ 1216.471232] security_file_alloc+0x66/0xa0 [ 1216.475484] ? selinux_is_enabled+0x5/0x50 [ 1216.479719] get_empty_filp+0x16b/0x3f0 [ 1216.483698] path_openat+0x84/0x2970 [ 1216.487936] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1216.492800] ? path_lookupat+0x780/0x780 [ 1216.496948] ? trace_hardirqs_on+0x10/0x10 [ 1216.501189] ? fsnotify+0x974/0x11b0 [ 1216.504902] ? shmem_setattr+0x241/0xbf0 [ 1216.508972] do_filp_open+0x179/0x3c0 [ 1216.512776] ? may_open_dev+0xe0/0xe0 [ 1216.516577] ? __alloc_fd+0x1be/0x490 [ 1216.520382] ? lock_downgrade+0x740/0x740 [ 1216.524533] ? do_raw_spin_unlock+0x164/0x220 [ 1216.529028] ? _raw_spin_unlock+0x29/0x40 [ 1216.533182] ? __alloc_fd+0x1be/0x490 [ 1216.536989] do_sys_open+0x296/0x410 [ 1216.540701] ? filp_open+0x60/0x60 [ 1216.544244] ? do_syscall_64+0x4c/0x640 [ 1216.548218] ? SyS_open+0x30/0x30 [ 1216.551674] do_syscall_64+0x1d5/0x640 [ 1216.555570] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1216.560749] RIP: 0033:0x7f10c0347024 [ 1216.564457] RSP: 002b:00007f10bed08eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1216.572161] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0347024 [ 1216.579431] RDX: 0000000000000002 RSI: 00007f10bed08fe0 RDI: 00000000ffffff9c [ 1216.586698] RBP: 00007f10bed08fe0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1216.593968] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) [ 1216.601239] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) 06:54:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) 06:54:14 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x888000) read$snddsp(r0, &(0x7f00000000c0)=""/184, 0xb8) 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 10) 06:54:14 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x888000) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x9, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [0x9, 0x401, 0x2, 0x8000, 0x3f, 0x0, 0x4, 0xffffffb3], [0x6, 0x1, 0x1000, 0x5, 0x5, 0xff, 0x6, 0x7]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) 06:54:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 1) 06:54:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (fail_nth: 1) 06:54:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) [ 1216.841086] FAULT_INJECTION: forcing a failure. [ 1216.841086] name failslab, interval 1, probability 0, space 0, times 0 06:54:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000180)="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"]}) [ 1216.909667] FAULT_INJECTION: forcing a failure. [ 1216.909667] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.937581] CPU: 0 PID: 26438 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1216.945487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.954836] Call Trace: [ 1216.957417] dump_stack+0x1b2/0x281 [ 1216.961031] should_fail.cold+0x10a/0x149 [ 1216.965164] should_failslab+0xd6/0x130 [ 1216.969122] kmem_cache_alloc+0x28e/0x3c0 [ 1216.973263] __kernfs_new_node+0x6f/0x470 [ 1216.977404] kernfs_create_dir_ns+0x8c/0x200 [ 1216.981797] internal_create_group+0xe9/0x710 [ 1216.986369] lo_ioctl+0x1137/0x1cd0 [ 1216.989982] ? loop_set_status64+0xe0/0xe0 [ 1216.994198] blkdev_ioctl+0x540/0x1830 [ 1216.998070] ? blkpg_ioctl+0x8d0/0x8d0 [ 1217.002027] ? trace_hardirqs_on+0x10/0x10 [ 1217.006262] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1217.011344] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1217.016346] block_ioctl+0xd9/0x120 [ 1217.019953] ? blkdev_fallocate+0x3a0/0x3a0 [ 1217.024258] do_vfs_ioctl+0x75a/0xff0 [ 1217.028055] ? lock_acquire+0x170/0x3f0 [ 1217.032018] ? ioctl_preallocate+0x1a0/0x1a0 [ 1217.036409] ? __fget+0x265/0x3e0 [ 1217.039846] ? do_vfs_ioctl+0xff0/0xff0 [ 1217.043801] ? security_file_ioctl+0x83/0xb0 [ 1217.048189] SyS_ioctl+0x7f/0xb0 [ 1217.051535] ? do_vfs_ioctl+0xff0/0xff0 [ 1217.055493] do_syscall_64+0x1d5/0x640 [ 1217.059380] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1217.064551] RIP: 0033:0x7f10c0393ec7 [ 1217.068245] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1217.075934] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1217.083186] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1217.090443] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1217.097694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1217.104958] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1217.112237] CPU: 1 PID: 26451 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1217.120126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.129478] Call Trace: [ 1217.132070] dump_stack+0x1b2/0x281 [ 1217.135706] should_fail.cold+0x10a/0x149 [ 1217.139858] should_failslab+0xd6/0x130 [ 1217.143835] __kmalloc+0x2c1/0x400 [ 1217.147372] ? SyS_memfd_create+0xbc/0x3c0 [ 1217.151617] SyS_memfd_create+0xbc/0x3c0 [ 1217.155683] ? shmem_fcntl+0x120/0x120 [ 1217.159569] ? __do_page_fault+0x159/0xad0 [ 1217.163808] ? do_syscall_64+0x4c/0x640 [ 1217.167779] ? shmem_fcntl+0x120/0x120 [ 1217.171665] do_syscall_64+0x1d5/0x640 [ 1217.175558] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1217.180744] RIP: 0033:0x7fe33b68d109 [ 1217.184450] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1217.192155] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68d109 [ 1217.199508] RDX: 00007fe33a001fe0 RSI: 0000000000000000 RDI: 00007fe33b6e61be 06:54:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async, rerun: 32) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) (async, rerun: 32) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000180)="5a3d836e225e3fe467ec3c6cf616f4cf19c58caf6fd779c3b7417a5fc772ab009042d4c9f4f4b1fcda16725065c83cfc1325cb4a692c630cc25a324f6fba1b09688367c674e7417271e15ecf6dd10f83dae7de1f513e80f4e9650af8e6d7731974d9e8850604183c4d2c0b1ba24061d736eef6f06852efd648d8bb5d81e60af8717b1568c26f11391506049471e6a43e7ff9264c6f49e87265ada007788b2e11b4c0bdb7b9350fb46b572272c370c02637085f39df72cc5d8e7a9a3a6abdb58494c84faaded556f24bdc1899cf82e3307cd5d54c7c63a07c9abf016042b2b73e1d1b9aba00ada020df5fd7865dd2e5b7203f2977336693b83ff2dd525fbb6d7e0b92b0f34829fe3efc53d18783763f70629829c9d4d0aef1319e7ca354b668f2ace75a394c0a563c5c921631122b2778915f2a8abf9a0762f44c956ecff2954fe376ef13a6469dabfe21560b3639b45ae0fbe6a40a9df89009445041b018c4094a60411d56b59a1af5130708a4ba2a50afe0fc59ab12ec2caa9354c6e057fa694af4a56f1fb391353dafc3685dd054f7e59bda7a14969bb6481cb3ac35026aacddafed7ccf5fc9a440e90a0c9b2e13644fcaeca7763d5fdf5ed506f1614bafed4684ae11b5c1faa035f2bedccef4384912d21deea4eab5ee5cc02a0475d9493db2b5c81cbf6c15ad9e17635900e26c3da91a9d285ef008c58c9ae3ed8d78988bd1f502a2f9848a699953af59861e941709fab2cf9a5c6a266cb21a31b5e28745810349685fc8896ce9bca44cbbd72212c0a61e79ea53096f579cbf7c892a51a22e6c07c656e9eb8eab8db649f1bba050fc366e5110c8ba148b503aaa858a6f0e97636a09034a825f7d46b14757a5e8decfd710b1f4cf78515c6f72ce7b4fbbbb9383aaf04d5d0fc7421ce4b98f1c530e8f153e0e9b83c0548f6ffe322278d9bd7b4d624e6155090d97a7ec217d45854593bccf3fbb5053b2094ae2f1e30f47873d3850f3ac8f7aad0c6af0a831c322e6db3c741764a4974379f04f40c3d8edaac4283bdf5eb623cbf560549ceb1917c936d9023765a8de7b5a3e1edce52ef420fd66d2565d6ea5741dae0ca65d4d9ed093302fe115c6e118e3338e1a173ba328e059a490a5f04eb503854beab39813031a564fc6cbff44242bea1de7ff7315402e5a611e268a74e9ce2f231d4e6ee271e258e43a2ce9a22a8088e016045f3aace3ac29b77b0e07b7675dd8bd21c5fbd2a6c02d3ed9b13cb4fefae906fec09795c529105dbb4b0cd5e373a185faa2c84c1abe0e6a8a55bf0313d88bb4ac246c37857e28e555392ebf76e67b356bd6d3bab862f26dec59e61351e8e99d3a424fcfa5d5da25f5556b49c5105386ac0d60f6683991fb0698bb24416030d0ff2c2c6dda80ac94cbf5dad5f23c58ad1018d0d3459ea24f76f96c6ce8a90d8a9f55c6f5782456d2962f4c1e64654bba0af89244ebea0e4994bd4d044923a06ef10d3be4544242e4a31067170ba2105c0e4f84b5fbfd47497a5bdeab762e89c1c3fdd5c6b9e2730f32e1ace33b8f431dca6bb0bf5bcc83c00f2f500084b21cb095e7f9b367e4fbdebeb7523b7e30e26634997643a6957cc313e535736a828e8ea0a80a7cd6f0288d07621e2570a247a4dd21d3573be3a3fbb0c5ba6372a3ef2aaf4b44f6b92184645476e46b91c9217c6f4c74686ef3d038ae104eba0fb19000bfdbe46a1e226bf5b76eb964590330414322201ea6b686cff56da6c7b838dfced667c9f47a132adf59155ffe41251abfed533abc82198f48188b4a6944f16f7a25ead54c20a8ed03a57f060414d5ca8ad0249a59b248641122eae1566946572ec95280d07c3bddbad80e6b596e39cbd13114f31621c95aa6883a54e0075be2d435fbfa49dd36dda5ff9e26d30bcbcb74dadbc60c9fbb1ad9b8115c07225a6b284cbe8bae252d23e02eb5a36daf91587afe33b78de396c510a4a0d0366f0c4af9a2d7c1579d4b2521b3629b39f9b66d4227b4ac25d326b6f48d4c87490f8d8a4717f36101b29d02ca8624af899395c03e9991bc264e9d5cb14ef6a064f471e026dbaaf8571597aa4b47b5c8b617e86eb1c5bbad8b2a4b6144a7f323b75f42092e01dbb8e648b713421b01428a3b5abdd9709eb3e3b2887db434191973d6ccd9c6e3598abf3aabfee582474ac050bf26da51f9a48dae1315d95d8c9258edfd7205cc20f4402f8d6d59668d33a666bccd033c2a49e90a0e37e4539433acba9e0acbfe5e81cd97cd5d259c6210461c6008f3ec06ce40e88085539e6c0a0f7c18556acaa0d03f30f68db0080530c16d6d147621df0277983377b79e7cb9ec904fff4a8739180ccf257a68210bb8dbd880695949278dbc54e494a07c920d116882773040fc7a65074636e9d53a2fc2d852ab54b2c8b2bcce355d12f9d624333bb04555259345230a497b1b69a1321e95d7d814bf52ee9fec925bbe317d293239a6760f59d037847b53d968a6c518945aa7e7e64fd432f4caecb2c407d665b52d2b856d24b4956d0537edd12b1884aa3df749491357c2f9b30be4acf5d0015a71e0c0e6b63563c2b01908cd4816f0eb5b1d3fb628ed3e9af7b55c63c70d55ecde468aa36b051ec4fc34ed90fab29275d2d55ef71e381a04e7261676b0e6cc55378cdb2edec153efe8d5832ad2a5701fe447a3268f65fa83879508af9be95b9907c49cdec9a1af7fb276ed50c609d628265c20305f7a5039d529cc03a375ecbf36bb549e5543706bf23289933ea36619dc33f7510c06091a212120eefa3242521d437bf8133e76d7eaf1168bc89c44d4c4942a4389dd2028b9d05a20bc39d7a12be0d17aec80a98bea12b30f21ccb722e8a6e99dc306f50baa324866b42d0f2721e5eeffdab1d6e591cdb739e8b65ff94aed691effe1dbe40a62e83bc8cb7d791c1d1d24f30bafd8905e572c62bd871942e09286a164c18e0e115db0c06cce502d644c4091e0d387520bf778650a9790469c1ffb421fe9d04d7ae921a913266842ac9c4151a9f855b0e50b98bdfba71d145e662c27834f0102feafe1b764fd5e1d574d704683a62910f5ee6f3dce90c256d5c8d809128bba8de95b41e4fab590c630271e8fe048e707334f6866b3bc08203eaf41a5248359eb7885280049b2e332329dc2f2dd453a10afd228f42af3afc032ba9dd716b60f0b61a9b4078189d523c3dfb17da2e9f04e34387c2b7415b021943a1ba2793dfe6f7eb230a12fde1fa55fd7299a3e6cfd52e01c1ea1e4f0e87acd3aa1c78c6da41beedfb10f0dea9ba98f438fb14404e62e867e52ddfaea1350f432dc77e2ab9c6aec1d88a98bf0c0c0b9f0ec57d8e83de2e87a0476d90029f7154b9c14c4d49d7405cfff4ecabfc4bbcb0944b0d78cee073a4c14392ebe63608bf5af9914a2ab6195920169bf5519fdd5441c628a46ff1b0bcbf8f8a84f597c5c0d755d851d9ddf6d58b57c92ba6f08e17833de27d787ee7a7a55f3776f876624284657aae52f0d1ea9ff4f3208f494fb6d8e02f8146c2e6fa357cd7168972bd5582d27ed60cdcf185f6d1250c4fb745c11833e86966885f9b270bdddaaaf3143f43e2ccddbbf1a1a37dcf217344c6c7633905e12e53030f912f1d30849bb529db1e330a4588d1f72cf1650e3370d2cf6c54de03e645795317aa74e54e1ae2fd3d3cc6cd26dbeb688a63a8bb49c15f4216f1e5d206d95ae1dfb3e5561aed867a957b4f24de4936f2a4f2f328601220ee514254deba9666a2b3eb7b6adc309b125ea09258bbb9751f07615e0b6a7da817db0e9bb49ec3309b8c1f4bff0d898f98f5ce5812419551179bc8c64c6f87dbdc89c9f55310d70a8d7e5bdbf1322010b28dcba52c7f72402d89c23691ae0b13302667aef4fff961419b667faf6501d52fb28941152fa166ade505abbcacf85ee78469fb0ce1770c2be879c3ca2121bd03c351a96ca412352e13a976a736e70e05962841f74b5e3f269839d8fae20548b1cb7d8b4e26bd0a8b521123a86eb7bedf05fa4c076de693df29ac4414493f740e6939c64964d70b93fe58229d72904720e85506e55c3bbf2ee05d2afa165bea92e3c11989a1fdc13614e9d6e338053383ed3f2f25e4a36738c48f014236e7cef4886dcb2bb8fc5554add4ec5a0496c98f4b49b4d2971e91dcf42530fcac9f7cfb35a27cb66e5561f26406b7fafb19952ea7bb3be6961fb3d8c7e326564efef920965b1632acf817577d733887ed8ddcc156c8c92deb6ff5f4eedd551277e403d29b2ff8e92fa602ba71b1f26500f4df396188b1e5852162236d648020b244be2fceda424ce6bf7de1b73042ef7121bfc497013416d512f9ecc362e0edafbd595089fba2e04a4c3019c69d2d098a3b550f8aabad1c84f9a3f4c0dee83a21d1651461d87922044ad819c60ad14063f07535169d223fafed3696bafa360d3875b48674cb11e4a14ddd62acbf7e9e3edd235ddbe9b247dcb4fd5265221a5b7efd2f1ea2104964bec6aa843a299d34b319a72b596661a171225f6cff22ba2a64f78406cc1206ebae82772c40ace08ace0bd193ed2b74839fb94741a6596cc2d871842a99f6e00a2fcd1258cbbb1b86686fed5a62eb39c0d903aadb32f8de14c888a02b71e91184d7607efd663cd8cf902ffbeed136e497ac50419ed9bda10ffe809dd4f7b99af38ad638fdec23b0ffa88e1147e9b43d5313e14cfc3d9331850f81d43d903c2db399253083aef9f48ee8c2fd8fc828f092e9bb9dcb80464c820b6f5b1788cbc0dcbdfba7990a6c9b953280c8e97e5cd55a991066b09399c4f26211044896b009c651d50b4a4021a16cf4467b4abeb6b26d32e074759c85ba60a3878eeedb5737e8f4e7405f7388da89032dcc3518ee27b74b4295c4307e4dd664271800552fafd6887cc65dc521c02cbabc287c6bd30763176db167796b96f6d6b8aec56506b5267160ff6c2b8d3ca4c81c056169c91cc4bd8705d6e7dd0d427e276465c82e16e2cd2e6858a01f42e2bb9217fb7526cbb893793d73129739856f0d1b31814dfd42ed1e52b5a581a89c1983af4590239031033ebf00e11289fffea1bea7a30ff6ea5b2b38ca6f761b2f02ec533b06695a19138f1a2f51041c6c62ec9598afc1122048fc660f8d82ab4d86eaa8cc904ab155fe201f04fd8a8d4dd9e0a087c3b0a9bc1a07022df0d679361421e59b49cac6dee95bc1cebd211f512a4da7054651a70ca972fa4b02b99f349bf887099a7873ccd2a8dc012e6bc2fc5a78423e0d82003bf2236c6bcf01cea1d6e96c2ead876f4fb3bf1371480b3f08a26f429d478dc7a8a0e4d05e16f809d5d3fa067abf274e91eb7eb3548e45d8bb91f72aa781a32ddb9b581b40007511b05c1552bdcc39df88152c9b578b5a39b7da3f98d40d7c127a4b1a958e100322078140a1085d05d18d0c3460090f0254811dadbe493c703dc00e15978acbfca8f26fdc0c2192dcd0cffdf6066bb34d9ae3a7b317c52417ee3179927c706c29c3ac9c6ecb66cf9458be708a8b3fbd2e82a9de14bf90763b3e3c2c372e0b38be8a35dbfb389a4bf113bdad66f34fb1326b88c7f86f75c7677e500429df60c8a1bff81417dd6f2e46f480b8373e8a814f4baaa3e7101fd55b4531b88a31d66db9f0f58d1361c09ae2eca95c58e3f005940420c2db2202dea74db124cf0953a2f978235f1db9f15409eafa99256a6ce3c158ad5d62e8d1d1e70043792bde36ed58ceebe96e2c3395b95a791e311c5bce4e5b85e76415b7ed7c005804db7a60894b86e473f2bbf4a714df29e7fc8"]}) 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1217.206779] RBP: 0000000000000000 R08: 00007fe33a001fd8 R09: 00007fe33a0021d0 [ 1217.214064] R10: 00007fe33a001fdc R11: 0000000000000246 R12: 0000000020000200 [ 1217.221330] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 06:54:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 11) 06:54:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 2) 06:54:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000180)="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"]}) [ 1217.305580] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:14 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1217.390728] FAULT_INJECTION: forcing a failure. [ 1217.390728] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.412674] FAULT_INJECTION: forcing a failure. [ 1217.412674] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.412981] CPU: 0 PID: 26489 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1217.432029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.441380] Call Trace: [ 1217.443963] dump_stack+0x1b2/0x281 [ 1217.447576] should_fail.cold+0x10a/0x149 [ 1217.451734] should_failslab+0xd6/0x130 [ 1217.455692] kmem_cache_alloc+0x28e/0x3c0 [ 1217.459834] __d_alloc+0x2a/0xa20 [ 1217.463271] ? lock_downgrade+0x740/0x740 [ 1217.467403] __shmem_file_setup.part.0+0xcb/0x3c0 [ 1217.472225] ? shmem_create+0x30/0x30 [ 1217.476003] ? __alloc_fd+0x1be/0x490 [ 1217.479789] SyS_memfd_create+0x1fc/0x3c0 [ 1217.483919] ? shmem_fcntl+0x120/0x120 [ 1217.487805] ? __do_page_fault+0x159/0xad0 [ 1217.492022] ? do_syscall_64+0x4c/0x640 [ 1217.495977] ? shmem_fcntl+0x120/0x120 [ 1217.499848] do_syscall_64+0x1d5/0x640 [ 1217.503722] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1217.508894] RIP: 0033:0x7fe33b68d109 [ 1217.512588] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1217.520278] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68d109 [ 1217.527529] RDX: 00007fe33a001fe0 RSI: 0000000000000000 RDI: 00007fe33b6e61be [ 1217.534780] RBP: 0000000000000000 R08: 00007fe33a001fd8 R09: 00007fe33a0021d0 [ 1217.542032] R10: 00007fe33a001fdc R11: 0000000000000246 R12: 0000000020000200 [ 1217.549283] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 [ 1217.556566] CPU: 1 PID: 26486 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1217.564450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.573899] Call Trace: [ 1217.576476] dump_stack+0x1b2/0x281 [ 1217.580159] should_fail.cold+0x10a/0x149 [ 1217.584306] should_failslab+0xd6/0x130 [ 1217.588270] kmem_cache_alloc+0x40/0x3c0 [ 1217.592315] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 1217.598021] idr_get_free_cmn+0x595/0x8d0 [ 1217.602169] idr_alloc_cmn+0xe8/0x1e0 [ 1217.605950] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 1217.610771] ? cpuacct_charge+0x1cf/0x350 [ 1217.614898] ? fs_reclaim_release+0xd0/0x110 [ 1217.619389] idr_alloc_cyclic+0xc2/0x1d0 [ 1217.623529] ? idr_alloc_cmn+0x1e0/0x1e0 [ 1217.627575] ? __radix_tree_preload+0x1c3/0x250 [ 1217.632229] __kernfs_new_node+0xaf/0x470 [ 1217.636357] kernfs_create_dir_ns+0x8c/0x200 [ 1217.640741] internal_create_group+0xe9/0x710 [ 1217.645355] lo_ioctl+0x1137/0x1cd0 [ 1217.648968] ? loop_set_status64+0xe0/0xe0 [ 1217.653198] blkdev_ioctl+0x540/0x1830 [ 1217.657059] ? blkpg_ioctl+0x8d0/0x8d0 [ 1217.660926] ? trace_hardirqs_on+0x10/0x10 [ 1217.665142] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1217.670223] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1217.675221] block_ioctl+0xd9/0x120 [ 1217.678824] ? blkdev_fallocate+0x3a0/0x3a0 [ 1217.683122] do_vfs_ioctl+0x75a/0xff0 [ 1217.686905] ? lock_acquire+0x170/0x3f0 [ 1217.690871] ? ioctl_preallocate+0x1a0/0x1a0 [ 1217.695431] ? __fget+0x265/0x3e0 [ 1217.698864] ? do_vfs_ioctl+0xff0/0xff0 [ 1217.702825] ? security_file_ioctl+0x83/0xb0 [ 1217.707303] SyS_ioctl+0x7f/0xb0 [ 1217.710645] ? do_vfs_ioctl+0xff0/0xff0 [ 1217.714598] do_syscall_64+0x1d5/0x640 [ 1217.718488] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1217.723655] RIP: 0033:0x7f10c0393ec7 [ 1217.727369] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1217.735052] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 06:54:15 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000340)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="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", &(0x7f0000000000)="077e7a387417832c09d646b9381fc1c78b8bb5fb87a01b6e47de9b049cbd9bf957655b5336c6bc6c9726eeadc10d2049ecd3cae17146f2", &(0x7f00000001c0)="65e8d3548b1e271ad1070b900ea3a96b21ca7ff786056907b0e468cac19599a72254f29d287eaa124fb73ed2949d6ef8a96572804002b87bba7ae3bf870cd9e9967f706031987178a7e2dcfcc02e6051288bfe81385bdb58d4506b0c94b6f076ed53d9004a048e885029", &(0x7f0000000240)="785479c3ce7067a317581bcd8635662054ff1702e5afa59dcfbbab8264fde78adfd06e766755e3f32c9014aa385d520dd82df4704d125e4efbe12fd750711e9dd5a448c2ecdc517e7f06e2356a6059d347e93cb59a9891f3c72d4c474e346e208d9f3f9ab57dd032589e37f2a4cd58886b93511d270a187e", &(0x7f00000002c0)="b658e770f6c727e0c6be6de9496463536eb321bd7a1a811a2faeda5358857cd7bbf42f25fcb58887cb5bd80a4722239eee3f6700fcb6a8c6a349ca96a86bb563061d4a143123d2c780c89c444d8d5b8dbd4f9ce01a20ee0129568a37f6264edcfaf594"]}) 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1217.742297] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1217.749555] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1217.756801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1217.764068] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:15 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 3) 06:54:15 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000340)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="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", &(0x7f0000000000)="077e7a387417832c09d646b9381fc1c78b8bb5fb87a01b6e47de9b049cbd9bf957655b5336c6bc6c9726eeadc10d2049ecd3cae17146f2", &(0x7f00000001c0)="65e8d3548b1e271ad1070b900ea3a96b21ca7ff786056907b0e468cac19599a72254f29d287eaa124fb73ed2949d6ef8a96572804002b87bba7ae3bf870cd9e9967f706031987178a7e2dcfcc02e6051288bfe81385bdb58d4506b0c94b6f076ed53d9004a048e885029", &(0x7f0000000240)="785479c3ce7067a317581bcd8635662054ff1702e5afa59dcfbbab8264fde78adfd06e766755e3f32c9014aa385d520dd82df4704d125e4efbe12fd750711e9dd5a448c2ecdc517e7f06e2356a6059d347e93cb59a9891f3c72d4c474e346e208d9f3f9ab57dd032589e37f2a4cd58886b93511d270a187e", &(0x7f00000002c0)="b658e770f6c727e0c6be6de9496463536eb321bd7a1a811a2faeda5358857cd7bbf42f25fcb58887cb5bd80a4722239eee3f6700fcb6a8c6a349ca96a86bb563061d4a143123d2c780c89c444d8d5b8dbd4f9ce01a20ee0129568a37f6264edcfaf594"]}) 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1217.843389] FAULT_INJECTION: forcing a failure. [ 1217.843389] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.877636] CPU: 0 PID: 26510 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1217.885547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.894903] Call Trace: [ 1217.897499] dump_stack+0x1b2/0x281 [ 1217.901256] should_fail.cold+0x10a/0x149 [ 1217.905408] should_failslab+0xd6/0x130 [ 1217.909389] kmem_cache_alloc+0x28e/0x3c0 [ 1217.913532] ? shmem_destroy_callback+0xa0/0xa0 [ 1217.918636] shmem_alloc_inode+0x18/0x40 [ 1217.922694] ? shmem_destroy_callback+0xa0/0xa0 [ 1217.927361] alloc_inode+0x5d/0x170 [ 1217.930987] new_inode+0x1d/0xf0 [ 1217.934353] shmem_get_inode+0x8b/0x890 [ 1217.938327] __shmem_file_setup.part.0+0x104/0x3c0 [ 1217.943253] ? shmem_create+0x30/0x30 [ 1217.947057] ? __alloc_fd+0x1be/0x490 [ 1217.950861] SyS_memfd_create+0x1fc/0x3c0 [ 1217.955012] ? shmem_fcntl+0x120/0x120 [ 1217.958902] ? __do_page_fault+0x159/0xad0 [ 1217.963133] ? do_syscall_64+0x4c/0x640 [ 1217.967104] ? shmem_fcntl+0x120/0x120 [ 1217.970990] do_syscall_64+0x1d5/0x640 [ 1217.974876] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1217.980064] RIP: 0033:0x7fe33b68d109 [ 1217.983769] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1217.991476] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68d109 [ 1217.998743] RDX: 00007fe33a001fe0 RSI: 0000000000000000 RDI: 00007fe33b6e61be [ 1218.006092] RBP: 0000000000000000 R08: 00007fe33a001fd8 R09: 00007fe33a0021d0 [ 1218.013359] R10: 00007fe33a001fdc R11: 0000000000000246 R12: 0000000020000200 [ 1218.020621] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 [ 1218.036633] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 12) 06:54:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:15 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 4) 06:54:15 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000340)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="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", &(0x7f0000000000)="077e7a387417832c09d646b9381fc1c78b8bb5fb87a01b6e47de9b049cbd9bf957655b5336c6bc6c9726eeadc10d2049ecd3cae17146f2", &(0x7f00000001c0)="65e8d3548b1e271ad1070b900ea3a96b21ca7ff786056907b0e468cac19599a72254f29d287eaa124fb73ed2949d6ef8a96572804002b87bba7ae3bf870cd9e9967f706031987178a7e2dcfcc02e6051288bfe81385bdb58d4506b0c94b6f076ed53d9004a048e885029", &(0x7f0000000240)="785479c3ce7067a317581bcd8635662054ff1702e5afa59dcfbbab8264fde78adfd06e766755e3f32c9014aa385d520dd82df4704d125e4efbe12fd750711e9dd5a448c2ecdc517e7f06e2356a6059d347e93cb59a9891f3c72d4c474e346e208d9f3f9ab57dd032589e37f2a4cd58886b93511d270a187e", &(0x7f00000002c0)="b658e770f6c727e0c6be6de9496463536eb321bd7a1a811a2faeda5358857cd7bbf42f25fcb58887cb5bd80a4722239eee3f6700fcb6a8c6a349ca96a86bb563061d4a143123d2c780c89c444d8d5b8dbd4f9ce01a20ee0129568a37f6264edcfaf594"]}) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000340)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="17b1e4b0f9fe6c66ab67623c2ed8a64752b065dce3ab00e4a1478b519230ac24c576e54c237f3a19ad6dd7258542a92f85fd8c7fcab0ff21fc3959dbed6dbc98c5bddc5313b1f10b2a54d7e3dcb49d28cc76b390911cc69e6b537dd11541769f6e1167a3abe5d0a1067a8570ba1e4aede1da57636d085c835972ac1e40adabcffc1f6d374df0a4712a3a707d033c0b119ed85f2d8bae95ee7f61d51509bb34f4a49472ed4b7e74424d7a50cb74304e521622720ddea62314c09a652ff24674512ae0d4d748df1eb18a5be5b817757f01ebb0b47d16fc84466c56699a9de3d3d6a65b2beecf7a52e6bcc030e2af884ec876ae119f8f3dd0ff48f821a436dd42", &(0x7f0000000000)="077e7a387417832c09d646b9381fc1c78b8bb5fb87a01b6e47de9b049cbd9bf957655b5336c6bc6c9726eeadc10d2049ecd3cae17146f2", &(0x7f00000001c0)="65e8d3548b1e271ad1070b900ea3a96b21ca7ff786056907b0e468cac19599a72254f29d287eaa124fb73ed2949d6ef8a96572804002b87bba7ae3bf870cd9e9967f706031987178a7e2dcfcc02e6051288bfe81385bdb58d4506b0c94b6f076ed53d9004a048e885029", &(0x7f0000000240)="785479c3ce7067a317581bcd8635662054ff1702e5afa59dcfbbab8264fde78adfd06e766755e3f32c9014aa385d520dd82df4704d125e4efbe12fd750711e9dd5a448c2ecdc517e7f06e2356a6059d347e93cb59a9891f3c72d4c474e346e208d9f3f9ab57dd032589e37f2a4cd58886b93511d270a187e", &(0x7f00000002c0)="b658e770f6c727e0c6be6de9496463536eb321bd7a1a811a2faeda5358857cd7bbf42f25fcb58887cb5bd80a4722239eee3f6700fcb6a8c6a349ca96a86bb563061d4a143123d2c780c89c444d8d5b8dbd4f9ce01a20ee0129568a37f6264edcfaf594"]}) (async) 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1218.150566] FAULT_INJECTION: forcing a failure. [ 1218.150566] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.152319] FAULT_INJECTION: forcing a failure. [ 1218.152319] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.187721] CPU: 1 PID: 26532 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1218.195618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.204970] Call Trace: [ 1218.207585] dump_stack+0x1b2/0x281 [ 1218.211215] should_fail.cold+0x10a/0x149 [ 1218.215400] should_failslab+0xd6/0x130 [ 1218.219378] kmem_cache_alloc+0x28e/0x3c0 [ 1218.223536] __kernfs_new_node+0x6f/0x470 [ 1218.227680] kernfs_new_node+0x7b/0xe0 [ 1218.231561] __kernfs_create_file+0x3d/0x320 [ 1218.235970] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1218.240634] ? kernfs_create_dir_ns+0x171/0x200 [ 1218.245304] internal_create_group+0x22b/0x710 [ 1218.249888] lo_ioctl+0x1137/0x1cd0 [ 1218.253523] ? loop_set_status64+0xe0/0xe0 [ 1218.258535] blkdev_ioctl+0x540/0x1830 [ 1218.262414] ? blkpg_ioctl+0x8d0/0x8d0 [ 1218.266308] ? trace_hardirqs_on+0x10/0x10 [ 1218.270543] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1218.275642] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1218.280656] block_ioctl+0xd9/0x120 [ 1218.284275] ? blkdev_fallocate+0x3a0/0x3a0 [ 1218.288593] do_vfs_ioctl+0x75a/0xff0 [ 1218.292389] ? lock_acquire+0x170/0x3f0 [ 1218.296364] ? ioctl_preallocate+0x1a0/0x1a0 [ 1218.300765] ? __fget+0x265/0x3e0 [ 1218.304204] ? do_vfs_ioctl+0xff0/0xff0 [ 1218.308175] ? security_file_ioctl+0x83/0xb0 [ 1218.312581] SyS_ioctl+0x7f/0xb0 [ 1218.315940] ? do_vfs_ioctl+0xff0/0xff0 [ 1218.319916] do_syscall_64+0x1d5/0x640 [ 1218.323805] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1218.328995] RIP: 0033:0x7f10c0393ec7 [ 1218.332694] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1218.340390] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:15 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x80, 0x54a03) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) read$snddsp(r2, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000000140)={0x0, &(0x7f0000000000)=[&(0x7f0000000080)="47ff943b1585d8e9443337127cdf862b193edcaac9a91c60d372901c2bfa13bc211d28a5242010e4d7e3e95c567beef3d02dbaaee13086747ee55daf48ba8f5b39a7ae0429f16dda0b90dba885ba88259c1aa36eaddeb9372f715a3e3e7cf444840a7ca9b4c53679962a26b769d3edae7d735e84973d0b3ad89610cc02d33b15431ca98b7f6f115770f052edd4daf333f8dbf2f9d4421b"]}) [ 1218.347652] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1218.354918] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1218.362186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1218.369449] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1218.399849] CPU: 0 PID: 26533 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1218.407847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.417202] Call Trace: [ 1218.419795] dump_stack+0x1b2/0x281 [ 1218.423434] should_fail.cold+0x10a/0x149 [ 1218.425273] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1218.427582] should_failslab+0xd6/0x130 [ 1218.427596] kmem_cache_alloc+0x28e/0x3c0 [ 1218.427609] get_empty_filp+0x86/0x3f0 [ 1218.446875] alloc_file+0x23/0x440 06:54:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1218.450419] __shmem_file_setup.part.0+0x198/0x3c0 [ 1218.455350] ? shmem_create+0x30/0x30 [ 1218.459145] ? __alloc_fd+0x1be/0x490 [ 1218.462952] SyS_memfd_create+0x1fc/0x3c0 [ 1218.467101] ? shmem_fcntl+0x120/0x120 [ 1218.470983] ? __do_page_fault+0x159/0xad0 [ 1218.475213] ? do_syscall_64+0x4c/0x640 [ 1218.479181] ? shmem_fcntl+0x120/0x120 [ 1218.483088] do_syscall_64+0x1d5/0x640 [ 1218.486974] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1218.492153] RIP: 0033:0x7fe33b68d109 06:54:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 13) [ 1218.495854] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1218.503560] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68d109 [ 1218.510821] RDX: 00007fe33a001fe0 RSI: 0000000000000000 RDI: 00007fe33b6e61be [ 1218.518082] RBP: 0000000000000000 R08: 00007fe33a001fd8 R09: 00007fe33a0021d0 [ 1218.525348] R10: 00007fe33a001fdc R11: 0000000000000246 R12: 0000000020000200 [ 1218.532612] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 [ 1218.586500] FAULT_INJECTION: forcing a failure. [ 1218.586500] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.597846] CPU: 0 PID: 26569 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1218.605727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.615086] Call Trace: [ 1218.617675] dump_stack+0x1b2/0x281 [ 1218.621311] should_fail.cold+0x10a/0x149 [ 1218.625462] should_failslab+0xd6/0x130 [ 1218.629446] kmem_cache_alloc+0x40/0x3c0 [ 1218.633515] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 1218.639142] idr_get_free_cmn+0x595/0x8d0 [ 1218.643296] ? trace_hardirqs_on+0x10/0x10 [ 1218.647552] idr_alloc_cmn+0xe8/0x1e0 [ 1218.651355] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 1218.656202] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1218.661240] ? __schedule+0x1450/0x1de0 [ 1218.665228] ? cpuacct_charge+0x1cf/0x350 [ 1218.669374] ? fs_reclaim_release+0xd0/0x110 [ 1218.673783] idr_alloc_cyclic+0xc2/0x1d0 [ 1218.677852] ? idr_alloc_cmn+0x1e0/0x1e0 [ 1218.681910] ? __radix_tree_preload+0x1c3/0x250 [ 1218.686582] __kernfs_new_node+0xaf/0x470 [ 1218.690727] kernfs_create_dir_ns+0x8c/0x200 [ 1218.695139] internal_create_group+0xe9/0x710 [ 1218.699639] lo_ioctl+0x1137/0x1cd0 [ 1218.703270] ? loop_set_status64+0xe0/0xe0 [ 1218.707514] blkdev_ioctl+0x540/0x1830 [ 1218.711401] ? blkpg_ioctl+0x8d0/0x8d0 [ 1218.715286] ? trace_hardirqs_on+0x10/0x10 [ 1218.719532] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1218.724633] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1218.729652] block_ioctl+0xd9/0x120 06:54:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:16 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:16 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:16 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x80, 0x54a03) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async, rerun: 32) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 32) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 64) read$snddsp(r2, 0x0, 0x0) (async, rerun: 64) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000000140)={0x0, &(0x7f0000000000)=[&(0x7f0000000080)="47ff943b1585d8e9443337127cdf862b193edcaac9a91c60d372901c2bfa13bc211d28a5242010e4d7e3e95c567beef3d02dbaaee13086747ee55daf48ba8f5b39a7ae0429f16dda0b90dba885ba88259c1aa36eaddeb9372f715a3e3e7cf444840a7ca9b4c53679962a26b769d3edae7d735e84973d0b3ad89610cc02d33b15431ca98b7f6f115770f052edd4daf333f8dbf2f9d4421b"]}) 06:54:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 5) [ 1218.733291] ? blkdev_fallocate+0x3a0/0x3a0 [ 1218.737606] do_vfs_ioctl+0x75a/0xff0 [ 1218.741403] ? lock_acquire+0x170/0x3f0 [ 1218.745371] ? ioctl_preallocate+0x1a0/0x1a0 [ 1218.749779] ? __fget+0x265/0x3e0 [ 1218.753233] ? do_vfs_ioctl+0xff0/0xff0 [ 1218.757206] ? security_file_ioctl+0x83/0xb0 [ 1218.761612] SyS_ioctl+0x7f/0xb0 [ 1218.764969] ? do_vfs_ioctl+0xff0/0xff0 [ 1218.768939] do_syscall_64+0x1d5/0x640 [ 1218.772832] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1218.778014] RIP: 0033:0x7f10c0393ec7 [ 1218.781716] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1218.789426] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1218.796693] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1218.803957] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1218.811204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1218.818453] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1218.828526] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 14) 06:54:16 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:16 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x80, 0x54a03) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) read$snddsp(r2, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000000140)={0x0, &(0x7f0000000000)=[&(0x7f0000000080)="47ff943b1585d8e9443337127cdf862b193edcaac9a91c60d372901c2bfa13bc211d28a5242010e4d7e3e95c567beef3d02dbaaee13086747ee55daf48ba8f5b39a7ae0429f16dda0b90dba885ba88259c1aa36eaddeb9372f715a3e3e7cf444840a7ca9b4c53679962a26b769d3edae7d735e84973d0b3ad89610cc02d33b15431ca98b7f6f115770f052edd4daf333f8dbf2f9d4421b"]}) syz_open_dev$sndpcmc(&(0x7f0000000040), 0x80, 0x54a03) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) read$snddsp(r2, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000000140)={0x0, &(0x7f0000000000)=[&(0x7f0000000080)="47ff943b1585d8e9443337127cdf862b193edcaac9a91c60d372901c2bfa13bc211d28a5242010e4d7e3e95c567beef3d02dbaaee13086747ee55daf48ba8f5b39a7ae0429f16dda0b90dba885ba88259c1aa36eaddeb9372f715a3e3e7cf444840a7ca9b4c53679962a26b769d3edae7d735e84973d0b3ad89610cc02d33b15431ca98b7f6f115770f052edd4daf333f8dbf2f9d4421b"]}) (async) [ 1218.847542] FAULT_INJECTION: forcing a failure. [ 1218.847542] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.900550] FAULT_INJECTION: forcing a failure. [ 1218.900550] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.917691] CPU: 1 PID: 26581 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1218.925593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.934983] Call Trace: [ 1218.937590] dump_stack+0x1b2/0x281 [ 1218.941266] should_fail.cold+0x10a/0x149 [ 1218.945418] should_failslab+0xd6/0x130 [ 1218.949394] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1218.954071] apparmor_file_alloc_security+0x129/0x800 [ 1218.959275] security_file_alloc+0x66/0xa0 [ 1218.963506] ? selinux_is_enabled+0x5/0x50 [ 1218.967744] get_empty_filp+0x16b/0x3f0 [ 1218.971719] alloc_file+0x23/0x440 [ 1218.975264] __shmem_file_setup.part.0+0x198/0x3c0 [ 1218.980188] ? shmem_create+0x30/0x30 [ 1218.983983] ? __alloc_fd+0x1be/0x490 [ 1218.987782] SyS_memfd_create+0x1fc/0x3c0 [ 1218.991929] ? shmem_fcntl+0x120/0x120 [ 1218.995813] ? __do_page_fault+0x159/0xad0 [ 1219.000047] ? do_syscall_64+0x4c/0x640 [ 1219.004018] ? shmem_fcntl+0x120/0x120 [ 1219.008073] do_syscall_64+0x1d5/0x640 [ 1219.011958] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1219.017167] RIP: 0033:0x7fe33b68d109 [ 1219.020864] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1219.028564] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68d109 [ 1219.035816] RDX: 00007fe33a001fe0 RSI: 0000000000000000 RDI: 00007fe33b6e61be [ 1219.043073] RBP: 0000000000000000 R08: 00007fe33a001fd8 R09: 00007fe33a0021d0 06:54:16 executing program 2: getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001100)={r0, 0xc0, "81138c7d7cee9512a775f363491b3d4e59fca4330a495b35a51395227709bb8ba2da180d509f946c7ce8e4fddfb32c38f8100ea126644276ad39243083d6ddf9e5b6cfbfcb1db8103e112005733720283dd6f3c0ab90fe90dc41bd9aab1b39980b958c5ce2ea29934517d1d76bfc749e101db83a07f50d8a75692501326a4305fb8e7e235cd44f0cd5061dbc48360da146a9bdb106a4a2938581db2a43282ccafaee0312081a22d4772648da1dae80202c1035717965783d890771bdd015f88c"}, &(0x7f0000000040)=0xc8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r1, 0x0, 0x0) 06:54:16 executing program 2: getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001100)={r0, 0xc0, "81138c7d7cee9512a775f363491b3d4e59fca4330a495b35a51395227709bb8ba2da180d509f946c7ce8e4fddfb32c38f8100ea126644276ad39243083d6ddf9e5b6cfbfcb1db8103e112005733720283dd6f3c0ab90fe90dc41bd9aab1b39980b958c5ce2ea29934517d1d76bfc749e101db83a07f50d8a75692501326a4305fb8e7e235cd44f0cd5061dbc48360da146a9bdb106a4a2938581db2a43282ccafaee0312081a22d4772648da1dae80202c1035717965783d890771bdd015f88c"}, &(0x7f0000000040)=0xc8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) (async) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001100)={r0, 0xc0, "81138c7d7cee9512a775f363491b3d4e59fca4330a495b35a51395227709bb8ba2da180d509f946c7ce8e4fddfb32c38f8100ea126644276ad39243083d6ddf9e5b6cfbfcb1db8103e112005733720283dd6f3c0ab90fe90dc41bd9aab1b39980b958c5ce2ea29934517d1d76bfc749e101db83a07f50d8a75692501326a4305fb8e7e235cd44f0cd5061dbc48360da146a9bdb106a4a2938581db2a43282ccafaee0312081a22d4772648da1dae80202c1035717965783d890771bdd015f88c"}, &(0x7f0000000040)=0xc8) (async) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r1, 0x0, 0x0) (async) [ 1219.050338] R10: 00007fe33a001fdc R11: 0000000000000246 R12: 0000000020000200 [ 1219.057600] R13: 0000000020000240 R14: 0000000000000000 R15: 0000000020000500 [ 1219.071037] CPU: 0 PID: 26593 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1219.078934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.088291] Call Trace: [ 1219.090878] dump_stack+0x1b2/0x281 [ 1219.094511] should_fail.cold+0x10a/0x149 06:54:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 6) 06:54:16 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1219.098662] should_failslab+0xd6/0x130 [ 1219.102654] kmem_cache_alloc+0x28e/0x3c0 [ 1219.106811] __kernfs_new_node+0x6f/0x470 [ 1219.110960] kernfs_new_node+0x7b/0xe0 [ 1219.114846] __kernfs_create_file+0x3d/0x320 [ 1219.119253] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1219.123918] ? kernfs_create_dir_ns+0x171/0x200 [ 1219.128593] internal_create_group+0x22b/0x710 [ 1219.133181] lo_ioctl+0x1137/0x1cd0 [ 1219.136815] ? loop_set_status64+0xe0/0xe0 [ 1219.139406] FAULT_INJECTION: forcing a failure. [ 1219.139406] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.141133] blkdev_ioctl+0x540/0x1830 [ 1219.141145] ? blkpg_ioctl+0x8d0/0x8d0 [ 1219.141154] ? trace_hardirqs_on+0x10/0x10 [ 1219.141170] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1219.170147] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1219.175216] block_ioctl+0xd9/0x120 [ 1219.178825] ? blkdev_fallocate+0x3a0/0x3a0 [ 1219.183130] do_vfs_ioctl+0x75a/0xff0 [ 1219.186921] ? lock_acquire+0x170/0x3f0 [ 1219.190880] ? ioctl_preallocate+0x1a0/0x1a0 [ 1219.195277] ? __fget+0x265/0x3e0 [ 1219.198725] ? do_vfs_ioctl+0xff0/0xff0 [ 1219.202773] ? security_file_ioctl+0x83/0xb0 [ 1219.207271] SyS_ioctl+0x7f/0xb0 [ 1219.210618] ? do_vfs_ioctl+0xff0/0xff0 [ 1219.214596] do_syscall_64+0x1d5/0x640 [ 1219.218473] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1219.223645] RIP: 0033:0x7f10c0393ec7 [ 1219.227337] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1219.235055] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1219.242304] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1219.249666] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1219.257005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1219.264257] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1219.271526] CPU: 1 PID: 26627 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1219.279498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.288848] Call Trace: [ 1219.291435] dump_stack+0x1b2/0x281 [ 1219.295074] should_fail.cold+0x10a/0x149 [ 1219.299226] should_failslab+0xd6/0x130 [ 1219.303201] kmem_cache_alloc+0x28e/0x3c0 [ 1219.307440] getname_flags+0xc8/0x550 [ 1219.311259] do_sys_open+0x1ce/0x410 [ 1219.314975] ? filp_open+0x60/0x60 [ 1219.318522] ? do_syscall_64+0x4c/0x640 [ 1219.322493] ? SyS_open+0x30/0x30 [ 1219.325957] do_syscall_64+0x1d5/0x640 [ 1219.329852] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1219.335035] RIP: 0033:0x7fe33b640024 [ 1219.338534] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) [ 1219.338774] RSP: 002b:00007fe33a001eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1219.353760] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b640024 [ 1219.361024] RDX: 0000000000000002 RSI: 00007fe33a001fe0 RDI: 00000000ffffff9c [ 1219.368288] RBP: 00007fe33a001fe0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1219.375552] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1219.382828] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:16 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7, 0x9, 0x8001, 0x4, 0x1, 0xcf8, 0x81, 0x1], [], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x9, 0x1, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:16 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:16 executing program 2: getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001100)={r0, 0xc0, "81138c7d7cee9512a775f363491b3d4e59fca4330a495b35a51395227709bb8ba2da180d509f946c7ce8e4fddfb32c38f8100ea126644276ad39243083d6ddf9e5b6cfbfcb1db8103e112005733720283dd6f3c0ab90fe90dc41bd9aab1b39980b958c5ce2ea29934517d1d76bfc749e101db83a07f50d8a75692501326a4305fb8e7e235cd44f0cd5061dbc48360da146a9bdb106a4a2938581db2a43282ccafaee0312081a22d4772648da1dae80202c1035717965783d890771bdd015f88c"}, &(0x7f0000000040)=0xc8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x1000, "815db62ce4aa9dca17abda4e2ed51c17666c8caadbfeca60f7540f677bc4eb04f5a73f8fd7969a71cbeb680d8e1a06a82fc4c70a4efdaad05b14ce7c85c4b54ad5d64de895807accc172987c928e56a5837ff35bc0d12143edc5507e8af8f89fc470a173d1e30841d1add453bdbffde462df01fb558620a950967f9feb307191127c5005fbe61b596a02c2046142c72dc02d5fafd316263aa1b4910f2cef94194b5548bba935fd0b823d64e270354acc3cc77b5bc5eb8bcfaf06c4e30eeef484bb8914520ff047ffa1e3fb34eb7885fd12a43cf45c60d559d8035d4d895c100b97953db7764078ff0914d2374e11a6dbd5d28317362927e34262bbd55fe3251c4e25f0d59fd9c50049951d1d7a027c458480ce3ec6cb9ef08cabd7a08b15ebfb68daa02c2b923f12c86b28fad0f20eadba150e330af7ccce3c88ee178d2fa5358eee4b077e0734fadf581b7384b883b9e2d5888d82ab872876fe6aedd5f868ee7ece33b107674f68dec51b85578b7c299c8dbb0c703eaacc8ca0b0eecd12a416aedaf90204cb29970aaa3508a855847273898838d79f30a01f7be3d9154b787f4c79dc25ba828803d670d6c9118ba80838f131b81ac8d616a0b267c529bba38c05afd313f4761fd433a89b38838ff326ab83a66fa652018687ada28b52ab3d255a133bd640443b44d41f706bda609ac89807d6c43485e20aaa2d16cf62ee28fb1077d182052351e7dc8f40c1ad34f9c55ff1420f8e388f71317e89777e1ff560b60fbfeff11c4b1f0fe3506f13bc4b3c8c55a682313af7c7c45f99dd5a19b4fb81bea97767a9ca705b1c4a134522addd0ce852eaf8d2b299fa7cdbb1a37808041699016d3820759fd4514d99c3f110ce5a0a780eb0d1c746bced2d9749428f71d1db1c92a30aaf76b8f5ad3f09d3bbd4db76e448ffae9c85acd926bbcd5e9f5949c1721eb9526cf113b8f875686bf1fbfe3fd49cf7dcc576c927ef61c1092a6c78d964039c220aa8c475052584279f066c07ab289a141f6f6ab3488669f42006a2fb89a156c2ac6b8849b103cd19d9fd52b9c30fed677eddf8652f9d5b6e79e61de0c27ffa319165470f0f8604adba65c28bd2966e90f301eea1734eb0a2b8b54f734351ffd53830542db375f0031d0705f2031c50c77624226d31d9cb24c7e2d2ca0c1cc2aa3900dc9696e7ee00f589cd04d5dfa18f8c0dd216f2a9f66b3ffc02fcbdf2c4bdd2fc2e179a55b420be8c85e4d7c838d711014aacf2d8afaeec78a8fa37a4a0efe48fb2e5e8fe8a57f04a87df0e278a6fd8ecffa60c3b6fae0949c3277d634f34a87bddc74cab735017822ed14ff5c9407ae3f07da5cd6ed05a6fc931f1dc034644a33ce4ac46ec3e33c7fa34e6d54246ef97487464d238293e4de06509aff4c3ac291aa0bcf0dbed66948f2b3460418663cbe76c23c74f459825772edf7e91756a554dce2e40290477b2d74f98dd48d0483117afd43941a83ac015969fc60c8e6526aa89d9f6dda4c96339f5e2eaa4005cbfdef6b805202e28771b40c943608c0b4a4393d90c3966ec5feaa88f41a2a5b4e42df266f9d517fb06009e87da03f377689d13d8a0ddf0319eed450c4c2b532e047ab88e1874a981759c45d4c9e584f620e59b1b0695faeb79cd4f7c68de98b7a8ef4bc342173e537108305776d155e034084aba525e1c8b15311611753602cea2f8b879f0237c552e1b303e88153fe04f343d1768bf7e9fb47a4140a2adca8d0191697bf6897caf05a217c789e0f1bda78cf6b36da6f3fd19c3c5ae095e91485803415b894e7b46af550149edb2ad787683e0e18c33404096654bcbd75a57eb337c3c30f04a5471f08b3c52340052790da71cd55960e1aea6c7c0be39db2cfed0d9f20f42eafeaa6b5ec29739ac506ce4098ffa861efa2c7b31df4fb6abdf6904b07231357bb34c0a3fad288973330afcf33d786ba6907dbe92d335f66bf6f5650a1062894295a5801131970b22638483312d2d7f1b91b086679f6125915ba8198e1775e72a5cddbd43da6c3f131898933f8633b2430dc72176dd10f9055e63b34afbf4b0bd9d188e12ef08d63208fefdb9920e2d10e208db13f2f8775f26412afb2716c617acf748afb1e5e091915a3fe67a67054e79c636e5b13e52f9b9ddbd4e9831231baf3cc0414128fd3d060c25204feccfda66fd7581a5f6132e2d9068f429ae505d8db009c85727cf1d9efb271829831c2e7e1b6b257211957befe9c1810bef0d829e2e8e0bd170b3fc8756187195e2eb3051923a979222d8bf0f1b54502c564acbb61fa3aa115de12b1534b7d2dfb35a39f2662459d88a705abc6522abc876b914e0509254319a4284d01c9feee306402d0bf9de76f41b3b0c7e236279ea324ead4409ccc731e3c1b19ca6ecac6723af4d17bcc766d31b0ee4c7fcc685a68009c93f13c8c0feb713ed7cc600c6239bd1a1ef3c06d31e3b3329610c79b548ab82d79157a420e8bbdefb554726c6162dabc10225c5972c1ac478483a4a8baabd7f44a1ebce673c2710a8daede60808ea8f3fa7c56ed653b65eff0ba904de993f104b309418a5bf2d0b520e7cc5a60b916ecffc412a4b08f9d59aab9f8d9193200c99de83be82ecfcf286399775b7357995007fb8f253b9dace4445e05959cc1f31667601e83be080d58537869f3532b98a8a0c4d85ee76e8b8391749b1f402cffeafaae3f160ac0c8ac3d3c90c3f8021d79ac2861853136b756f82a1f691fd26f13ed77757a00d2dc88b78622df274705148d9c03aab17e78ea01aa1565fde9c9e629a21fc748e5c8f42efc3f003fd11269a46fea59bf5f52209e2e1d01128acde6746704e376a2a5e97ade43ea7e3c7c6148718bf44810d4c39a46fd53e3bfe57089ec0699f036c2ddc11db79d1be5c018c0bc362ab77362d6e0b8d38e1fcb9a82d5735d85edf29e967fe096397ecc750f2540ba80a9e378c32933978ecbcd2a91ac644f1db31e88a67f5ea8608f8996e865f15686fc13ff5ab64f6e60ee95895443d40f9347cb718d5516b00a9459cfa9863ec838d32f4ae0316a07ac8e38216173b1615dc16450656353f61db771ffe7cca1509647241887aac954b182e8ea376c95092e9c3c768fdc69a128c74e85643d0110eeac3e6edd8a7cdb35a49be3c07687c6a4b09f913a4d5d274351238d691c9bf7ad4feffb74ba7116fb87ab62507ead953d7353779f32681d0b41869d9ea6024e74253a636dcbb105e29d931750b1d54e0f02743bee9e0901b3d61ea4b6ec565263cbb1251f4d9d7611f51c825409fd48361638a24a9340c545b7cce5b97695e09f69a13524b7478beac426f9ee249f92b90c67d32e279baff8f196893ab408bdc1df5f561d3a13f7630c577dd10722e7ca597d1e7cf984affeff879983c0aac174deadab7247f56499ae955e82a2d7b9242bb3e46bd80dc46865a5152125965611dd6ebe0b1f6c3d0f5fb83b9dcff8998f66064c7c111224c8092c38f232ebca34cc4920caddd1ff4dfaca64fcd44b94def6b986c255e4702e513d3494854ed6be033c1322aee87c6770511e78175bb1f27e189c28a14b450f0da5150e88d032c6642aba7fc951c13ceda09a7b061b8c4f4701b31af3fe802d3992a7a4ecb57fff7d8b6e3d98a36eff9d9004de690c1dab4994a5440b8c9db5e3177626c3e456f78568694068b051d7d075a35a108b8967321f8aa002fb31fa274098426fb093dad9d12b6d7514ef83b8d7171326ba92bdf8922d173af1a11358dc604e9d3d5daf3dcc43ff25dd12bfba9a0a6f072e20bf776d442b62de2ed366239473c36d586307a4770daf7f8c80359036c18574a4192066153d59c7dcbc98f6a0a18f168f95935560f2cb8f83036d92708cd6428f01f03dc675d18ddc9397ba73eb2b9c74680e31a9c82c5d910e66829ea845e69ca82263918686a4f623e96038db2967e1f92686a036e1f60cd7e7e7ec8193820edf02eaba86d97a7a987b7314c78c270a387db5ef3d97df2424b91d632e3cb36a308f0eb5ab9abfe6c0232b09116a50b96d8b45096fc5228825514577f4d46921da5b0d079ba885bba35e6e04496c5effae91957d566118edcf9d4e915a17adbf965f05cfc97676d8c5a25d8e0369892e6e6f2da17aa4b103a62fdb207a4bd57363d7e006e74ffb22ca8c90438104e7bd9a50ac91fb62eec8f30a6001c913561654caead2aea94f687e26cecafaca4336736876834f41512ae91416d7b7c476e0d902a1d26a876b7e729af7163127a7c75dbfabb00e6b46278b28e63d26b2d4b0a02be2ad71c5f0c5f6b38ba3c43eac087a06e06eb0e2c3b455dc24fe08c3b2f747ff7302b15916ce15f420da2f7d6dc6cb1823a58858d8b86552d06fe913110600f20478452207fd8551eda1e87d03716d6ca23164840727571131a3107d1c532786176daabb1a3185ca7653f0c5173f95f5057cc0ed79b2a953f8e91a64f8ae46b054b07144e136176234e38e0f97ad3d11bd43587cd5767665a73bf71f772477f31471bcf73266e6bda601f46e92dcf8dc31207f97a1c2f3303ffa541c8e4effa9eb5c94f694d8e033a2a27179a730e035f64847c398d321454dd1f1b56cf13f15959dbe40f26473b5845564f522162e955690f8379a2b291ca5661d6f48573ecaf3d712dc9a198daecd6a00840b37c854a2f04ce15280fb86fa4d3938e2b538d01c1db878cf804d5c8cc68d2f43488a9d6075ce40dc1a2ba864adb0620c6fc708eea98716356c402fd6bb8b85978904329bdca4a2b3065407f095f7df19bb93c10e28c8098a2b10c75a1ccc885f1579ae265e5fa0b7f2297db707f772d3e63270bf8c464b68023e1c68c065417f312bfcaf9258407915ff24c563104179c83c3bd768de1863a5a9a16ec89647c8e4bfbd0c8436df7f67c83c259ad66d806d2805e3dcd90553451161447966b30c3ce0952731bdadd464662ec4fcca2f393d8fe5f5cfcece9c5e758ed3513b7ad3cb605cb700326f4498944ee60e914a6885ee0eac3dd0f36a64a7c950367b051ce2b7db5cff49f1958d23edb0867d669a6002a32741998c59d0a7ba51e5177c7f662daf536b5f19a3a8946424349af4002c5b2c6fcafd39bf5eb522cea5d558296a1f72b8fd04cd3db085365cfd6e604647a4e6d00da29568b9b9efabb4d493d783c2743fbf0b8bcde00735c562d08f7f9704ecb0e7a7666ecde64a57d67555499f0e661637e52ef3cd650e7c51d3764770233064e4c4504dfe77dcd6bde023c2e734de7d3bece54fcab6eb447f35b29ae07ad71ab73f510105324e80166fed9d16622d82b4ca42b7fca91a4a6eee6f6152fd35459886aee3ebc6ab12530c51cc665f4d395e3c944512b41cbaca60b29f5bce84ce740774d63b463a50ea7d341761622f3f1bd572b65da4d7c3b44309440c8c9327f1e5eeda85c0c690220014978a95f8fb6f05326f8b25f59c43aa747dae7bb34d11bc418e176e28c99939bd1a2ec1a1bd68029754e87b5a98ec052daf58250349dbc9aee6cb5f52906d7179a80e9c47e72cfef5166440a42cd4fdb7590063ee91f837db0c1b3c940c528223c7fa3475528f2883809a765af8083871b500a7ed0fad5e2a8b33fd3bc9f7d77b0f4ba2bf0d09877766a1f66872de8cf9ef56b842f745457700509210f8110784c8149e91256a57f7433a72e956879933d3cf9711b9d8f02244f61911daafa05da09d4f9cc79de90fb4d3109c1e3294762a08a226a607669039eeb412d5511229a74f08db09054386ecae776bd52747fd913f6"}, &(0x7f0000000000)=0x1008) (async) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001100)={r0, 0xc0, "81138c7d7cee9512a775f363491b3d4e59fca4330a495b35a51395227709bb8ba2da180d509f946c7ce8e4fddfb32c38f8100ea126644276ad39243083d6ddf9e5b6cfbfcb1db8103e112005733720283dd6f3c0ab90fe90dc41bd9aab1b39980b958c5ce2ea29934517d1d76bfc749e101db83a07f50d8a75692501326a4305fb8e7e235cd44f0cd5061dbc48360da146a9bdb106a4a2938581db2a43282ccafaee0312081a22d4772648da1dae80202c1035717965783d890771bdd015f88c"}, &(0x7f0000000040)=0xc8) (async) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r1, 0x0, 0x0) (async) 06:54:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 7) 06:54:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 15) 06:54:16 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000180)="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"]}) 06:54:16 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) [ 1219.530159] FAULT_INJECTION: forcing a failure. [ 1219.530159] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.541452] CPU: 1 PID: 26668 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1219.549334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.557934] FAULT_INJECTION: forcing a failure. [ 1219.557934] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1219.558684] Call Trace: [ 1219.573076] dump_stack+0x1b2/0x281 [ 1219.576692] should_fail.cold+0x10a/0x149 [ 1219.580826] should_failslab+0xd6/0x130 [ 1219.584788] kmem_cache_alloc+0x40/0x3c0 [ 1219.588833] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 1219.594499] idr_get_free_cmn+0x595/0x8d0 [ 1219.598630] ? trace_hardirqs_on+0x10/0x10 [ 1219.602867] idr_alloc_cmn+0xe8/0x1e0 [ 1219.606741] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 1219.611570] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1219.616569] ? __schedule+0x1450/0x1de0 [ 1219.620541] ? cpuacct_charge+0x1cf/0x350 [ 1219.624688] ? fs_reclaim_release+0xd0/0x110 [ 1219.629078] idr_alloc_cyclic+0xc2/0x1d0 [ 1219.633154] ? idr_alloc_cmn+0x1e0/0x1e0 [ 1219.637195] ? __radix_tree_preload+0x1c3/0x250 [ 1219.643898] __kernfs_new_node+0xaf/0x470 [ 1219.648029] kernfs_create_dir_ns+0x8c/0x200 [ 1219.652430] internal_create_group+0xe9/0x710 [ 1219.656912] lo_ioctl+0x1137/0x1cd0 [ 1219.660524] ? loop_set_status64+0xe0/0xe0 [ 1219.664740] blkdev_ioctl+0x540/0x1830 [ 1219.668608] ? blkpg_ioctl+0x8d0/0x8d0 [ 1219.672480] ? trace_hardirqs_on+0x10/0x10 [ 1219.676708] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1219.681799] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1219.686804] block_ioctl+0xd9/0x120 [ 1219.690425] ? blkdev_fallocate+0x3a0/0x3a0 [ 1219.694729] do_vfs_ioctl+0x75a/0xff0 [ 1219.698517] ? lock_acquire+0x170/0x3f0 [ 1219.702472] ? ioctl_preallocate+0x1a0/0x1a0 [ 1219.706864] ? __fget+0x265/0x3e0 [ 1219.710303] ? do_vfs_ioctl+0xff0/0xff0 [ 1219.714258] ? security_file_ioctl+0x83/0xb0 [ 1219.718649] SyS_ioctl+0x7f/0xb0 [ 1219.722012] ? do_vfs_ioctl+0xff0/0xff0 [ 1219.725967] do_syscall_64+0x1d5/0x640 [ 1219.729838] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1219.735112] RIP: 0033:0x7f10c0393ec7 [ 1219.738801] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1219.746495] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1219.753746] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1219.760997] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1219.768247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 06:54:17 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r2, 0x4122, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f00000000c0)={0x7, [[0x8, 0x16, 0x7, 0x83, 0x1, 0x1, 0x2, 0x5], [0x80000000, 0x800, 0x0, 0x3, 0x8, 0x9, 0x3, 0x6], [0x1, 0x7f, 0x7fffffff, 0x9, 0x2, 0x6, 0x5, 0x1f]], '\x00', [{0x10000, 0x7, 0x0, 0x1}, {0x400, 0x1, 0x0, 0x1}, {0x54e, 0x296a827e, 0x0, 0x0, 0x0, 0x1}, {0x35, 0x9, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x80000001, 0x0, 0x1}, {0xffff, 0x40}, {0xc0, 0x8000}], '\x00', 0x6}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000400)) 06:54:17 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000180)="5a3d836e225e3fe467ec3c6cf616f4cf19c58caf6fd779c3b7417a5fc772ab009042d4c9f4f4b1fcda16725065c83cfc1325cb4a692c630cc25a324f6fba1b09688367c674e7417271e15ecf6dd10f83dae7de1f513e80f4e9650af8e6d7731974d9e8850604183c4d2c0b1ba24061d736eef6f06852efd648d8bb5d81e60af8717b1568c26f11391506049471e6a43e7ff9264c6f49e87265ada007788b2e11b4c0bdb7b9350fb46b572272c370c02637085f39df72cc5d8e7a9a3a6abdb58494c84faaded556f24bdc1899cf82e3307cd5d54c7c63a07c9abf016042b2b73e1d1b9aba00ada020df5fd7865dd2e5b7203f2977336693b83ff2dd525fbb6d7e0b92b0f34829fe3efc53d18783763f70629829c9d4d0aef1319e7ca354b668f2ace75a394c0a563c5c921631122b2778915f2a8abf9a0762f44c956ecff2954fe376ef13a6469dabfe21560b3639b45ae0fbe6a40a9df89009445041b018c4094a60411d56b59a1af5130708a4ba2a50afe0fc59ab12ec2caa9354c6e057fa694af4a56f1fb391353dafc3685dd054f7e59bda7a14969bb6481cb3ac35026aacddafed7ccf5fc9a440e90a0c9b2e13644fcaeca7763d5fdf5ed506f1614bafed4684ae11b5c1faa035f2bedccef4384912d21deea4eab5ee5cc02a0475d9493db2b5c81cbf6c15ad9e17635900e26c3da91a9d285ef008c58c9ae3ed8d78988bd1f502a2f9848a699953af59861e941709fab2cf9a5c6a266cb21a31b5e28745810349685fc8896ce9bca44cbbd72212c0a61e79ea53096f579cbf7c892a51a22e6c07c656e9eb8eab8db649f1bba050fc366e5110c8ba148b503aaa858a6f0e97636a09034a825f7d46b14757a5e8decfd710b1f4cf78515c6f72ce7b4fbbbb9383aaf04d5d0fc7421ce4b98f1c530e8f153e0e9b83c0548f6ffe322278d9bd7b4d624e6155090d97a7ec217d45854593bccf3fbb5053b2094ae2f1e30f47873d3850f3ac8f7aad0c6af0a831c322e6db3c741764a4974379f04f40c3d8edaac4283bdf5eb623cbf560549ceb1917c936d9023765a8de7b5a3e1edce52ef420fd66d2565d6ea5741dae0ca65d4d9ed093302fe115c6e118e3338e1a173ba328e059a490a5f04eb503854beab39813031a564fc6cbff44242bea1de7ff7315402e5a611e268a74e9ce2f231d4e6ee271e258e43a2ce9a22a8088e016045f3aace3ac29b77b0e07b7675dd8bd21c5fbd2a6c02d3ed9b13cb4fefae906fec09795c529105dbb4b0cd5e373a185faa2c84c1abe0e6a8a55bf0313d88bb4ac246c37857e28e555392ebf76e67b356bd6d3bab862f26dec59e61351e8e99d3a424fcfa5d5da25f5556b49c5105386ac0d60f6683991fb0698bb24416030d0ff2c2c6dda80ac94cbf5dad5f23c58ad1018d0d3459ea24f76f96c6ce8a90d8a9f55c6f5782456d2962f4c1e64654bba0af89244ebea0e4994bd4d044923a06ef10d3be4544242e4a31067170ba2105c0e4f84b5fbfd47497a5bdeab762e89c1c3fdd5c6b9e2730f32e1ace33b8f431dca6bb0bf5bcc83c00f2f500084b21cb095e7f9b367e4fbdebeb7523b7e30e26634997643a6957cc313e535736a828e8ea0a80a7cd6f0288d07621e2570a247a4dd21d3573be3a3fbb0c5ba6372a3ef2aaf4b44f6b92184645476e46b91c9217c6f4c74686ef3d038ae104eba0fb19000bfdbe46a1e226bf5b76eb964590330414322201ea6b686cff56da6c7b838dfced667c9f47a132adf59155ffe41251abfed533abc82198f48188b4a6944f16f7a25ead54c20a8ed03a57f060414d5ca8ad0249a59b248641122eae1566946572ec95280d07c3bddbad80e6b596e39cbd13114f31621c95aa6883a54e0075be2d435fbfa49dd36dda5ff9e26d30bcbcb74dadbc60c9fbb1ad9b8115c07225a6b284cbe8bae252d23e02eb5a36daf91587afe33b78de396c510a4a0d0366f0c4af9a2d7c1579d4b2521b3629b39f9b66d4227b4ac25d326b6f48d4c87490f8d8a4717f36101b29d02ca8624af899395c03e9991bc264e9d5cb14ef6a064f471e026dbaaf8571597aa4b47b5c8b617e86eb1c5bbad8b2a4b6144a7f323b75f42092e01dbb8e648b713421b01428a3b5abdd9709eb3e3b2887db434191973d6ccd9c6e3598abf3aabfee582474ac050bf26da51f9a48dae1315d95d8c9258edfd7205cc20f4402f8d6d59668d33a666bccd033c2a49e90a0e37e4539433acba9e0acbfe5e81cd97cd5d259c6210461c6008f3ec06ce40e88085539e6c0a0f7c18556acaa0d03f30f68db0080530c16d6d147621df0277983377b79e7cb9ec904fff4a8739180ccf257a68210bb8dbd880695949278dbc54e494a07c920d116882773040fc7a65074636e9d53a2fc2d852ab54b2c8b2bcce355d12f9d624333bb04555259345230a497b1b69a1321e95d7d814bf52ee9fec925bbe317d293239a6760f59d037847b53d968a6c518945aa7e7e64fd432f4caecb2c407d665b52d2b856d24b4956d0537edd12b1884aa3df749491357c2f9b30be4acf5d0015a71e0c0e6b63563c2b01908cd4816f0eb5b1d3fb628ed3e9af7b55c63c70d55ecde468aa36b051ec4fc34ed90fab29275d2d55ef71e381a04e7261676b0e6cc55378cdb2edec153efe8d5832ad2a5701fe447a3268f65fa83879508af9be95b9907c49cdec9a1af7fb276ed50c609d628265c20305f7a5039d529cc03a375ecbf36bb549e5543706bf23289933ea36619dc33f7510c06091a212120eefa3242521d437bf8133e76d7eaf1168bc89c44d4c4942a4389dd2028b9d05a20bc39d7a12be0d17aec80a98bea12b30f21ccb722e8a6e99dc306f50baa324866b42d0f2721e5eeffdab1d6e591cdb739e8b65ff94aed691effe1dbe40a62e83bc8cb7d791c1d1d24f30bafd8905e572c62bd871942e09286a164c18e0e115db0c06cce502d644c4091e0d387520bf778650a9790469c1ffb421fe9d04d7ae921a913266842ac9c4151a9f855b0e50b98bdfba71d145e662c27834f0102feafe1b764fd5e1d574d704683a62910f5ee6f3dce90c256d5c8d809128bba8de95b41e4fab590c630271e8fe048e707334f6866b3bc08203eaf41a5248359eb7885280049b2e332329dc2f2dd453a10afd228f42af3afc032ba9dd716b60f0b61a9b4078189d523c3dfb17da2e9f04e34387c2b7415b021943a1ba2793dfe6f7eb230a12fde1fa55fd7299a3e6cfd52e01c1ea1e4f0e87acd3aa1c78c6da41beedfb10f0dea9ba98f438fb14404e62e867e52ddfaea1350f432dc77e2ab9c6aec1d88a98bf0c0c0b9f0ec57d8e83de2e87a0476d90029f7154b9c14c4d49d7405cfff4ecabfc4bbcb0944b0d78cee073a4c14392ebe63608bf5af9914a2ab6195920169bf5519fdd5441c628a46ff1b0bcbf8f8a84f597c5c0d755d851d9ddf6d58b57c92ba6f08e17833de27d787ee7a7a55f3776f876624284657aae52f0d1ea9ff4f3208f494fb6d8e02f8146c2e6fa357cd7168972bd5582d27ed60cdcf185f6d1250c4fb745c11833e86966885f9b270bdddaaaf3143f43e2ccddbbf1a1a37dcf217344c6c7633905e12e53030f912f1d30849bb529db1e330a4588d1f72cf1650e3370d2cf6c54de03e645795317aa74e54e1ae2fd3d3cc6cd26dbeb688a63a8bb49c15f4216f1e5d206d95ae1dfb3e5561aed867a957b4f24de4936f2a4f2f328601220ee514254deba9666a2b3eb7b6adc309b125ea09258bbb9751f07615e0b6a7da817db0e9bb49ec3309b8c1f4bff0d898f98f5ce5812419551179bc8c64c6f87dbdc89c9f55310d70a8d7e5bdbf1322010b28dcba52c7f72402d89c23691ae0b13302667aef4fff961419b667faf6501d52fb28941152fa166ade505abbcacf85ee78469fb0ce1770c2be879c3ca2121bd03c351a96ca412352e13a976a736e70e05962841f74b5e3f269839d8fae20548b1cb7d8b4e26bd0a8b521123a86eb7bedf05fa4c076de693df29ac4414493f740e6939c64964d70b93fe58229d72904720e85506e55c3bbf2ee05d2afa165bea92e3c11989a1fdc13614e9d6e338053383ed3f2f25e4a36738c48f014236e7cef4886dcb2bb8fc5554add4ec5a0496c98f4b49b4d2971e91dcf42530fcac9f7cfb35a27cb66e5561f26406b7fafb19952ea7bb3be6961fb3d8c7e326564efef920965b1632acf817577d733887ed8ddcc156c8c92deb6ff5f4eedd551277e403d29b2ff8e92fa602ba71b1f26500f4df396188b1e5852162236d648020b244be2fceda424ce6bf7de1b73042ef7121bfc497013416d512f9ecc362e0edafbd595089fba2e04a4c3019c69d2d098a3b550f8aabad1c84f9a3f4c0dee83a21d1651461d87922044ad819c60ad14063f07535169d223fafed3696bafa360d3875b48674cb11e4a14ddd62acbf7e9e3edd235ddbe9b247dcb4fd5265221a5b7efd2f1ea2104964bec6aa843a299d34b319a72b596661a171225f6cff22ba2a64f78406cc1206ebae82772c40ace08ace0bd193ed2b74839fb94741a6596cc2d871842a99f6e00a2fcd1258cbbb1b86686fed5a62eb39c0d903aadb32f8de14c888a02b71e91184d7607efd663cd8cf902ffbeed136e497ac50419ed9bda10ffe809dd4f7b99af38ad638fdec23b0ffa88e1147e9b43d5313e14cfc3d9331850f81d43d903c2db399253083aef9f48ee8c2fd8fc828f092e9bb9dcb80464c820b6f5b1788cbc0dcbdfba7990a6c9b953280c8e97e5cd55a991066b09399c4f26211044896b009c651d50b4a4021a16cf4467b4abeb6b26d32e074759c85ba60a3878eeedb5737e8f4e7405f7388da89032dcc3518ee27b74b4295c4307e4dd664271800552fafd6887cc65dc521c02cbabc287c6bd30763176db167796b96f6d6b8aec56506b5267160ff6c2b8d3ca4c81c056169c91cc4bd8705d6e7dd0d427e276465c82e16e2cd2e6858a01f42e2bb9217fb7526cbb893793d73129739856f0d1b31814dfd42ed1e52b5a581a89c1983af4590239031033ebf00e11289fffea1bea7a30ff6ea5b2b38ca6f761b2f02ec533b06695a19138f1a2f51041c6c62ec9598afc1122048fc660f8d82ab4d86eaa8cc904ab155fe201f04fd8a8d4dd9e0a087c3b0a9bc1a07022df0d679361421e59b49cac6dee95bc1cebd211f512a4da7054651a70ca972fa4b02b99f349bf887099a7873ccd2a8dc012e6bc2fc5a78423e0d82003bf2236c6bcf01cea1d6e96c2ead876f4fb3bf1371480b3f08a26f429d478dc7a8a0e4d05e16f809d5d3fa067abf274e91eb7eb3548e45d8bb91f72aa781a32ddb9b581b40007511b05c1552bdcc39df88152c9b578b5a39b7da3f98d40d7c127a4b1a958e100322078140a1085d05d18d0c3460090f0254811dadbe493c703dc00e15978acbfca8f26fdc0c2192dcd0cffdf6066bb34d9ae3a7b317c52417ee3179927c706c29c3ac9c6ecb66cf9458be708a8b3fbd2e82a9de14bf90763b3e3c2c372e0b38be8a35dbfb389a4bf113bdad66f34fb1326b88c7f86f75c7677e500429df60c8a1bff81417dd6f2e46f480b8373e8a814f4baaa3e7101fd55b4531b88a31d66db9f0f58d1361c09ae2eca95c58e3f005940420c2db2202dea74db124cf0953a2f978235f1db9f15409eafa99256a6ce3c158ad5d62e8d1d1e70043792bde36ed58ceebe96e2c3395b95a791e311c5bce4e5b85e76415b7ed7c005804db7a60894b86e473f2bbf4a714df29e7fc8"]}) 06:54:17 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) [ 1219.775499] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1219.782764] CPU: 0 PID: 26673 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1219.790647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.792294] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1219.800017] Call Trace: [ 1219.800035] dump_stack+0x1b2/0x281 [ 1219.800050] should_fail.cold+0x10a/0x149 [ 1219.800064] __alloc_pages_nodemask+0x22c/0x2720 [ 1219.800076] ? static_obj+0x50/0x50 [ 1219.825997] ? trace_hardirqs_on+0x10/0x10 06:54:17 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x9, 0x8, 0x0, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:17 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x0, 0x8, 0x0, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1219.830231] ? __lock_acquire+0x5fc/0x3f20 [ 1219.834480] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1219.839323] ? __lock_acquire+0x5fc/0x3f20 [ 1219.843555] ? simple_xattr_get+0xe5/0x160 [ 1219.847794] ? fsnotify+0x974/0x11b0 [ 1219.851505] ? shmem_setattr+0x241/0xbf0 [ 1219.855570] ? __fsnotify_inode_delete+0x20/0x20 [ 1219.860324] cache_grow_begin+0x91/0x700 [ 1219.864385] ? fs_reclaim_release+0xd0/0x110 [ 1219.868791] ? check_preemption_disabled+0x35/0x240 [ 1219.873813] cache_alloc_refill+0x273/0x350 06:54:17 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f00000011c0)={0x0, &(0x7f0000001180)=[&(0x7f0000000180)="5a3d836e225e3fe467ec3c6cf616f4cf19c58caf6fd779c3b7417a5fc772ab009042d4c9f4f4b1fcda16725065c83cfc1325cb4a692c630cc25a324f6fba1b09688367c674e7417271e15ecf6dd10f83dae7de1f513e80f4e9650af8e6d7731974d9e8850604183c4d2c0b1ba24061d736eef6f06852efd648d8bb5d81e60af8717b1568c26f11391506049471e6a43e7ff9264c6f49e87265ada007788b2e11b4c0bdb7b9350fb46b572272c370c02637085f39df72cc5d8e7a9a3a6abdb58494c84faaded556f24bdc1899cf82e3307cd5d54c7c63a07c9abf016042b2b73e1d1b9aba00ada020df5fd7865dd2e5b7203f2977336693b83ff2dd525fbb6d7e0b92b0f34829fe3efc53d18783763f70629829c9d4d0aef1319e7ca354b668f2ace75a394c0a563c5c921631122b2778915f2a8abf9a0762f44c956ecff2954fe376ef13a6469dabfe21560b3639b45ae0fbe6a40a9df89009445041b018c4094a60411d56b59a1af5130708a4ba2a50afe0fc59ab12ec2caa9354c6e057fa694af4a56f1fb391353dafc3685dd054f7e59bda7a14969bb6481cb3ac35026aacddafed7ccf5fc9a440e90a0c9b2e13644fcaeca7763d5fdf5ed506f1614bafed4684ae11b5c1faa035f2bedccef4384912d21deea4eab5ee5cc02a0475d9493db2b5c81cbf6c15ad9e17635900e26c3da91a9d285ef008c58c9ae3ed8d78988bd1f502a2f9848a699953af59861e941709fab2cf9a5c6a266cb21a31b5e28745810349685fc8896ce9bca44cbbd72212c0a61e79ea53096f579cbf7c892a51a22e6c07c656e9eb8eab8db649f1bba050fc366e5110c8ba148b503aaa858a6f0e97636a09034a825f7d46b14757a5e8decfd710b1f4cf78515c6f72ce7b4fbbbb9383aaf04d5d0fc7421ce4b98f1c530e8f153e0e9b83c0548f6ffe322278d9bd7b4d624e6155090d97a7ec217d45854593bccf3fbb5053b2094ae2f1e30f47873d3850f3ac8f7aad0c6af0a831c322e6db3c741764a4974379f04f40c3d8edaac4283bdf5eb623cbf560549ceb1917c936d9023765a8de7b5a3e1edce52ef420fd66d2565d6ea5741dae0ca65d4d9ed093302fe115c6e118e3338e1a173ba328e059a490a5f04eb503854beab39813031a564fc6cbff44242bea1de7ff7315402e5a611e268a74e9ce2f231d4e6ee271e258e43a2ce9a22a8088e016045f3aace3ac29b77b0e07b7675dd8bd21c5fbd2a6c02d3ed9b13cb4fefae906fec09795c529105dbb4b0cd5e373a185faa2c84c1abe0e6a8a55bf0313d88bb4ac246c37857e28e555392ebf76e67b356bd6d3bab862f26dec59e61351e8e99d3a424fcfa5d5da25f5556b49c5105386ac0d60f6683991fb0698bb24416030d0ff2c2c6dda80ac94cbf5dad5f23c58ad1018d0d3459ea24f76f96c6ce8a90d8a9f55c6f5782456d2962f4c1e64654bba0af89244ebea0e4994bd4d044923a06ef10d3be4544242e4a31067170ba2105c0e4f84b5fbfd47497a5bdeab762e89c1c3fdd5c6b9e2730f32e1ace33b8f431dca6bb0bf5bcc83c00f2f500084b21cb095e7f9b367e4fbdebeb7523b7e30e26634997643a6957cc313e535736a828e8ea0a80a7cd6f0288d07621e2570a247a4dd21d3573be3a3fbb0c5ba6372a3ef2aaf4b44f6b92184645476e46b91c9217c6f4c74686ef3d038ae104eba0fb19000bfdbe46a1e226bf5b76eb964590330414322201ea6b686cff56da6c7b838dfced667c9f47a132adf59155ffe41251abfed533abc82198f48188b4a6944f16f7a25ead54c20a8ed03a57f060414d5ca8ad0249a59b248641122eae1566946572ec95280d07c3bddbad80e6b596e39cbd13114f31621c95aa6883a54e0075be2d435fbfa49dd36dda5ff9e26d30bcbcb74dadbc60c9fbb1ad9b8115c07225a6b284cbe8bae252d23e02eb5a36daf91587afe33b78de396c510a4a0d0366f0c4af9a2d7c1579d4b2521b3629b39f9b66d4227b4ac25d326b6f48d4c87490f8d8a4717f36101b29d02ca8624af899395c03e9991bc264e9d5cb14ef6a064f471e026dbaaf8571597aa4b47b5c8b617e86eb1c5bbad8b2a4b6144a7f323b75f42092e01dbb8e648b713421b01428a3b5abdd9709eb3e3b2887db434191973d6ccd9c6e3598abf3aabfee582474ac050bf26da51f9a48dae1315d95d8c9258edfd7205cc20f4402f8d6d59668d33a666bccd033c2a49e90a0e37e4539433acba9e0acbfe5e81cd97cd5d259c6210461c6008f3ec06ce40e88085539e6c0a0f7c18556acaa0d03f30f68db0080530c16d6d147621df0277983377b79e7cb9ec904fff4a8739180ccf257a68210bb8dbd880695949278dbc54e494a07c920d116882773040fc7a65074636e9d53a2fc2d852ab54b2c8b2bcce355d12f9d624333bb04555259345230a497b1b69a1321e95d7d814bf52ee9fec925bbe317d293239a6760f59d037847b53d968a6c518945aa7e7e64fd432f4caecb2c407d665b52d2b856d24b4956d0537edd12b1884aa3df749491357c2f9b30be4acf5d0015a71e0c0e6b63563c2b01908cd4816f0eb5b1d3fb628ed3e9af7b55c63c70d55ecde468aa36b051ec4fc34ed90fab29275d2d55ef71e381a04e7261676b0e6cc55378cdb2edec153efe8d5832ad2a5701fe447a3268f65fa83879508af9be95b9907c49cdec9a1af7fb276ed50c609d628265c20305f7a5039d529cc03a375ecbf36bb549e5543706bf23289933ea36619dc33f7510c06091a212120eefa3242521d437bf8133e76d7eaf1168bc89c44d4c4942a4389dd2028b9d05a20bc39d7a12be0d17aec80a98bea12b30f21ccb722e8a6e99dc306f50baa324866b42d0f2721e5eeffdab1d6e591cdb739e8b65ff94aed691effe1dbe40a62e83bc8cb7d791c1d1d24f30bafd8905e572c62bd871942e09286a164c18e0e115db0c06cce502d644c4091e0d387520bf778650a9790469c1ffb421fe9d04d7ae921a913266842ac9c4151a9f855b0e50b98bdfba71d145e662c27834f0102feafe1b764fd5e1d574d704683a62910f5ee6f3dce90c256d5c8d809128bba8de95b41e4fab590c630271e8fe048e707334f6866b3bc08203eaf41a5248359eb7885280049b2e332329dc2f2dd453a10afd228f42af3afc032ba9dd716b60f0b61a9b4078189d523c3dfb17da2e9f04e34387c2b7415b021943a1ba2793dfe6f7eb230a12fde1fa55fd7299a3e6cfd52e01c1ea1e4f0e87acd3aa1c78c6da41beedfb10f0dea9ba98f438fb14404e62e867e52ddfaea1350f432dc77e2ab9c6aec1d88a98bf0c0c0b9f0ec57d8e83de2e87a0476d90029f7154b9c14c4d49d7405cfff4ecabfc4bbcb0944b0d78cee073a4c14392ebe63608bf5af9914a2ab6195920169bf5519fdd5441c628a46ff1b0bcbf8f8a84f597c5c0d755d851d9ddf6d58b57c92ba6f08e17833de27d787ee7a7a55f3776f876624284657aae52f0d1ea9ff4f3208f494fb6d8e02f8146c2e6fa357cd7168972bd5582d27ed60cdcf185f6d1250c4fb745c11833e86966885f9b270bdddaaaf3143f43e2ccddbbf1a1a37dcf217344c6c7633905e12e53030f912f1d30849bb529db1e330a4588d1f72cf1650e3370d2cf6c54de03e645795317aa74e54e1ae2fd3d3cc6cd26dbeb688a63a8bb49c15f4216f1e5d206d95ae1dfb3e5561aed867a957b4f24de4936f2a4f2f328601220ee514254deba9666a2b3eb7b6adc309b125ea09258bbb9751f07615e0b6a7da817db0e9bb49ec3309b8c1f4bff0d898f98f5ce5812419551179bc8c64c6f87dbdc89c9f55310d70a8d7e5bdbf1322010b28dcba52c7f72402d89c23691ae0b13302667aef4fff961419b667faf6501d52fb28941152fa166ade505abbcacf85ee78469fb0ce1770c2be879c3ca2121bd03c351a96ca412352e13a976a736e70e05962841f74b5e3f269839d8fae20548b1cb7d8b4e26bd0a8b521123a86eb7bedf05fa4c076de693df29ac4414493f740e6939c64964d70b93fe58229d72904720e85506e55c3bbf2ee05d2afa165bea92e3c11989a1fdc13614e9d6e338053383ed3f2f25e4a36738c48f014236e7cef4886dcb2bb8fc5554add4ec5a0496c98f4b49b4d2971e91dcf42530fcac9f7cfb35a27cb66e5561f26406b7fafb19952ea7bb3be6961fb3d8c7e326564efef920965b1632acf817577d733887ed8ddcc156c8c92deb6ff5f4eedd551277e403d29b2ff8e92fa602ba71b1f26500f4df396188b1e5852162236d648020b244be2fceda424ce6bf7de1b73042ef7121bfc497013416d512f9ecc362e0edafbd595089fba2e04a4c3019c69d2d098a3b550f8aabad1c84f9a3f4c0dee83a21d1651461d87922044ad819c60ad14063f07535169d223fafed3696bafa360d3875b48674cb11e4a14ddd62acbf7e9e3edd235ddbe9b247dcb4fd5265221a5b7efd2f1ea2104964bec6aa843a299d34b319a72b596661a171225f6cff22ba2a64f78406cc1206ebae82772c40ace08ace0bd193ed2b74839fb94741a6596cc2d871842a99f6e00a2fcd1258cbbb1b86686fed5a62eb39c0d903aadb32f8de14c888a02b71e91184d7607efd663cd8cf902ffbeed136e497ac50419ed9bda10ffe809dd4f7b99af38ad638fdec23b0ffa88e1147e9b43d5313e14cfc3d9331850f81d43d903c2db399253083aef9f48ee8c2fd8fc828f092e9bb9dcb80464c820b6f5b1788cbc0dcbdfba7990a6c9b953280c8e97e5cd55a991066b09399c4f26211044896b009c651d50b4a4021a16cf4467b4abeb6b26d32e074759c85ba60a3878eeedb5737e8f4e7405f7388da89032dcc3518ee27b74b4295c4307e4dd664271800552fafd6887cc65dc521c02cbabc287c6bd30763176db167796b96f6d6b8aec56506b5267160ff6c2b8d3ca4c81c056169c91cc4bd8705d6e7dd0d427e276465c82e16e2cd2e6858a01f42e2bb9217fb7526cbb893793d73129739856f0d1b31814dfd42ed1e52b5a581a89c1983af4590239031033ebf00e11289fffea1bea7a30ff6ea5b2b38ca6f761b2f02ec533b06695a19138f1a2f51041c6c62ec9598afc1122048fc660f8d82ab4d86eaa8cc904ab155fe201f04fd8a8d4dd9e0a087c3b0a9bc1a07022df0d679361421e59b49cac6dee95bc1cebd211f512a4da7054651a70ca972fa4b02b99f349bf887099a7873ccd2a8dc012e6bc2fc5a78423e0d82003bf2236c6bcf01cea1d6e96c2ead876f4fb3bf1371480b3f08a26f429d478dc7a8a0e4d05e16f809d5d3fa067abf274e91eb7eb3548e45d8bb91f72aa781a32ddb9b581b40007511b05c1552bdcc39df88152c9b578b5a39b7da3f98d40d7c127a4b1a958e100322078140a1085d05d18d0c3460090f0254811dadbe493c703dc00e15978acbfca8f26fdc0c2192dcd0cffdf6066bb34d9ae3a7b317c52417ee3179927c706c29c3ac9c6ecb66cf9458be708a8b3fbd2e82a9de14bf90763b3e3c2c372e0b38be8a35dbfb389a4bf113bdad66f34fb1326b88c7f86f75c7677e500429df60c8a1bff81417dd6f2e46f480b8373e8a814f4baaa3e7101fd55b4531b88a31d66db9f0f58d1361c09ae2eca95c58e3f005940420c2db2202dea74db124cf0953a2f978235f1db9f15409eafa99256a6ce3c158ad5d62e8d1d1e70043792bde36ed58ceebe96e2c3395b95a791e311c5bce4e5b85e76415b7ed7c005804db7a60894b86e473f2bbf4a714df29e7fc8"]}) 06:54:17 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:17 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) [ 1219.878152] kmem_cache_alloc+0x333/0x3c0 [ 1219.882306] getname_flags+0xc8/0x550 [ 1219.886107] do_sys_open+0x1ce/0x410 [ 1219.889817] ? filp_open+0x60/0x60 [ 1219.893366] ? do_syscall_64+0x4c/0x640 [ 1219.897339] ? SyS_open+0x30/0x30 [ 1219.900797] do_syscall_64+0x1d5/0x640 [ 1219.904696] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1219.909883] RIP: 0033:0x7fe33b640024 [ 1219.913603] RSP: 002b:00007fe33a001eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1219.921307] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b640024 [ 1219.928573] RDX: 0000000000000002 RSI: 00007fe33a001fe0 RDI: 00000000ffffff9c [ 1219.935839] RBP: 00007fe33a001fe0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1219.943104] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1219.950376] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1220.004886] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 8) 06:54:17 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:17 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) 06:54:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:17 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) (async) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r2, 0x4122, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f00000000c0)={0x7, [[0x8, 0x16, 0x7, 0x83, 0x1, 0x1, 0x2, 0x5], [0x80000000, 0x800, 0x0, 0x3, 0x8, 0x9, 0x3, 0x6], [0x1, 0x7f, 0x7fffffff, 0x9, 0x2, 0x6, 0x5, 0x1f]], '\x00', [{0x10000, 0x7, 0x0, 0x1}, {0x400, 0x1, 0x0, 0x1}, {0x54e, 0x296a827e, 0x0, 0x0, 0x0, 0x1}, {0x35, 0x9, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x80000001, 0x0, 0x1}, {0xffff, 0x40}, {0xc0, 0x8000}], '\x00', 0x6}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000400)) 06:54:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 16) [ 1220.103907] FAULT_INJECTION: forcing a failure. [ 1220.103907] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.117037] FAULT_INJECTION: forcing a failure. [ 1220.117037] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.130525] CPU: 1 PID: 26716 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1220.138421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.147946] Call Trace: [ 1220.150538] dump_stack+0x1b2/0x281 [ 1220.154161] should_fail.cold+0x10a/0x149 [ 1220.158312] should_failslab+0xd6/0x130 [ 1220.162284] kmem_cache_alloc+0x28e/0x3c0 [ 1220.166435] __kernfs_new_node+0x6f/0x470 [ 1220.170583] kernfs_new_node+0x7b/0xe0 [ 1220.174469] __kernfs_create_file+0x3d/0x320 [ 1220.178874] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1220.183536] ? kernfs_create_dir_ns+0x171/0x200 [ 1220.188191] internal_create_group+0x22b/0x710 [ 1220.192763] lo_ioctl+0x1137/0x1cd0 [ 1220.196373] ? loop_set_status64+0xe0/0xe0 [ 1220.200592] blkdev_ioctl+0x540/0x1830 [ 1220.204464] ? blkpg_ioctl+0x8d0/0x8d0 [ 1220.208342] ? trace_hardirqs_on+0x10/0x10 [ 1220.212565] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1220.217650] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1220.222664] block_ioctl+0xd9/0x120 [ 1220.226285] ? blkdev_fallocate+0x3a0/0x3a0 [ 1220.230592] do_vfs_ioctl+0x75a/0xff0 [ 1220.234381] ? lock_acquire+0x170/0x3f0 [ 1220.238339] ? ioctl_preallocate+0x1a0/0x1a0 [ 1220.242738] ? __fget+0x265/0x3e0 [ 1220.246188] ? do_vfs_ioctl+0xff0/0xff0 [ 1220.250147] ? security_file_ioctl+0x83/0xb0 [ 1220.254542] SyS_ioctl+0x7f/0xb0 [ 1220.257887] ? do_vfs_ioctl+0xff0/0xff0 [ 1220.261850] do_syscall_64+0x1d5/0x640 [ 1220.265800] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1220.270973] RIP: 0033:0x7f10c0393ec7 [ 1220.274662] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1220.282354] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1220.289614] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1220.296872] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 06:54:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:17 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:17 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 06:54:17 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r2, 0x4122, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f00000000c0)={0x7, [[0x8, 0x16, 0x7, 0x83, 0x1, 0x1, 0x2, 0x5], [0x80000000, 0x800, 0x0, 0x3, 0x8, 0x9, 0x3, 0x6], [0x1, 0x7f, 0x7fffffff, 0x9, 0x2, 0x6, 0x5, 0x1f]], '\x00', [{0x10000, 0x7, 0x0, 0x1}, {0x400, 0x1, 0x0, 0x1}, {0x54e, 0x296a827e, 0x0, 0x0, 0x0, 0x1}, {0x35, 0x9, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x80000001, 0x0, 0x1}, {0xffff, 0x40}, {0xc0, 0x8000}], '\x00', 0x6}) (async, rerun: 32) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000400)) (rerun: 32) [ 1220.304137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1220.311390] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1220.318656] CPU: 0 PID: 26717 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1220.326539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.335884] Call Trace: [ 1220.338472] dump_stack+0x1b2/0x281 [ 1220.342107] should_fail.cold+0x10a/0x149 [ 1220.346264] should_failslab+0xd6/0x130 06:54:17 executing program 1: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) [ 1220.348314] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1220.350235] kmem_cache_alloc+0x28e/0x3c0 [ 1220.350250] get_empty_filp+0x86/0x3f0 [ 1220.350261] path_openat+0x84/0x2970 [ 1220.350275] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1220.350289] ? path_lookupat+0x780/0x780 [ 1220.378173] ? trace_hardirqs_on+0x10/0x10 [ 1220.382415] ? fsnotify+0x974/0x11b0 [ 1220.386133] ? shmem_setattr+0x241/0xbf0 [ 1220.390199] do_filp_open+0x179/0x3c0 [ 1220.394007] ? may_open_dev+0xe0/0xe0 [ 1220.397807] ? __alloc_fd+0x1be/0x490 06:54:17 executing program 1: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) [ 1220.401616] ? lock_downgrade+0x740/0x740 [ 1220.405855] ? do_raw_spin_unlock+0x164/0x220 [ 1220.410365] ? _raw_spin_unlock+0x29/0x40 [ 1220.414511] ? __alloc_fd+0x1be/0x490 [ 1220.418316] do_sys_open+0x296/0x410 [ 1220.422032] ? filp_open+0x60/0x60 [ 1220.425587] ? do_syscall_64+0x4c/0x640 [ 1220.429551] ? SyS_open+0x30/0x30 [ 1220.432991] do_syscall_64+0x1d5/0x640 [ 1220.436866] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1220.442043] RIP: 0033:0x7fe33b640024 [ 1220.445730] RSP: 002b:00007fe33a001eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1220.453428] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b640024 [ 1220.460687] RDX: 0000000000000002 RSI: 00007fe33a001fe0 RDI: 00000000ffffff9c [ 1220.467935] RBP: 00007fe33a001fe0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1220.475277] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1220.482540] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 9) 06:54:17 executing program 1: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) 06:54:17 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:17 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000001200)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 17) 06:54:18 executing program 2: r0 = syz_mount_image$xfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="399c569efdc3167ee073f2f38802e8fde5bdc22c6b2cb2c16055538a9db48b17e601dbf3d3be27092873e13748701f4161cd5fb0611a286dcd", 0x39, 0xee}, {&(0x7f0000000100)="3f1d30450b", 0x5, 0x4}, {&(0x7f0000000140)="e727b85ae54c44f238b11e6e0cbf071fbf47e50a2bf09570231b4cf9fabf1068a0097c448fe1e5b1e7024ed5bd2f3ec0bc46e0a91164cfcee9943f68e5b254fb36469b92263fbe497a3e61af07d404dab024d1042b1c00bfaeb554846cc92a7de93be2b819923168f7518f0b215d77e5794f47bcc7ebfa6b475306032c5402a2718c1973afa5969f5fcf39b18f872e4a413f58806d26f9c1712fd4ee6ec88f7a480a2d", 0xa3, 0x1ff}], 0x80400, &(0x7f0000000280)={[{@barrier}, {@sysvgroups}, {@nouuid}, {@swalloc}, {@nolazytime}, {@noquota}], [{@hash}, {@fsname={'fsname', 0x3d, ')'}}, {@fsmagic={'fsmagic', 0x3d, 0xd074}}, {@pcr={'pcr', 0x3d, 0x27}}, {@audit}, {@permit_directio}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x30, 0x39, 0x33, 0x36, 0x66, 0x38, 0x64], 0x2d, [0x24, 0x51, 0x30, 0x66], 0x2d, [0x61, 0x39, 0x6b, 0x61], 0x2d, [0x35, 0x30, 0x62, 0x65], 0x2d, [0x36, 0x35, 0x33, 0x32, 0x39, 0x4, 0x36, 0x61]}}}]}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000340)={@desc={0x1, 0x0, @desc2}}) syz_mount_image$btrfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0/file0\x00', 0x1ff, 0x0, &(0x7f00000018c0), 0x1892010, &(0x7f00000019c0)={[{@ssd}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x494e}}, {@nodiscard}, {@skip_balance}, {@skip_balance}, {@subvolid={'subvolid', 0x3d, 0x3}}, {@skip_balance}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'}*-'}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise_type}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r1, 0x0, 0x0) 06:54:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:18 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0xfffffffb, 0x2, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1220.608991] FAULT_INJECTION: forcing a failure. [ 1220.608991] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.621152] FAULT_INJECTION: forcing a failure. [ 1220.621152] name failslab, interval 1, probability 0, space 0, times 0 06:54:18 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:18 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0x0, 0x2, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:18 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1220.652882] CPU: 0 PID: 26761 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1220.660784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.670135] Call Trace: [ 1220.672728] dump_stack+0x1b2/0x281 [ 1220.676360] should_fail.cold+0x10a/0x149 [ 1220.680507] should_failslab+0xd6/0x130 [ 1220.684480] kmem_cache_alloc+0x28e/0x3c0 [ 1220.688629] __kernfs_new_node+0x6f/0x470 [ 1220.692783] kernfs_new_node+0x7b/0xe0 [ 1220.696667] __kernfs_create_file+0x3d/0x320 06:54:18 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0x0, 0x0, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) [ 1220.701087] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1220.705755] ? kernfs_create_dir_ns+0x171/0x200 [ 1220.710424] internal_create_group+0x22b/0x710 [ 1220.715017] lo_ioctl+0x1137/0x1cd0 [ 1220.718647] ? loop_set_status64+0xe0/0xe0 [ 1220.722881] blkdev_ioctl+0x540/0x1830 [ 1220.726768] ? blkpg_ioctl+0x8d0/0x8d0 [ 1220.730650] ? trace_hardirqs_on+0x10/0x10 [ 1220.734897] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1220.740003] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1220.745018] block_ioctl+0xd9/0x120 [ 1220.748642] ? blkdev_fallocate+0x3a0/0x3a0 [ 1220.752964] do_vfs_ioctl+0x75a/0xff0 [ 1220.756759] ? lock_acquire+0x170/0x3f0 [ 1220.760717] ? ioctl_preallocate+0x1a0/0x1a0 [ 1220.765106] ? __fget+0x265/0x3e0 [ 1220.768543] ? do_vfs_ioctl+0xff0/0xff0 [ 1220.772508] ? security_file_ioctl+0x83/0xb0 [ 1220.776901] SyS_ioctl+0x7f/0xb0 [ 1220.780269] ? do_vfs_ioctl+0xff0/0xff0 [ 1220.784252] do_syscall_64+0x1d5/0x640 [ 1220.788126] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1220.793298] RIP: 0033:0x7f10c0393ec7 [ 1220.796988] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1220.804680] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1220.811930] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1220.819183] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1220.826442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1220.833711] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1220.840996] CPU: 1 PID: 26762 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1220.848966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.858322] Call Trace: [ 1220.860909] dump_stack+0x1b2/0x281 [ 1220.864546] should_fail.cold+0x10a/0x149 [ 1220.868696] should_failslab+0xd6/0x130 [ 1220.872669] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1220.877341] apparmor_file_alloc_security+0x129/0x800 [ 1220.882538] security_file_alloc+0x66/0xa0 [ 1220.886771] ? selinux_is_enabled+0x5/0x50 [ 1220.891006] get_empty_filp+0x16b/0x3f0 [ 1220.894984] path_openat+0x84/0x2970 [ 1220.898705] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1220.903670] ? path_lookupat+0x780/0x780 [ 1220.907732] ? trace_hardirqs_on+0x10/0x10 [ 1220.911971] ? fsnotify+0x974/0x11b0 [ 1220.915680] ? shmem_setattr+0x241/0xbf0 [ 1220.919747] do_filp_open+0x179/0x3c0 [ 1220.919983] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1220.923545] ? may_open_dev+0xe0/0xe0 [ 1220.923556] ? __alloc_fd+0x1be/0x490 [ 1220.923569] ? lock_downgrade+0x740/0x740 [ 1220.923579] ? do_raw_spin_unlock+0x164/0x220 [ 1220.923589] ? _raw_spin_unlock+0x29/0x40 [ 1220.923595] ? __alloc_fd+0x1be/0x490 [ 1220.923613] do_sys_open+0x296/0x410 [ 1220.958691] ? filp_open+0x60/0x60 [ 1220.962236] ? do_syscall_64+0x4c/0x640 [ 1220.966209] ? SyS_open+0x30/0x30 [ 1220.969669] do_syscall_64+0x1d5/0x640 [ 1220.973559] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1220.978758] RIP: 0033:0x7fe33b640024 [ 1220.982467] RSP: 002b:00007fe33a001eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1220.990165] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b640024 06:54:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 10) 06:54:18 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:18 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0x0, 0x0, 0x0, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) [ 1220.997431] RDX: 0000000000000002 RSI: 00007fe33a001fe0 RDI: 00000000ffffff9c [ 1221.004683] RBP: 00007fe33a001fe0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1221.011931] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1221.019178] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 18) [ 1221.075343] FAULT_INJECTION: forcing a failure. [ 1221.075343] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.112692] CPU: 0 PID: 26803 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1221.120599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.130036] Call Trace: [ 1221.132626] dump_stack+0x1b2/0x281 [ 1221.136265] should_fail.cold+0x10a/0x149 [ 1221.140418] should_failslab+0xd6/0x130 [ 1221.144392] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1221.149063] ? loop_get_status64+0x100/0x100 [ 1221.153472] __kthread_create_on_node+0xbe/0x3a0 [ 1221.158237] ? kthread_park+0x130/0x130 [ 1221.162229] ? loop_get_status64+0x100/0x100 [ 1221.166642] kthread_create_on_node+0xa8/0xd0 06:54:18 executing program 2: r0 = syz_mount_image$xfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="399c569efdc3167ee073f2f38802e8fde5bdc22c6b2cb2c16055538a9db48b17e601dbf3d3be27092873e13748701f4161cd5fb0611a286dcd", 0x39, 0xee}, {&(0x7f0000000100)="3f1d30450b", 0x5, 0x4}, {&(0x7f0000000140)="e727b85ae54c44f238b11e6e0cbf071fbf47e50a2bf09570231b4cf9fabf1068a0097c448fe1e5b1e7024ed5bd2f3ec0bc46e0a91164cfcee9943f68e5b254fb36469b92263fbe497a3e61af07d404dab024d1042b1c00bfaeb554846cc92a7de93be2b819923168f7518f0b215d77e5794f47bcc7ebfa6b475306032c5402a2718c1973afa5969f5fcf39b18f872e4a413f58806d26f9c1712fd4ee6ec88f7a480a2d", 0xa3, 0x1ff}], 0x80400, &(0x7f0000000280)={[{@barrier}, {@sysvgroups}, {@nouuid}, {@swalloc}, {@nolazytime}, {@noquota}], [{@hash}, {@fsname={'fsname', 0x3d, ')'}}, {@fsmagic={'fsmagic', 0x3d, 0xd074}}, {@pcr={'pcr', 0x3d, 0x27}}, {@audit}, {@permit_directio}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x30, 0x39, 0x33, 0x36, 0x66, 0x38, 0x64], 0x2d, [0x24, 0x51, 0x30, 0x66], 0x2d, [0x61, 0x39, 0x6b, 0x61], 0x2d, [0x35, 0x30, 0x62, 0x65], 0x2d, [0x36, 0x35, 0x33, 0x32, 0x39, 0x4, 0x36, 0x61]}}}]}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000340)={@desc={0x1, 0x0, @desc2}}) syz_mount_image$btrfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0/file0\x00', 0x1ff, 0x0, &(0x7f00000018c0), 0x1892010, &(0x7f00000019c0)={[{@ssd}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x494e}}, {@nodiscard}, {@skip_balance}, {@skip_balance}, {@subvolid={'subvolid', 0x3d, 0x3}}, {@skip_balance}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'}*-'}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise_type}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r1, 0x0, 0x0) 06:54:18 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:18 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) [ 1221.171136] ? __kthread_create_on_node+0x3a0/0x3a0 [ 1221.176163] ? __lockdep_init_map+0x100/0x560 [ 1221.180660] ? __lockdep_init_map+0x100/0x560 [ 1221.185159] lo_ioctl+0xcd9/0x1cd0 [ 1221.188703] ? loop_set_status64+0xe0/0xe0 [ 1221.192953] blkdev_ioctl+0x540/0x1830 [ 1221.196854] ? blkpg_ioctl+0x8d0/0x8d0 [ 1221.200740] ? trace_hardirqs_on+0x10/0x10 [ 1221.204987] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1221.210453] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1221.215484] block_ioctl+0xd9/0x120 [ 1221.219108] ? blkdev_fallocate+0x3a0/0x3a0 06:54:18 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:18 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1221.223545] do_vfs_ioctl+0x75a/0xff0 [ 1221.227353] ? lock_acquire+0x170/0x3f0 [ 1221.231335] ? ioctl_preallocate+0x1a0/0x1a0 [ 1221.235753] ? __fget+0x265/0x3e0 [ 1221.239205] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.243180] ? security_file_ioctl+0x83/0xb0 [ 1221.247587] SyS_ioctl+0x7f/0xb0 [ 1221.250950] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.254921] do_syscall_64+0x1d5/0x640 [ 1221.258816] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1221.264020] RIP: 0033:0x7fe33b68cec7 [ 1221.267722] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:54:18 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1221.275443] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1221.282705] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1221.289969] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1221.297232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1221.304495] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1221.330045] FAULT_INJECTION: forcing a failure. [ 1221.330045] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.362909] CPU: 0 PID: 26811 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1221.370816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.380176] Call Trace: [ 1221.382767] dump_stack+0x1b2/0x281 [ 1221.386405] should_fail.cold+0x10a/0x149 [ 1221.390552] should_failslab+0xd6/0x130 [ 1221.394528] kmem_cache_alloc+0x28e/0x3c0 [ 1221.398681] __kernfs_new_node+0x6f/0x470 [ 1221.402830] kernfs_new_node+0x7b/0xe0 [ 1221.406723] __kernfs_create_file+0x3d/0x320 [ 1221.411126] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1221.415785] ? kernfs_create_dir_ns+0x171/0x200 [ 1221.420436] internal_create_group+0x22b/0x710 [ 1221.425014] lo_ioctl+0x1137/0x1cd0 [ 1221.428631] ? loop_set_status64+0xe0/0xe0 [ 1221.432947] blkdev_ioctl+0x540/0x1830 [ 1221.436819] ? blkpg_ioctl+0x8d0/0x8d0 [ 1221.440692] ? trace_hardirqs_on+0x10/0x10 [ 1221.444917] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1221.450004] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1221.455006] block_ioctl+0xd9/0x120 [ 1221.458619] ? blkdev_fallocate+0x3a0/0x3a0 [ 1221.462931] do_vfs_ioctl+0x75a/0xff0 [ 1221.466720] ? lock_acquire+0x170/0x3f0 [ 1221.470675] ? ioctl_preallocate+0x1a0/0x1a0 [ 1221.475070] ? __fget+0x265/0x3e0 [ 1221.478500] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.482458] ? security_file_ioctl+0x83/0xb0 [ 1221.486860] SyS_ioctl+0x7f/0xb0 [ 1221.490205] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.494159] do_syscall_64+0x1d5/0x640 [ 1221.498029] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1221.503199] RIP: 0033:0x7f10c0393ec7 [ 1221.506889] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1221.514685] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1221.521946] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1221.529223] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1221.536476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1221.543728] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:19 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 11) 06:54:19 executing program 2: r0 = syz_mount_image$xfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="399c569efdc3167ee073f2f38802e8fde5bdc22c6b2cb2c16055538a9db48b17e601dbf3d3be27092873e13748701f4161cd5fb0611a286dcd", 0x39, 0xee}, {&(0x7f0000000100)="3f1d30450b", 0x5, 0x4}, {&(0x7f0000000140)="e727b85ae54c44f238b11e6e0cbf071fbf47e50a2bf09570231b4cf9fabf1068a0097c448fe1e5b1e7024ed5bd2f3ec0bc46e0a91164cfcee9943f68e5b254fb36469b92263fbe497a3e61af07d404dab024d1042b1c00bfaeb554846cc92a7de93be2b819923168f7518f0b215d77e5794f47bcc7ebfa6b475306032c5402a2718c1973afa5969f5fcf39b18f872e4a413f58806d26f9c1712fd4ee6ec88f7a480a2d", 0xa3, 0x1ff}], 0x80400, &(0x7f0000000280)={[{@barrier}, {@sysvgroups}, {@nouuid}, {@swalloc}, {@nolazytime}, {@noquota}], [{@hash}, {@fsname={'fsname', 0x3d, ')'}}, {@fsmagic={'fsmagic', 0x3d, 0xd074}}, {@pcr={'pcr', 0x3d, 0x27}}, {@audit}, {@permit_directio}, {@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x30, 0x39, 0x33, 0x36, 0x66, 0x38, 0x64], 0x2d, [0x24, 0x51, 0x30, 0x66], 0x2d, [0x61, 0x39, 0x6b, 0x61], 0x2d, [0x35, 0x30, 0x62, 0x65], 0x2d, [0x36, 0x35, 0x33, 0x32, 0x39, 0x4, 0x36, 0x61]}}}]}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000340)={@desc={0x1, 0x0, @desc2}}) (async) syz_mount_image$btrfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0/file0\x00', 0x1ff, 0x0, &(0x7f00000018c0), 0x1892010, &(0x7f00000019c0)={[{@ssd}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x494e}}, {@nodiscard}, {@skip_balance}, {@skip_balance}, {@subvolid={'subvolid', 0x3d, 0x3}}, {@skip_balance}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'}*-'}}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise_type}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r1, 0x0, 0x0) 06:54:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:19 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}], '\x00', 0x80000000}) [ 1221.579607] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 19) 06:54:19 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:19 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x0, 0x43f4c619, 0x1}], '\x00', 0x80000000}) [ 1221.630434] FAULT_INJECTION: forcing a failure. [ 1221.630434] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.669572] CPU: 1 PID: 26858 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1221.677480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.686830] Call Trace: [ 1221.689421] dump_stack+0x1b2/0x281 [ 1221.693054] should_fail.cold+0x10a/0x149 [ 1221.697207] should_failslab+0xd6/0x130 [ 1221.701186] kmem_cache_alloc+0x28e/0x3c0 [ 1221.705336] __kernfs_new_node+0x6f/0x470 [ 1221.709483] kernfs_create_dir_ns+0x8c/0x200 [ 1221.712819] FAULT_INJECTION: forcing a failure. [ 1221.712819] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.713893] internal_create_group+0xe9/0x710 [ 1221.713918] lo_ioctl+0x1137/0x1cd0 [ 1221.713932] ? loop_set_status64+0xe0/0xe0 [ 1221.737573] blkdev_ioctl+0x540/0x1830 [ 1221.741443] ? blkpg_ioctl+0x8d0/0x8d0 [ 1221.745316] ? trace_hardirqs_on+0x10/0x10 [ 1221.749538] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1221.754623] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1221.759624] block_ioctl+0xd9/0x120 [ 1221.763234] ? blkdev_fallocate+0x3a0/0x3a0 [ 1221.767536] do_vfs_ioctl+0x75a/0xff0 [ 1221.771413] ? lock_acquire+0x170/0x3f0 [ 1221.775370] ? ioctl_preallocate+0x1a0/0x1a0 [ 1221.779760] ? __fget+0x265/0x3e0 [ 1221.783199] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.787157] ? security_file_ioctl+0x83/0xb0 [ 1221.791545] SyS_ioctl+0x7f/0xb0 [ 1221.794977] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.798948] do_syscall_64+0x1d5/0x640 [ 1221.802822] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1221.808005] RIP: 0033:0x7fe33b68cec7 [ 1221.811697] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1221.819385] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 06:54:19 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:19 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) [ 1221.826807] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1221.834058] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1221.841313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1221.848561] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1221.856011] CPU: 0 PID: 26868 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1221.863898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.873253] Call Trace: [ 1221.875840] dump_stack+0x1b2/0x281 06:54:19 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:19 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1221.879467] should_fail.cold+0x10a/0x149 [ 1221.883621] should_failslab+0xd6/0x130 [ 1221.887595] kmem_cache_alloc_node+0x263/0x410 [ 1221.892181] __alloc_skb+0x5c/0x510 [ 1221.895811] kobject_uevent_env+0x882/0xf30 [ 1221.900137] lo_ioctl+0x11a6/0x1cd0 [ 1221.903762] ? loop_set_status64+0xe0/0xe0 [ 1221.907996] blkdev_ioctl+0x540/0x1830 [ 1221.911882] ? blkpg_ioctl+0x8d0/0x8d0 [ 1221.915766] ? trace_hardirqs_on+0x10/0x10 [ 1221.920002] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1221.925102] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1221.930121] block_ioctl+0xd9/0x120 [ 1221.933749] ? blkdev_fallocate+0x3a0/0x3a0 [ 1221.938067] do_vfs_ioctl+0x75a/0xff0 [ 1221.941863] ? lock_acquire+0x170/0x3f0 [ 1221.945838] ? ioctl_preallocate+0x1a0/0x1a0 [ 1221.950247] ? __fget+0x265/0x3e0 [ 1221.953712] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.957690] ? security_file_ioctl+0x83/0xb0 [ 1221.962098] SyS_ioctl+0x7f/0xb0 [ 1221.965455] ? do_vfs_ioctl+0xff0/0xff0 [ 1221.969431] do_syscall_64+0x1d5/0x640 [ 1221.973354] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1221.978536] RIP: 0033:0x7f10c0393ec7 [ 1221.982242] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1221.989943] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1221.997199] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1222.004456] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1222.011706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1222.018957] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1222.030646] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1222.030651] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:19 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 12) 06:54:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:19 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:19 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x1000, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:19 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) read$snddsp(r0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x141000) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, &(0x7f0000000040)={0x0, 0x1, r0}) 06:54:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 20) 06:54:19 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:19 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) read$snddsp(r0, 0x0, 0x0) (async) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x141000) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, &(0x7f0000000040)={0x0, 0x1, r0}) 06:54:19 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:19 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:19 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:19 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) [ 1222.205552] FAULT_INJECTION: forcing a failure. [ 1222.205552] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.219701] FAULT_INJECTION: forcing a failure. [ 1222.219701] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.223966] CPU: 1 PID: 26926 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1222.238779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.248128] Call Trace: [ 1222.250715] dump_stack+0x1b2/0x281 [ 1222.254345] should_fail.cold+0x10a/0x149 [ 1222.258499] should_failslab+0xd6/0x130 [ 1222.262560] kmem_cache_alloc+0x28e/0x3c0 [ 1222.266698] __kernfs_new_node+0x6f/0x470 [ 1222.270872] kernfs_new_node+0x7b/0xe0 [ 1222.274742] __kernfs_create_file+0x3d/0x320 [ 1222.279135] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1222.283787] ? kernfs_create_dir_ns+0x171/0x200 [ 1222.288438] internal_create_group+0x22b/0x710 [ 1222.293016] lo_ioctl+0x1137/0x1cd0 [ 1222.296657] ? loop_set_status64+0xe0/0xe0 [ 1222.300900] blkdev_ioctl+0x540/0x1830 [ 1222.304778] ? blkpg_ioctl+0x8d0/0x8d0 [ 1222.308657] ? trace_hardirqs_on+0x10/0x10 [ 1222.312887] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1222.317983] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1222.322984] block_ioctl+0xd9/0x120 [ 1222.326591] ? blkdev_fallocate+0x3a0/0x3a0 [ 1222.330893] do_vfs_ioctl+0x75a/0xff0 [ 1222.334689] ? lock_acquire+0x170/0x3f0 [ 1222.338652] ? ioctl_preallocate+0x1a0/0x1a0 [ 1222.343050] ? __fget+0x265/0x3e0 [ 1222.346574] ? do_vfs_ioctl+0xff0/0xff0 [ 1222.350543] ? security_file_ioctl+0x83/0xb0 [ 1222.354946] SyS_ioctl+0x7f/0xb0 [ 1222.358297] ? do_vfs_ioctl+0xff0/0xff0 [ 1222.362269] do_syscall_64+0x1d5/0x640 [ 1222.366152] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1222.371337] RIP: 0033:0x7fe33b68cec7 [ 1222.375029] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1222.382808] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1222.390064] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1222.397318] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1222.404674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1222.411929] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1222.419199] CPU: 0 PID: 26927 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1222.427087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.436432] Call Trace: [ 1222.439005] dump_stack+0x1b2/0x281 [ 1222.442613] should_fail.cold+0x10a/0x149 [ 1222.446743] should_failslab+0xd6/0x130 [ 1222.450785] kmem_cache_alloc_node+0x263/0x410 [ 1222.455350] __alloc_skb+0x5c/0x510 [ 1222.458977] kobject_uevent_env+0x882/0xf30 [ 1222.463315] lo_ioctl+0x11a6/0x1cd0 [ 1222.466929] ? loop_set_status64+0xe0/0xe0 [ 1222.471149] blkdev_ioctl+0x540/0x1830 [ 1222.475152] ? blkpg_ioctl+0x8d0/0x8d0 [ 1222.479027] ? trace_hardirqs_on+0x10/0x10 [ 1222.483253] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1222.488345] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1222.493570] block_ioctl+0xd9/0x120 [ 1222.497181] ? blkdev_fallocate+0x3a0/0x3a0 [ 1222.501489] do_vfs_ioctl+0x75a/0xff0 [ 1222.505278] ? lock_acquire+0x170/0x3f0 [ 1222.509233] ? ioctl_preallocate+0x1a0/0x1a0 [ 1222.513645] ? __fget+0x265/0x3e0 [ 1222.517079] ? do_vfs_ioctl+0xff0/0xff0 [ 1222.521052] ? security_file_ioctl+0x83/0xb0 [ 1222.525466] SyS_ioctl+0x7f/0xb0 [ 1222.528819] ? do_vfs_ioctl+0xff0/0xff0 [ 1222.532773] do_syscall_64+0x1d5/0x640 [ 1222.536641] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1222.541910] RIP: 0033:0x7f10c0393ec7 [ 1222.545600] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1222.553302] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1222.560552] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1222.567804] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1222.575147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1222.582398] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1222.603603] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1222.604794] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 13) 06:54:20 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:20 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 32) read$snddsp(r0, 0x0, 0x0) (async, rerun: 32) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x141000) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, &(0x7f0000000040)={0x0, 0x1, r0}) 06:54:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:20 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 21) [ 1222.741215] FAULT_INJECTION: forcing a failure. [ 1222.741215] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.752706] CPU: 0 PID: 26954 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1222.760671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.770020] Call Trace: [ 1222.772610] dump_stack+0x1b2/0x281 [ 1222.776249] should_fail.cold+0x10a/0x149 [ 1222.780397] should_failslab+0xd6/0x130 [ 1222.784372] kmem_cache_alloc+0x40/0x3c0 [ 1222.788436] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 1222.794070] idr_get_free_cmn+0x595/0x8d0 [ 1222.798222] ? trace_hardirqs_on+0x10/0x10 [ 1222.802459] idr_alloc_cmn+0xe8/0x1e0 [ 1222.806260] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 1222.811104] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1222.816119] ? __schedule+0x1450/0x1de0 [ 1222.820092] ? cpuacct_charge+0x1cf/0x350 [ 1222.824239] ? fs_reclaim_release+0xd0/0x110 [ 1222.828650] idr_alloc_cyclic+0xc2/0x1d0 [ 1222.832713] ? idr_alloc_cmn+0x1e0/0x1e0 [ 1222.836768] ? __radix_tree_preload+0x1c3/0x250 [ 1222.841426] __kernfs_new_node+0xaf/0x470 [ 1222.845558] kernfs_create_dir_ns+0x8c/0x200 [ 1222.849978] internal_create_group+0xe9/0x710 [ 1222.854454] lo_ioctl+0x1137/0x1cd0 [ 1222.858068] ? loop_set_status64+0xe0/0xe0 [ 1222.862383] blkdev_ioctl+0x540/0x1830 [ 1222.866248] ? blkpg_ioctl+0x8d0/0x8d0 [ 1222.870111] ? retint_kernel+0x2d/0x2d [ 1222.873981] block_ioctl+0xd9/0x120 [ 1222.877601] ? blkdev_fallocate+0x3a0/0x3a0 [ 1222.881902] do_vfs_ioctl+0x75a/0xff0 [ 1222.885681] ? lock_acquire+0x170/0x3f0 [ 1222.889632] ? ioctl_preallocate+0x1a0/0x1a0 [ 1222.894021] ? __fget+0x265/0x3e0 [ 1222.897464] ? do_vfs_ioctl+0xff0/0xff0 [ 1222.901417] ? security_file_ioctl+0x83/0xb0 [ 1222.905803] SyS_ioctl+0x7f/0xb0 [ 1222.909161] ? do_vfs_ioctl+0xff0/0xff0 [ 1222.913113] do_syscall_64+0x1d5/0x640 [ 1222.916981] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1222.922148] RIP: 0033:0x7fe33b68cec7 [ 1222.925840] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1222.933537] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 06:54:20 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:20 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) read$snddsp(r1, &(0x7f00000000c0)=""/134, 0x86) read$snddsp(r0, 0x0, 0x0) read$snddsp(r1, &(0x7f0000000980)=""/4096, 0x1000) [ 1222.940787] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1222.948033] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1222.955284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1222.962527] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1222.970178] FAULT_INJECTION: forcing a failure. [ 1222.970178] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.992756] CPU: 1 PID: 26959 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1223.000659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.010020] Call Trace: [ 1223.012621] dump_stack+0x1b2/0x281 [ 1223.016246] should_fail.cold+0x10a/0x149 [ 1223.020390] should_failslab+0xd6/0x130 [ 1223.024347] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1223.029431] __kmalloc_node_track_caller+0x38/0x70 [ 1223.034338] __alloc_skb+0x96/0x510 [ 1223.037961] kobject_uevent_env+0x882/0xf30 [ 1223.042389] lo_ioctl+0x11a6/0x1cd0 [ 1223.045996] ? loop_set_status64+0xe0/0xe0 [ 1223.050303] blkdev_ioctl+0x540/0x1830 [ 1223.054251] ? blkpg_ioctl+0x8d0/0x8d0 [ 1223.058116] ? trace_hardirqs_on+0x10/0x10 [ 1223.062330] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1223.067411] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1223.072408] block_ioctl+0xd9/0x120 [ 1223.076020] ? blkdev_fallocate+0x3a0/0x3a0 [ 1223.080343] do_vfs_ioctl+0x75a/0xff0 [ 1223.084126] ? lock_acquire+0x170/0x3f0 [ 1223.088170] ? ioctl_preallocate+0x1a0/0x1a0 [ 1223.092560] ? __fget+0x265/0x3e0 [ 1223.095989] ? do_vfs_ioctl+0xff0/0xff0 [ 1223.099939] ? security_file_ioctl+0x83/0xb0 [ 1223.104336] SyS_ioctl+0x7f/0xb0 [ 1223.107686] ? do_vfs_ioctl+0xff0/0xff0 [ 1223.111649] do_syscall_64+0x1d5/0x640 [ 1223.115525] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1223.120693] RIP: 0033:0x7f10c0393ec7 [ 1223.124381] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1223.132066] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 06:54:20 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x0, 0x4, 0x1, 0x0, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:20 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) read$snddsp(r1, &(0x7f00000000c0)=""/134, 0x86) (async) read$snddsp(r0, 0x0, 0x0) (async) read$snddsp(r1, &(0x7f0000000980)=""/4096, 0x1000) 06:54:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, 0x0) 06:54:20 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1223.139327] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1223.146580] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1223.154039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1223.161373] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 14) 06:54:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) 06:54:20 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x0, 0x0, 0x1, 0x0, 0x1, 0x1}], '\x00', 0x80000000}) [ 1223.197885] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1223.200316] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 22) 06:54:20 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async, rerun: 32) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 32) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 64) read$snddsp(r1, &(0x7f00000000c0)=""/134, 0x86) (rerun: 64) read$snddsp(r0, 0x0, 0x0) (async, rerun: 32) read$snddsp(r1, &(0x7f0000000980)=""/4096, 0x1000) (rerun: 32) 06:54:20 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:20 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x1}], '\x00', 0x80000000}) [ 1223.298207] FAULT_INJECTION: forcing a failure. [ 1223.298207] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.329118] CPU: 0 PID: 26992 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1223.337022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.346459] Call Trace: [ 1223.349050] dump_stack+0x1b2/0x281 [ 1223.352683] should_fail.cold+0x10a/0x149 [ 1223.356836] should_failslab+0xd6/0x130 [ 1223.360812] kmem_cache_alloc+0x28e/0x3c0 [ 1223.364964] __kernfs_new_node+0x6f/0x470 [ 1223.369121] kernfs_new_node+0x7b/0xe0 [ 1223.373100] __kernfs_create_file+0x3d/0x320 [ 1223.377595] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1223.382262] ? kernfs_create_dir_ns+0x171/0x200 [ 1223.386938] internal_create_group+0x22b/0x710 [ 1223.391523] lo_ioctl+0x1137/0x1cd0 [ 1223.395175] ? loop_set_status64+0xe0/0xe0 [ 1223.399419] blkdev_ioctl+0x540/0x1830 [ 1223.403304] ? blkpg_ioctl+0x8d0/0x8d0 [ 1223.407192] ? trace_hardirqs_on+0x10/0x10 [ 1223.411565] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1223.416668] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1223.421686] block_ioctl+0xd9/0x120 [ 1223.425307] ? blkdev_fallocate+0x3a0/0x3a0 [ 1223.429627] do_vfs_ioctl+0x75a/0xff0 [ 1223.433517] ? lock_acquire+0x170/0x3f0 [ 1223.437496] ? ioctl_preallocate+0x1a0/0x1a0 [ 1223.441904] ? __fget+0x265/0x3e0 06:54:20 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0xffffffffffffffff, 0x56f940) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x101) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) r3 = syz_mount_image$ocfs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x19, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="5b8905c2dc3f7ed7f0fab25e88fddf01cdd5ba2587573e64e1dfd3a839b13992726887a96e7e486edaa6aa54d44dd414703de42e1322b6874b403a25360f3ac2282d8e711f9c7f7faad00c9d9b6ba2033097014471ac5d0bca9c1e3402f6e958cb5466c1990531f695b4f5b2a0f41a926759ffd8176dd17e9572528b5fe8145bbad1aa3d953820b9fb4acf65deca1db383f43af423fb83a3b701bc5f42d890192a4240ead5b0e0aea1366ac8b2e244e5769046a23c9fc9e69f623a94b57f4af14688d01b9f4f565c5fb98bffbf418b40bae77112d48e9b688e0bef0aee19f4", 0xdf, 0x8}, {&(0x7f0000000380)="e920068a93a549a0496ef60d4a12c5c1852205bfabec090bd69bbf053e555d460c0965493edd7dbc449f6b7ed7a8df146e456334290d762edfcef45c0cc0ace49ea813d1b5c2e2f66a647d5169480e311d6cb53c6f297e86f0654879710d3c157b70aebe412b0ba95c4755fef48e1e7d905eaed37facea4587e77e787977f27b2ebbbb68545f5c6d0da32f9d0bf74f97165b208718dce18eb6009b55da4d4ad123acf58ff6b4ca0db7139c0c805148a312b1182f", 0xb4, 0x93}, {&(0x7f0000000440)="b0e567c1b4cf7ed6b53385a7556ca38267e5ce3160471b69c530f2398e92b96914b5931fc34518b8ed3bf9fed5150fc413da9c972d8577efd76d07df978e00", 0x3f, 0x2e}], 0x1e30d0, &(0x7f0000000500)={[{'%\'}'}, {'/dev/snd/pcmC#D#c\x00'}, {'@%]\'*!]#%'}, {}, {'/dev/dlm_plock\x00'}, {'-\x9d:'}], [{@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '/dev/snd/pcmC#D#c\x00'}}]}) mknodat(r3, &(0x7f00000005c0)='./file0\x00', 0x400, 0x6) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000001c0)=0x4) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f00000000c0)={0x0, [0x2, 0x6, 0x1000], [{0x1, 0x101, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1d7, 0x1, 0x1, 0x1, 0x1}, {0x1, 0x7, 0x0, 0x1}, {0x1000, 0xffff3d8e}, {0x1, 0x8000, 0x1, 0x1}, {0x2, 0x1ff, 0x1, 0x1}, {0x100, 0x2, 0x1, 0x1}, {0x20, 0xfffffffd, 0x0, 0x1, 0x1}, {0x400, 0x8, 0x0, 0x1, 0x0, 0x1}, {0x6, 0xe776, 0x1, 0x1, 0x1, 0x1}, {0x9, 0x2, 0x0, 0x1}, {0x2, 0x9160}], 0x3}) [ 1223.445356] ? do_vfs_ioctl+0xff0/0xff0 [ 1223.449326] ? security_file_ioctl+0x83/0xb0 [ 1223.453737] SyS_ioctl+0x7f/0xb0 [ 1223.457101] ? do_vfs_ioctl+0xff0/0xff0 [ 1223.461072] do_syscall_64+0x1d5/0x640 [ 1223.464968] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1223.470150] RIP: 0033:0x7fe33b68cec7 [ 1223.473856] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1223.481563] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1223.488829] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:54:20 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:20 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1223.496095] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1223.503370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1223.510627] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1223.526592] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1223.540161] FAULT_INJECTION: forcing a failure. 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}], '\x00', 0x80000000}) [ 1223.540161] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.561261] CPU: 0 PID: 27026 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1223.569166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.578517] Call Trace: [ 1223.581107] dump_stack+0x1b2/0x281 [ 1223.584741] should_fail.cold+0x10a/0x149 [ 1223.588982] should_failslab+0xd6/0x130 [ 1223.592975] kmem_cache_alloc_node+0x263/0x410 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x0, 0x5, 0x1}], '\x00', 0x80000000}) [ 1223.597561] __alloc_skb+0x5c/0x510 [ 1223.601190] kobject_uevent_env+0x882/0xf30 [ 1223.605514] lo_ioctl+0x11a6/0x1cd0 [ 1223.609140] ? loop_set_status64+0xe0/0xe0 [ 1223.613382] blkdev_ioctl+0x540/0x1830 [ 1223.617272] ? blkpg_ioctl+0x8d0/0x8d0 [ 1223.621181] ? trace_hardirqs_on+0x10/0x10 [ 1223.625423] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1223.630535] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1223.635570] block_ioctl+0xd9/0x120 [ 1223.639181] ? blkdev_fallocate+0x3a0/0x3a0 [ 1223.643491] do_vfs_ioctl+0x75a/0xff0 [ 1223.647281] ? lock_acquire+0x170/0x3f0 [ 1223.651240] ? ioctl_preallocate+0x1a0/0x1a0 [ 1223.655633] ? __fget+0x265/0x3e0 [ 1223.659084] ? do_vfs_ioctl+0xff0/0xff0 [ 1223.663049] ? security_file_ioctl+0x83/0xb0 [ 1223.667448] SyS_ioctl+0x7f/0xb0 [ 1223.670798] ? do_vfs_ioctl+0xff0/0xff0 [ 1223.674760] do_syscall_64+0x1d5/0x640 [ 1223.678636] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1223.683808] RIP: 0033:0x7f10c0393ec7 [ 1223.687499] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1223.695191] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1223.702449] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1223.709700] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1223.716954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1223.724331] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 15) 06:54:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 23) 06:54:21 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0xffffffffffffffff, 0x56f940) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x101) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) r3 = syz_mount_image$ocfs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x19, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="5b8905c2dc3f7ed7f0fab25e88fddf01cdd5ba2587573e64e1dfd3a839b13992726887a96e7e486edaa6aa54d44dd414703de42e1322b6874b403a25360f3ac2282d8e711f9c7f7faad00c9d9b6ba2033097014471ac5d0bca9c1e3402f6e958cb5466c1990531f695b4f5b2a0f41a926759ffd8176dd17e9572528b5fe8145bbad1aa3d953820b9fb4acf65deca1db383f43af423fb83a3b701bc5f42d890192a4240ead5b0e0aea1366ac8b2e244e5769046a23c9fc9e69f623a94b57f4af14688d01b9f4f565c5fb98bffbf418b40bae77112d48e9b688e0bef0aee19f4", 0xdf, 0x8}, {&(0x7f0000000380)="e920068a93a549a0496ef60d4a12c5c1852205bfabec090bd69bbf053e555d460c0965493edd7dbc449f6b7ed7a8df146e456334290d762edfcef45c0cc0ace49ea813d1b5c2e2f66a647d5169480e311d6cb53c6f297e86f0654879710d3c157b70aebe412b0ba95c4755fef48e1e7d905eaed37facea4587e77e787977f27b2ebbbb68545f5c6d0da32f9d0bf74f97165b208718dce18eb6009b55da4d4ad123acf58ff6b4ca0db7139c0c805148a312b1182f", 0xb4, 0x93}, {&(0x7f0000000440)="b0e567c1b4cf7ed6b53385a7556ca38267e5ce3160471b69c530f2398e92b96914b5931fc34518b8ed3bf9fed5150fc413da9c972d8577efd76d07df978e00", 0x3f, 0x2e}], 0x1e30d0, &(0x7f0000000500)={[{'%\'}'}, {'/dev/snd/pcmC#D#c\x00'}, {'@%]\'*!]#%'}, {}, {'/dev/dlm_plock\x00'}, {'-\x9d:'}], [{@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '/dev/snd/pcmC#D#c\x00'}}]}) mknodat(r3, &(0x7f00000005c0)='./file0\x00', 0x400, 0x6) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000001c0)=0x4) (async) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f00000000c0)={0x0, [0x2, 0x6, 0x1000], [{0x1, 0x101, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1d7, 0x1, 0x1, 0x1, 0x1}, {0x1, 0x7, 0x0, 0x1}, {0x1000, 0xffff3d8e}, {0x1, 0x8000, 0x1, 0x1}, {0x2, 0x1ff, 0x1, 0x1}, {0x100, 0x2, 0x1, 0x1}, {0x20, 0xfffffffd, 0x0, 0x1, 0x1}, {0x400, 0x8, 0x0, 0x1, 0x0, 0x1}, {0x6, 0xe776, 0x1, 0x1, 0x1, 0x1}, {0x9, 0x2, 0x0, 0x1}, {0x2, 0x9160}], 0x3}) 06:54:21 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1223.748909] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1223.843146] FAULT_INJECTION: forcing a failure. [ 1223.843146] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.858841] FAULT_INJECTION: forcing a failure. [ 1223.858841] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.875045] CPU: 1 PID: 27062 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1223.882947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:54:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x0, 0x6, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1223.892301] Call Trace: [ 1223.894890] dump_stack+0x1b2/0x281 [ 1223.898519] should_fail.cold+0x10a/0x149 [ 1223.902680] should_failslab+0xd6/0x130 [ 1223.906658] kmem_cache_alloc+0x28e/0x3c0 [ 1223.910811] __kernfs_new_node+0x6f/0x470 [ 1223.914968] kernfs_new_node+0x7b/0xe0 [ 1223.918860] __kernfs_create_file+0x3d/0x320 [ 1223.923273] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1223.927939] ? kernfs_create_dir_ns+0x171/0x200 [ 1223.932612] internal_create_group+0x22b/0x710 [ 1223.937197] lo_ioctl+0x1137/0x1cd0 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1223.940821] ? loop_set_status64+0xe0/0xe0 [ 1223.945049] blkdev_ioctl+0x540/0x1830 [ 1223.948936] ? blkpg_ioctl+0x8d0/0x8d0 [ 1223.952821] ? trace_hardirqs_on+0x10/0x10 [ 1223.957053] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1223.962147] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1223.967155] block_ioctl+0xd9/0x120 [ 1223.970783] ? blkdev_fallocate+0x3a0/0x3a0 [ 1223.975094] do_vfs_ioctl+0x75a/0xff0 [ 1223.978885] ? lock_acquire+0x170/0x3f0 [ 1223.982848] ? ioctl_preallocate+0x1a0/0x1a0 [ 1223.987248] ? __fget+0x265/0x3e0 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) [ 1223.990691] ? do_vfs_ioctl+0xff0/0xff0 [ 1223.994654] ? security_file_ioctl+0x83/0xb0 [ 1223.999060] SyS_ioctl+0x7f/0xb0 [ 1224.002414] ? do_vfs_ioctl+0xff0/0xff0 [ 1224.006370] do_syscall_64+0x1d5/0x640 [ 1224.010249] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1224.015428] RIP: 0033:0x7fe33b68cec7 [ 1224.019126] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1224.026832] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1224.034099] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1224.041363] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1224.048621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1224.055959] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1224.063296] CPU: 0 PID: 27065 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1224.071182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.080529] Call Trace: [ 1224.083114] dump_stack+0x1b2/0x281 [ 1224.086743] should_fail.cold+0x10a/0x149 [ 1224.090891] should_failslab+0xd6/0x130 [ 1224.094865] kmem_cache_alloc_node+0x263/0x410 [ 1224.099429] __alloc_skb+0x5c/0x510 [ 1224.103042] kobject_uevent_env+0x882/0xf30 [ 1224.107343] lo_ioctl+0x11a6/0x1cd0 [ 1224.110951] ? loop_set_status64+0xe0/0xe0 [ 1224.115209] blkdev_ioctl+0x540/0x1830 [ 1224.119074] ? blkpg_ioctl+0x8d0/0x8d0 [ 1224.122937] ? trace_hardirqs_on+0x10/0x10 [ 1224.127152] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1224.132232] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1224.137228] block_ioctl+0xd9/0x120 [ 1224.140830] ? blkdev_fallocate+0x3a0/0x3a0 [ 1224.145128] do_vfs_ioctl+0x75a/0xff0 [ 1224.148908] ? lock_acquire+0x170/0x3f0 [ 1224.152874] ? ioctl_preallocate+0x1a0/0x1a0 [ 1224.157260] ? __fget+0x265/0x3e0 [ 1224.160691] ? do_vfs_ioctl+0xff0/0xff0 [ 1224.164644] ? security_file_ioctl+0x83/0xb0 [ 1224.169030] SyS_ioctl+0x7f/0xb0 [ 1224.172476] ? do_vfs_ioctl+0xff0/0xff0 [ 1224.176441] do_syscall_64+0x1d5/0x640 [ 1224.180308] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1224.185480] RIP: 0033:0x7f10c0393ec7 [ 1224.189171] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1224.196856] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1224.204100] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1224.211347] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1224.218601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1224.225850] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1224.240933] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1224.261053] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 16) 06:54:21 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:21 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0xffffffffffffffff, 0x56f940) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x101) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) r3 = syz_mount_image$ocfs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x19, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="5b8905c2dc3f7ed7f0fab25e88fddf01cdd5ba2587573e64e1dfd3a839b13992726887a96e7e486edaa6aa54d44dd414703de42e1322b6874b403a25360f3ac2282d8e711f9c7f7faad00c9d9b6ba2033097014471ac5d0bca9c1e3402f6e958cb5466c1990531f695b4f5b2a0f41a926759ffd8176dd17e9572528b5fe8145bbad1aa3d953820b9fb4acf65deca1db383f43af423fb83a3b701bc5f42d890192a4240ead5b0e0aea1366ac8b2e244e5769046a23c9fc9e69f623a94b57f4af14688d01b9f4f565c5fb98bffbf418b40bae77112d48e9b688e0bef0aee19f4", 0xdf, 0x8}, {&(0x7f0000000380)="e920068a93a549a0496ef60d4a12c5c1852205bfabec090bd69bbf053e555d460c0965493edd7dbc449f6b7ed7a8df146e456334290d762edfcef45c0cc0ace49ea813d1b5c2e2f66a647d5169480e311d6cb53c6f297e86f0654879710d3c157b70aebe412b0ba95c4755fef48e1e7d905eaed37facea4587e77e787977f27b2ebbbb68545f5c6d0da32f9d0bf74f97165b208718dce18eb6009b55da4d4ad123acf58ff6b4ca0db7139c0c805148a312b1182f", 0xb4, 0x93}, {&(0x7f0000000440)="b0e567c1b4cf7ed6b53385a7556ca38267e5ce3160471b69c530f2398e92b96914b5931fc34518b8ed3bf9fed5150fc413da9c972d8577efd76d07df978e00", 0x3f, 0x2e}], 0x1e30d0, &(0x7f0000000500)={[{'%\'}'}, {'/dev/snd/pcmC#D#c\x00'}, {'@%]\'*!]#%'}, {}, {'/dev/dlm_plock\x00'}, {'-\x9d:'}], [{@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '/dev/snd/pcmC#D#c\x00'}}]}) mknodat(r3, &(0x7f00000005c0)='./file0\x00', 0x400, 0x6) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000001c0)=0x4) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f00000000c0)={0x0, [0x2, 0x6, 0x1000], [{0x1, 0x101, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1d7, 0x1, 0x1, 0x1, 0x1}, {0x1, 0x7, 0x0, 0x1}, {0x1000, 0xffff3d8e}, {0x1, 0x8000, 0x1, 0x1}, {0x2, 0x1ff, 0x1, 0x1}, {0x100, 0x2, 0x1, 0x1}, {0x20, 0xfffffffd, 0x0, 0x1, 0x1}, {0x400, 0x8, 0x0, 0x1, 0x0, 0x1}, {0x6, 0xe776, 0x1, 0x1, 0x1, 0x1}, {0x9, 0x2, 0x0, 0x1}, {0x2, 0x9160}], 0x3}) 06:54:21 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0xffffffffffffffff, 0x56f940) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x101) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) r3 = syz_mount_image$ocfs2(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x19, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="5b8905c2dc3f7ed7f0fab25e88fddf01cdd5ba2587573e64e1dfd3a839b13992726887a96e7e486edaa6aa54d44dd414703de42e1322b6874b403a25360f3ac2282d8e711f9c7f7faad00c9d9b6ba2033097014471ac5d0bca9c1e3402f6e958cb5466c1990531f695b4f5b2a0f41a926759ffd8176dd17e9572528b5fe8145bbad1aa3d953820b9fb4acf65deca1db383f43af423fb83a3b701bc5f42d890192a4240ead5b0e0aea1366ac8b2e244e5769046a23c9fc9e69f623a94b57f4af14688d01b9f4f565c5fb98bffbf418b40bae77112d48e9b688e0bef0aee19f4", 0xdf, 0x8}, {&(0x7f0000000380)="e920068a93a549a0496ef60d4a12c5c1852205bfabec090bd69bbf053e555d460c0965493edd7dbc449f6b7ed7a8df146e456334290d762edfcef45c0cc0ace49ea813d1b5c2e2f66a647d5169480e311d6cb53c6f297e86f0654879710d3c157b70aebe412b0ba95c4755fef48e1e7d905eaed37facea4587e77e787977f27b2ebbbb68545f5c6d0da32f9d0bf74f97165b208718dce18eb6009b55da4d4ad123acf58ff6b4ca0db7139c0c805148a312b1182f", 0xb4, 0x93}, {&(0x7f0000000440)="b0e567c1b4cf7ed6b53385a7556ca38267e5ce3160471b69c530f2398e92b96914b5931fc34518b8ed3bf9fed5150fc413da9c972d8577efd76d07df978e00", 0x3f, 0x2e}], 0x1e30d0, &(0x7f0000000500)={[{'%\'}'}, {'/dev/snd/pcmC#D#c\x00'}, {'@%]\'*!]#%'}, {}, {'/dev/dlm_plock\x00'}, {'-\x9d:'}], [{@dont_hash}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, '/dev/snd/pcmC#D#c\x00'}}]}) mknodat(r3, &(0x7f00000005c0)='./file0\x00', 0x400, 0x6) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000001c0)=0x4) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f00000000c0)={0x0, [0x2, 0x6, 0x1000], [{0x1, 0x101, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1d7, 0x1, 0x1, 0x1, 0x1}, {0x1, 0x7, 0x0, 0x1}, {0x1000, 0xffff3d8e}, {0x1, 0x8000, 0x1, 0x1}, {0x2, 0x1ff, 0x1, 0x1}, {0x100, 0x2, 0x1, 0x1}, {0x20, 0xfffffffd, 0x0, 0x1, 0x1}, {0x400, 0x8, 0x0, 0x1, 0x0, 0x1}, {0x6, 0xe776, 0x1, 0x1, 0x1, 0x1}, {0x9, 0x2, 0x0, 0x1}, {0x2, 0x9160}], 0x3}) 06:54:21 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, 0x0, &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 24) 06:54:21 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', 0x0, 0xfffffffffffffffa) [ 1224.389779] FAULT_INJECTION: forcing a failure. [ 1224.389779] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.402461] CPU: 0 PID: 27112 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1224.410361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.419795] Call Trace: [ 1224.422381] dump_stack+0x1b2/0x281 [ 1224.426010] should_fail.cold+0x10a/0x149 [ 1224.430162] should_failslab+0xd6/0x130 [ 1224.434136] __kmalloc+0x2c1/0x400 [ 1224.437672] ? kobject_get_path+0xb5/0x230 [ 1224.441904] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1224.447354] kobject_get_path+0xb5/0x230 [ 1224.451418] kobject_uevent_env+0x230/0xf30 [ 1224.455739] ? internal_create_group+0x48f/0x710 [ 1224.460527] lo_ioctl+0x11a6/0x1cd0 [ 1224.464154] ? loop_set_status64+0xe0/0xe0 [ 1224.468387] blkdev_ioctl+0x540/0x1830 [ 1224.472276] ? blkpg_ioctl+0x8d0/0x8d0 [ 1224.476176] ? trace_hardirqs_on+0x10/0x10 [ 1224.480413] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1224.485523] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1224.487885] FAULT_INJECTION: forcing a failure. [ 1224.487885] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.491407] block_ioctl+0xd9/0x120 [ 1224.491417] ? blkdev_fallocate+0x3a0/0x3a0 [ 1224.491427] do_vfs_ioctl+0x75a/0xff0 [ 1224.491437] ? lock_acquire+0x170/0x3f0 [ 1224.491446] ? ioctl_preallocate+0x1a0/0x1a0 [ 1224.491460] ? __fget+0x265/0x3e0 [ 1224.526121] ? do_vfs_ioctl+0xff0/0xff0 [ 1224.530088] ? security_file_ioctl+0x83/0xb0 [ 1224.534484] SyS_ioctl+0x7f/0xb0 [ 1224.537832] ? do_vfs_ioctl+0xff0/0xff0 [ 1224.541795] do_syscall_64+0x1d5/0x640 [ 1224.545668] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1224.550845] RIP: 0033:0x7f10c0393ec7 [ 1224.554541] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1224.562228] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1224.569503] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1224.576771] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1224.584020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1224.591290] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1224.598551] CPU: 1 PID: 27114 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1224.606529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.611208] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1224.615871] Call Trace: [ 1224.615887] dump_stack+0x1b2/0x281 [ 1224.615901] should_fail.cold+0x10a/0x149 [ 1224.615913] should_failslab+0xd6/0x130 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x8, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1224.615925] kmem_cache_alloc+0x28e/0x3c0 [ 1224.615938] __kernfs_new_node+0x6f/0x470 [ 1224.615953] kernfs_new_node+0x7b/0xe0 [ 1224.649612] __kernfs_create_file+0x3d/0x320 [ 1224.654022] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1224.658687] ? kernfs_create_dir_ns+0x171/0x200 [ 1224.663357] internal_create_group+0x22b/0x710 [ 1224.667947] lo_ioctl+0x1137/0x1cd0 [ 1224.671580] ? loop_set_status64+0xe0/0xe0 [ 1224.675814] blkdev_ioctl+0x540/0x1830 [ 1224.679701] ? blkpg_ioctl+0x8d0/0x8d0 [ 1224.683585] ? trace_hardirqs_on+0x10/0x10 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) [ 1224.687822] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1224.692920] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1224.697935] block_ioctl+0xd9/0x120 [ 1224.701563] ? blkdev_fallocate+0x3a0/0x3a0 [ 1224.705880] do_vfs_ioctl+0x75a/0xff0 [ 1224.709678] ? lock_acquire+0x170/0x3f0 [ 1224.713650] ? ioctl_preallocate+0x1a0/0x1a0 [ 1224.718060] ? __fget+0x265/0x3e0 [ 1224.721515] ? do_vfs_ioctl+0xff0/0xff0 [ 1224.725486] ? security_file_ioctl+0x83/0xb0 [ 1224.729891] SyS_ioctl+0x7f/0xb0 [ 1224.733255] ? do_vfs_ioctl+0xff0/0xff0 [ 1224.737227] do_syscall_64+0x1d5/0x640 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) [ 1224.741115] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1224.746293] RIP: 0033:0x7fe33b68cec7 [ 1224.749999] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1224.757700] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1224.764967] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1224.772238] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1224.779504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 06:54:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', 0x0, 0xfffffffffffffffa) [ 1224.786770] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 17) 06:54:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', 0x0, 0xfffffffffffffffa) 06:54:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 25) 06:54:22 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) read$snddsp(r0, &(0x7f00000001c0)=""/155, 0x9b) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x68, 0x401, 0x80], [{0x5, 0x81, 0x1}, {0x200, 0x6}, {0x2, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x101, 0x5, 0x1, 0x0, 0x1, 0x1}, {0xabd, 0x200, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x1, 0x0, 0x0, 0x1}, {0x7, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x9, 0xcc83, 0x0, 0x0, 0x1}, {0x5, 0x87c, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x200, 0xffff, 0x1, 0x1, 0x0, 0x1}, {0xfffffffb, 0x7fffffff, 0x1, 0x1}], 0x5}) pkey_alloc(0x0, 0x1) 06:54:22 executing program 1: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1224.851765] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:22 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) read$snddsp(r0, &(0x7f00000001c0)=""/155, 0x9b) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x68, 0x401, 0x80], [{0x5, 0x81, 0x1}, {0x200, 0x6}, {0x2, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x101, 0x5, 0x1, 0x0, 0x1, 0x1}, {0xabd, 0x200, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x1, 0x0, 0x0, 0x1}, {0x7, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x9, 0xcc83, 0x0, 0x0, 0x1}, {0x5, 0x87c, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x200, 0xffff, 0x1, 0x1, 0x0, 0x1}, {0xfffffffb, 0x7fffffff, 0x1, 0x1}], 0x5}) pkey_alloc(0x0, 0x1) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) read$snddsp(r0, &(0x7f00000001c0)=""/155, 0x9b) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x68, 0x401, 0x80], [{0x5, 0x81, 0x1}, {0x200, 0x6}, {0x2, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x101, 0x5, 0x1, 0x0, 0x1, 0x1}, {0xabd, 0x200, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x1, 0x0, 0x0, 0x1}, {0x7, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x9, 0xcc83, 0x0, 0x0, 0x1}, {0x5, 0x87c, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x200, 0xffff, 0x1, 0x1, 0x0, 0x1}, {0xfffffffb, 0x7fffffff, 0x1, 0x1}], 0x5}) (async) pkey_alloc(0x0, 0x1) (async) 06:54:22 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:22 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0xffffffff, 0xf9e, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x1}, {0x101, 0x6, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x1}, {0x100, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x1, 0x1000, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x43f4c619, 0x1}, {0x0, 0x2, 0x1, 0x1, 0x1}], '\x00', 0x80000000}) 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0x0, 0xf9e, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:22 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000000000006162636465436768696a6b6c6d6e6f70"], 0x18, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:22 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r2, 0x4122, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f00000000c0)={0x7, [[0x8, 0x16, 0x7, 0x83, 0x1, 0x1, 0x2, 0x5], [0x80000000, 0x800, 0x0, 0x3, 0x8, 0x9, 0x3, 0x6], [0x1, 0x7f, 0x7fffffff, 0x9, 0x2, 0x6, 0x5, 0x1f]], '\x00', [{0x10000, 0x7, 0x0, 0x1}, {0x400, 0x1, 0x0, 0x1}, {0x54e, 0x296a827e, 0x0, 0x0, 0x0, 0x1}, {0x35, 0x9, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x80000001, 0x0, 0x1}, {0xffff, 0x40}, {0xc0, 0x8000}], '\x00', 0x6}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000400)) [ 1224.975541] FAULT_INJECTION: forcing a failure. [ 1224.975541] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.996789] FAULT_INJECTION: forcing a failure. [ 1224.996789] name failslab, interval 1, probability 0, space 0, times 0 [ 1225.014563] CPU: 0 PID: 27178 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1225.022462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1225.031812] Call Trace: [ 1225.034400] dump_stack+0x1b2/0x281 [ 1225.038029] should_fail.cold+0x10a/0x149 [ 1225.042171] should_failslab+0xd6/0x130 [ 1225.046132] kmem_cache_alloc+0x28e/0x3c0 [ 1225.050268] __kernfs_new_node+0x6f/0x470 [ 1225.054399] kernfs_new_node+0x7b/0xe0 [ 1225.058270] __kernfs_create_file+0x3d/0x320 [ 1225.062664] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1225.067326] ? kernfs_create_dir_ns+0x171/0x200 [ 1225.071978] internal_create_group+0x22b/0x710 [ 1225.076546] lo_ioctl+0x1137/0x1cd0 [ 1225.080161] ? loop_set_status64+0xe0/0xe0 [ 1225.084384] blkdev_ioctl+0x540/0x1830 [ 1225.088260] ? blkpg_ioctl+0x8d0/0x8d0 [ 1225.092134] ? trace_hardirqs_on+0x10/0x10 [ 1225.096353] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1225.101440] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1225.106449] block_ioctl+0xd9/0x120 [ 1225.110058] ? blkdev_fallocate+0x3a0/0x3a0 [ 1225.114370] do_vfs_ioctl+0x75a/0xff0 [ 1225.118154] ? lock_acquire+0x170/0x3f0 [ 1225.122113] ? ioctl_preallocate+0x1a0/0x1a0 [ 1225.126503] ? __fget+0x265/0x3e0 [ 1225.129938] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.133897] ? security_file_ioctl+0x83/0xb0 [ 1225.138375] SyS_ioctl+0x7f/0xb0 [ 1225.141738] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.145694] do_syscall_64+0x1d5/0x640 [ 1225.149568] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1225.154736] RIP: 0033:0x7fe33b68cec7 [ 1225.158429] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1225.166124] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1225.173372] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1225.180622] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1225.187870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1225.195116] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1225.202377] CPU: 1 PID: 27177 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1225.210259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1225.219607] Call Trace: [ 1225.222200] dump_stack+0x1b2/0x281 [ 1225.225830] should_fail.cold+0x10a/0x149 [ 1225.229978] should_failslab+0xd6/0x130 [ 1225.233954] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1225.239060] __kmalloc_node_track_caller+0x38/0x70 [ 1225.243989] __alloc_skb+0x96/0x510 [ 1225.247621] kobject_uevent_env+0x882/0xf30 [ 1225.251948] lo_ioctl+0x11a6/0x1cd0 [ 1225.255566] ? loop_set_status64+0xe0/0xe0 [ 1225.259780] blkdev_ioctl+0x540/0x1830 [ 1225.263654] ? blkpg_ioctl+0x8d0/0x8d0 [ 1225.267553] ? trace_hardirqs_on+0x10/0x10 [ 1225.271785] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1225.276984] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1225.282002] block_ioctl+0xd9/0x120 [ 1225.285975] ? blkdev_fallocate+0x3a0/0x3a0 [ 1225.290427] do_vfs_ioctl+0x75a/0xff0 [ 1225.294209] ? lock_acquire+0x170/0x3f0 [ 1225.298173] ? ioctl_preallocate+0x1a0/0x1a0 [ 1225.302577] ? __fget+0x265/0x3e0 [ 1225.306026] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.309993] ? security_file_ioctl+0x83/0xb0 [ 1225.314382] SyS_ioctl+0x7f/0xb0 [ 1225.317731] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.321789] do_syscall_64+0x1d5/0x640 [ 1225.325670] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1225.330839] RIP: 0033:0x7f10c0393ec7 [ 1225.334533] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1225.342254] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1225.349512] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1225.356763] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1225.364024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1225.371289] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1225.393320] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1225.401097] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 18) 06:54:22 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) read$snddsp(r0, &(0x7f00000001c0)=""/155, 0x9b) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x68, 0x401, 0x80], [{0x5, 0x81, 0x1}, {0x200, 0x6}, {0x2, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x101, 0x5, 0x1, 0x0, 0x1, 0x1}, {0xabd, 0x200, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x1, 0x0, 0x0, 0x1}, {0x7, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x9, 0xcc83, 0x0, 0x0, 0x1}, {0x5, 0x87c, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x200, 0xffff, 0x1, 0x1, 0x0, 0x1}, {0xfffffffb, 0x7fffffff, 0x1, 0x1}], 0x5}) pkey_alloc(0x0, 0x1) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) read$snddsp(r0, &(0x7f00000001c0)=""/155, 0x9b) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x68, 0x401, 0x80], [{0x5, 0x81, 0x1}, {0x200, 0x6}, {0x2, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x101, 0x5, 0x1, 0x0, 0x1, 0x1}, {0xabd, 0x200, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x1, 0x0, 0x0, 0x1}, {0x7, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x9, 0xcc83, 0x0, 0x0, 0x1}, {0x5, 0x87c, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x200, 0xffff, 0x1, 0x1, 0x0, 0x1}, {0xfffffffb, 0x7fffffff, 0x1, 0x1}], 0x5}) (async) pkey_alloc(0x0, 0x1) (async) 06:54:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 26) 06:54:22 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f00000000c0)) 06:54:22 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r2, 0x4122, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f00000000c0)={0x7, [[0x8, 0x16, 0x7, 0x83, 0x1, 0x1, 0x2, 0x5], [0x80000000, 0x800, 0x0, 0x3, 0x8, 0x9, 0x3, 0x6], [0x1, 0x7f, 0x7fffffff, 0x9, 0x2, 0x6, 0x5, 0x1f]], '\x00', [{0x10000, 0x7, 0x0, 0x1}, {0x400, 0x1, 0x0, 0x1}, {0x54e, 0x296a827e, 0x0, 0x0, 0x0, 0x1}, {0x35, 0x9, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x80000001, 0x0, 0x1}, {0xffff, 0x40}, {0xc0, 0x8000}], '\x00', 0x6}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000400)) 06:54:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0x0, 0xf9e, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1225.504249] FAULT_INJECTION: forcing a failure. [ 1225.504249] name failslab, interval 1, probability 0, space 0, times 0 [ 1225.516468] CPU: 0 PID: 27218 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1225.524365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1225.533715] Call Trace: [ 1225.536302] dump_stack+0x1b2/0x281 [ 1225.539937] should_fail.cold+0x10a/0x149 [ 1225.544089] should_failslab+0xd6/0x130 [ 1225.548067] kmem_cache_alloc+0x28e/0x3c0 [ 1225.552224] __kernfs_new_node+0x6f/0x470 [ 1225.556379] kernfs_new_node+0x7b/0xe0 [ 1225.558842] FAULT_INJECTION: forcing a failure. [ 1225.558842] name failslab, interval 1, probability 0, space 0, times 0 [ 1225.560281] __kernfs_create_file+0x3d/0x320 [ 1225.575846] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1225.580505] ? kernfs_create_dir_ns+0x171/0x200 [ 1225.585158] internal_create_group+0x22b/0x710 [ 1225.589727] lo_ioctl+0x1137/0x1cd0 [ 1225.593353] ? loop_set_status64+0xe0/0xe0 [ 1225.597571] blkdev_ioctl+0x540/0x1830 [ 1225.601529] ? blkpg_ioctl+0x8d0/0x8d0 [ 1225.605394] ? trace_hardirqs_on+0x10/0x10 [ 1225.609612] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1225.614730] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1225.619747] block_ioctl+0xd9/0x120 [ 1225.623360] ? blkdev_fallocate+0x3a0/0x3a0 [ 1225.627663] do_vfs_ioctl+0x75a/0xff0 [ 1225.631445] ? lock_acquire+0x170/0x3f0 [ 1225.635400] ? ioctl_preallocate+0x1a0/0x1a0 [ 1225.639789] ? __fget+0x265/0x3e0 [ 1225.643222] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.647175] ? security_file_ioctl+0x83/0xb0 [ 1225.651562] SyS_ioctl+0x7f/0xb0 [ 1225.654907] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.658862] do_syscall_64+0x1d5/0x640 [ 1225.662739] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1225.667908] RIP: 0033:0x7fe33b68cec7 [ 1225.671596] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1225.679281] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1225.686621] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1225.693955] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 06:54:23 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:23 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r2, 0x4122, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f00000000c0)={0x7, [[0x8, 0x16, 0x7, 0x83, 0x1, 0x1, 0x2, 0x5], [0x80000000, 0x800, 0x0, 0x3, 0x8, 0x9, 0x3, 0x6], [0x1, 0x7f, 0x7fffffff, 0x9, 0x2, 0x6, 0x5, 0x1f]], '\x00', [{0x10000, 0x7, 0x0, 0x1}, {0x400, 0x1, 0x0, 0x1}, {0x54e, 0x296a827e, 0x0, 0x0, 0x0, 0x1}, {0x35, 0x9, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x80000001, 0x0, 0x1}, {0xffff, 0x40}, {0xc0, 0x8000}], '\x00', 0x6}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000400)) [ 1225.701206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1225.708453] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1225.715715] CPU: 1 PID: 27223 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1225.723599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1225.732954] Call Trace: [ 1225.735545] dump_stack+0x1b2/0x281 [ 1225.739182] should_fail.cold+0x10a/0x149 [ 1225.743333] should_failslab+0xd6/0x130 [ 1225.747308] kmem_cache_alloc_node_trace+0x25a/0x400 06:54:23 executing program 2: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x6, 0x3f}, 0x8) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x40, 0x8001}, &(0x7f0000000180)=0x8) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000240)={'\x00', 0x8001, 0x1, 0x2}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x81}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0xf800, 0x4, 0x2, 0x120, 0x7, 0x5, 0x10000, 0xffffffff, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000100)={r4, 0x7f}, 0x8) r5 = syz_open_dev$sndpcmp(&(0x7f00000002c0), 0x100000001, 0xc4000) ioctl$SNDRV_PCM_IOCTL_UNLINK(r5, 0x4161, 0x0) read$snddsp(r0, 0x0, 0x0) [ 1225.752414] __kmalloc_node_track_caller+0x38/0x70 [ 1225.757343] __alloc_skb+0x96/0x510 [ 1225.760974] kobject_uevent_env+0x882/0xf30 [ 1225.765304] lo_ioctl+0x11a6/0x1cd0 [ 1225.768933] ? loop_set_status64+0xe0/0xe0 [ 1225.773172] blkdev_ioctl+0x540/0x1830 [ 1225.777060] ? blkpg_ioctl+0x8d0/0x8d0 [ 1225.780943] ? trace_hardirqs_on+0x10/0x10 [ 1225.785175] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1225.790273] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1225.795471] block_ioctl+0xd9/0x120 [ 1225.799096] ? blkdev_fallocate+0x3a0/0x3a0 06:54:23 executing program 2: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x6, 0x3f}, 0x8) (async, rerun: 64) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x1, 0x0) (async, rerun: 64) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x40, 0x8001}, &(0x7f0000000180)=0x8) (async, rerun: 64) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) (rerun: 64) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000240)={'\x00', 0x8001, 0x1, 0x2}) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x81}, 0x8) (async, rerun: 64) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0xf800, 0x4, 0x2, 0x120, 0x7, 0x5, 0x10000, 0xffffffff, 0x0}, &(0x7f00000000c0)=0x20) (rerun: 64) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000100)={r4, 0x7f}, 0x8) (async) r5 = syz_open_dev$sndpcmp(&(0x7f00000002c0), 0x100000001, 0xc4000) ioctl$SNDRV_PCM_IOCTL_UNLINK(r5, 0x4161, 0x0) (async) read$snddsp(r0, 0x0, 0x0) [ 1225.803410] do_vfs_ioctl+0x75a/0xff0 [ 1225.807219] ? lock_acquire+0x170/0x3f0 [ 1225.811192] ? ioctl_preallocate+0x1a0/0x1a0 [ 1225.815596] ? __fget+0x265/0x3e0 [ 1225.819046] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.823027] ? security_file_ioctl+0x83/0xb0 [ 1225.827520] SyS_ioctl+0x7f/0xb0 [ 1225.830918] ? do_vfs_ioctl+0xff0/0xff0 [ 1225.834884] do_syscall_64+0x1d5/0x640 [ 1225.838772] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1225.843952] RIP: 0033:0x7f10c0393ec7 [ 1225.847652] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:54:23 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:23 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r2, 0x4122, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f00000000c0)={0x7, [[0x8, 0x16, 0x7, 0x83, 0x1, 0x1, 0x2, 0x5], [0x80000000, 0x800, 0x0, 0x3, 0x8, 0x9, 0x3, 0x6], [0x1, 0x7f, 0x7fffffff, 0x9, 0x2, 0x6, 0x5, 0x1f]], '\x00', [{0x10000, 0x7, 0x0, 0x1}, {0x400, 0x1, 0x0, 0x1}, {0x54e, 0x296a827e, 0x0, 0x0, 0x0, 0x1}, {0x35, 0x9, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x7, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0x9, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x80000001, 0x0, 0x1}, {0xffff, 0x40}, {0xc0, 0x8000}], '\x00', 0x6}) [ 1225.855362] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1225.862884] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1225.870148] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1225.877416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1225.884691] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1225.904305] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1225.914368] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 19) 06:54:23 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (fail_nth: 1) 06:54:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 27) 06:54:23 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r1, 0x4122, 0x0) [ 1226.007785] FAULT_INJECTION: forcing a failure. [ 1226.007785] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.021220] CPU: 0 PID: 27269 Comm: syz-executor.1 Not tainted 4.14.284-syzkaller #0 [ 1226.021650] FAULT_INJECTION: forcing a failure. [ 1226.021650] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.029115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.029120] Call Trace: [ 1226.029137] dump_stack+0x1b2/0x281 [ 1226.029153] should_fail.cold+0x10a/0x149 [ 1226.029168] should_failslab+0xd6/0x130 [ 1226.064112] __kmalloc_track_caller+0x2bc/0x400 [ 1226.068762] ? strndup_user+0x5b/0xf0 [ 1226.072541] ? __check_object_size+0x119/0x230 [ 1226.077102] memdup_user+0x22/0xa0 [ 1226.080626] strndup_user+0x5b/0xf0 [ 1226.084245] keyctl_keyring_search+0xbd/0x340 [ 1226.088727] ? keyctl_describe_key+0x470/0x470 [ 1226.093289] ? SyS_write+0x14d/0x210 [ 1226.096985] SyS_keyctl+0x223/0x390 [ 1226.100689] ? keyctl_restrict_keyring+0x1b0/0x1b0 [ 1226.105696] do_syscall_64+0x1d5/0x640 [ 1226.109581] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1226.114753] RIP: 0033:0x7f94a5c3b109 [ 1226.118455] RSP: 002b:00007f94a45b0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 1226.126150] RAX: ffffffffffffffda RBX: 00007f94a5d4df60 RCX: 00007f94a5c3b109 [ 1226.133401] RDX: 0000000020000100 RSI: 0000000005479daf RDI: 000000000000000a [ 1226.140673] RBP: 00007f94a45b01d0 R08: fffffffffffffffa R09: 0000000000000000 [ 1226.147923] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000001 06:54:23 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) [ 1226.155171] R13: 00007fffe3d570cf R14: 00007f94a45b0300 R15: 0000000000022000 [ 1226.162436] CPU: 1 PID: 27271 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1226.170407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.177355] FAULT_INJECTION: forcing a failure. [ 1226.177355] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.179755] Call Trace: [ 1226.179772] dump_stack+0x1b2/0x281 [ 1226.179787] should_fail.cold+0x10a/0x149 [ 1226.179801] should_failslab+0xd6/0x130 [ 1226.179813] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1226.179828] __kmalloc_node_track_caller+0x38/0x70 [ 1226.215331] __alloc_skb+0x96/0x510 [ 1226.218961] kobject_uevent_env+0x882/0xf30 [ 1226.223269] lo_ioctl+0x11a6/0x1cd0 [ 1226.226882] ? loop_set_status64+0xe0/0xe0 [ 1226.231100] blkdev_ioctl+0x540/0x1830 [ 1226.234972] ? blkpg_ioctl+0x8d0/0x8d0 [ 1226.238845] ? trace_hardirqs_on+0x10/0x10 [ 1226.243066] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1226.248149] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1226.253156] block_ioctl+0xd9/0x120 06:54:23 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) [ 1226.256769] ? blkdev_fallocate+0x3a0/0x3a0 [ 1226.261248] do_vfs_ioctl+0x75a/0xff0 [ 1226.265037] ? lock_acquire+0x170/0x3f0 [ 1226.268993] ? ioctl_preallocate+0x1a0/0x1a0 [ 1226.273386] ? __fget+0x265/0x3e0 [ 1226.276823] ? do_vfs_ioctl+0xff0/0xff0 [ 1226.280776] ? security_file_ioctl+0x83/0xb0 [ 1226.285165] SyS_ioctl+0x7f/0xb0 [ 1226.288514] ? do_vfs_ioctl+0xff0/0xff0 [ 1226.292486] do_syscall_64+0x1d5/0x640 [ 1226.296376] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1226.301558] RIP: 0033:0x7f10c0393ec7 [ 1226.305253] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1226.313031] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1226.320285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1226.327536] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1226.334786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1226.342038] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1226.349317] CPU: 0 PID: 27273 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1226.357201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.366546] Call Trace: [ 1226.369130] dump_stack+0x1b2/0x281 [ 1226.372760] should_fail.cold+0x10a/0x149 [ 1226.376919] should_failslab+0xd6/0x130 [ 1226.380917] __kmalloc+0x2c1/0x400 [ 1226.383966] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1226.384455] ? kobject_get_path+0xb5/0x230 [ 1226.396039] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1226.401487] kobject_get_path+0xb5/0x230 [ 1226.405550] kobject_uevent_env+0x230/0xf30 [ 1226.409868] ? internal_create_group+0x48f/0x710 [ 1226.414626] lo_ioctl+0x11a6/0x1cd0 [ 1226.418253] ? loop_set_status64+0xe0/0xe0 [ 1226.422491] blkdev_ioctl+0x540/0x1830 [ 1226.426378] ? blkpg_ioctl+0x8d0/0x8d0 [ 1226.430271] ? trace_hardirqs_on+0x10/0x10 [ 1226.434512] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1226.439615] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1226.444635] block_ioctl+0xd9/0x120 [ 1226.448262] ? blkdev_fallocate+0x3a0/0x3a0 [ 1226.452580] do_vfs_ioctl+0x75a/0xff0 [ 1226.456382] ? lock_acquire+0x170/0x3f0 [ 1226.460355] ? ioctl_preallocate+0x1a0/0x1a0 [ 1226.464762] ? __fget+0x265/0x3e0 [ 1226.468211] ? do_vfs_ioctl+0xff0/0xff0 [ 1226.472193] ? security_file_ioctl+0x83/0xb0 [ 1226.476600] SyS_ioctl+0x7f/0xb0 [ 1226.479962] ? do_vfs_ioctl+0xff0/0xff0 [ 1226.483935] do_syscall_64+0x1d5/0x640 [ 1226.487833] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1226.493032] RIP: 0033:0x7fe33b68cec7 [ 1226.496727] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:54:23 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (fail_nth: 2) [ 1226.504431] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1226.511688] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1226.518968] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1226.526311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1226.533559] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1226.546985] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:24 executing program 2: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x6, 0x3f}, 0x8) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x1, 0x0) (async) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) (async) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0x40, 0x8001}, &(0x7f0000000180)=0x8) (async) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000240)={'\x00', 0x8001, 0x1, 0x2}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x81}, 0x8) (async) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0xf800, 0x4, 0x2, 0x120, 0x7, 0x5, 0x10000, 0xffffffff, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000100)={r4, 0x7f}, 0x8) (async, rerun: 64) r5 = syz_open_dev$sndpcmp(&(0x7f00000002c0), 0x100000001, 0xc4000) (rerun: 64) ioctl$SNDRV_PCM_IOCTL_UNLINK(r5, 0x4161, 0x0) (async) read$snddsp(r0, 0x0, 0x0) 06:54:24 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) 06:54:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 28) 06:54:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 20) 06:54:24 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x8, 0x9, 0x1, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:24 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) 06:54:24 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x0, 0x9, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:24 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 06:54:24 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) (async) keyctl$join(0x1, 0x0) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) (async) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) (async) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) [ 1226.820748] FAULT_INJECTION: forcing a failure. [ 1226.820748] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.857966] CPU: 1 PID: 27309 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 06:54:24 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) syz_open_dev$sndpcmp(&(0x7f0000000000), 0x400, 0x3a1080) 06:54:24 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) open$dir(&(0x7f0000000300)='./file0\x00', 0x20102, 0x49) [ 1226.865873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.875234] Call Trace: [ 1226.877829] dump_stack+0x1b2/0x281 [ 1226.881458] should_fail.cold+0x10a/0x149 [ 1226.885606] should_failslab+0xd6/0x130 [ 1226.889581] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1226.894699] __kmalloc_node_track_caller+0x38/0x70 [ 1226.899628] __alloc_skb+0x96/0x510 [ 1226.903258] kobject_uevent_env+0x882/0xf30 [ 1226.907588] lo_ioctl+0x11a6/0x1cd0 [ 1226.911224] ? loop_set_status64+0xe0/0xe0 [ 1226.915462] blkdev_ioctl+0x540/0x1830 06:54:24 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) 06:54:24 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) (async) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) socket$pppl2tp(0x18, 0x1, 0x1) (async) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) open$dir(&(0x7f0000000300)='./file0\x00', 0x20102, 0x49) [ 1226.919344] ? blkpg_ioctl+0x8d0/0x8d0 [ 1226.923228] ? trace_hardirqs_on+0x10/0x10 [ 1226.927466] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1226.932565] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1226.937589] block_ioctl+0xd9/0x120 [ 1226.941219] ? blkdev_fallocate+0x3a0/0x3a0 [ 1226.945546] do_vfs_ioctl+0x75a/0xff0 [ 1226.949345] ? lock_acquire+0x170/0x3f0 [ 1226.953328] ? ioctl_preallocate+0x1a0/0x1a0 [ 1226.957741] ? __fget+0x265/0x3e0 [ 1226.961223] ? do_vfs_ioctl+0xff0/0xff0 [ 1226.965197] ? security_file_ioctl+0x83/0xb0 06:54:24 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) [ 1226.969611] SyS_ioctl+0x7f/0xb0 [ 1226.972973] ? do_vfs_ioctl+0xff0/0xff0 [ 1226.976949] do_syscall_64+0x1d5/0x640 [ 1226.980845] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1226.986117] RIP: 0033:0x7f10c0393ec7 [ 1226.989820] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1226.997526] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1227.004795] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1227.012063] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1227.019333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1227.026635] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1227.043904] FAULT_INJECTION: forcing a failure. [ 1227.043904] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.047247] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1227.065655] CPU: 0 PID: 27315 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1227.073667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.083063] Call Trace: [ 1227.085634] dump_stack+0x1b2/0x281 [ 1227.089243] should_fail.cold+0x10a/0x149 [ 1227.093373] should_failslab+0xd6/0x130 [ 1227.097325] kmem_cache_alloc_node+0x263/0x410 [ 1227.101885] __alloc_skb+0x5c/0x510 [ 1227.105489] kobject_uevent_env+0x882/0xf30 [ 1227.109802] lo_ioctl+0x11a6/0x1cd0 [ 1227.113501] ? loop_set_status64+0xe0/0xe0 [ 1227.117712] blkdev_ioctl+0x540/0x1830 [ 1227.121682] ? blkpg_ioctl+0x8d0/0x8d0 [ 1227.125556] ? trace_hardirqs_on+0x10/0x10 [ 1227.129784] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1227.134875] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1227.139976] block_ioctl+0xd9/0x120 [ 1227.143651] ? blkdev_fallocate+0x3a0/0x3a0 [ 1227.147963] do_vfs_ioctl+0x75a/0xff0 [ 1227.151747] ? lock_acquire+0x170/0x3f0 [ 1227.155717] ? ioctl_preallocate+0x1a0/0x1a0 [ 1227.160110] ? __fget+0x265/0x3e0 [ 1227.163544] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.167506] ? security_file_ioctl+0x83/0xb0 [ 1227.171978] SyS_ioctl+0x7f/0xb0 [ 1227.175336] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.179287] do_syscall_64+0x1d5/0x640 [ 1227.183179] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1227.188348] RIP: 0033:0x7fe33b68cec7 [ 1227.192033] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1227.199716] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1227.206962] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1227.214296] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 06:54:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 29) [ 1227.221547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1227.228793] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1227.251691] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1227.280895] FAULT_INJECTION: forcing a failure. [ 1227.280895] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.292552] CPU: 0 PID: 27351 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1227.300432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.309769] Call Trace: [ 1227.312396] dump_stack+0x1b2/0x281 [ 1227.316017] should_fail.cold+0x10a/0x149 [ 1227.320152] should_failslab+0xd6/0x130 [ 1227.324121] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1227.329217] __kmalloc_node_track_caller+0x38/0x70 [ 1227.334216] __alloc_skb+0x96/0x510 [ 1227.337831] kobject_uevent_env+0x882/0xf30 [ 1227.342140] lo_ioctl+0x11a6/0x1cd0 [ 1227.345748] ? loop_set_status64+0xe0/0xe0 [ 1227.350049] blkdev_ioctl+0x540/0x1830 [ 1227.353921] ? blkpg_ioctl+0x8d0/0x8d0 [ 1227.357793] ? trace_hardirqs_on+0x10/0x10 [ 1227.362111] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1227.367327] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1227.372452] block_ioctl+0xd9/0x120 [ 1227.376070] ? blkdev_fallocate+0x3a0/0x3a0 [ 1227.380380] do_vfs_ioctl+0x75a/0xff0 [ 1227.384169] ? lock_acquire+0x170/0x3f0 [ 1227.388125] ? ioctl_preallocate+0x1a0/0x1a0 [ 1227.392525] ? __fget+0x265/0x3e0 [ 1227.395960] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.399918] ? security_file_ioctl+0x83/0xb0 [ 1227.404308] SyS_ioctl+0x7f/0xb0 [ 1227.407653] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.411624] do_syscall_64+0x1d5/0x640 [ 1227.415494] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1227.420665] RIP: 0033:0x7f10c0393ec7 06:54:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 21) 06:54:24 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) open$dir(&(0x7f0000000300)='./file0\x00', 0x20102, 0x49) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) (async) syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) (async) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) (async) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) socket$pppl2tp(0x18, 0x1, 0x1) (async) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) (async) open$dir(&(0x7f0000000300)='./file0\x00', 0x20102, 0x49) (async) 06:54:24 executing program 4: ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) 06:54:24 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) (async) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) (async) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) (async) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) 06:54:24 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x0, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) [ 1227.424352] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1227.432033] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1227.439287] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1227.446533] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1227.453786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1227.461035] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1227.471785] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 30) 06:54:24 executing program 4: ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) 06:54:24 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:24 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_THP_DISABLE(0x29, 0x1) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:24 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x8000000000000000, 0x40000) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x12140, 0x0) epoll_pwait(r1, &(0x7f0000000140), 0x0, 0xfffffffe, &(0x7f0000000040)={[0x400000000009]}, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x800) statx(r1, &(0x7f0000000000)='./file0\x00', 0x1000, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) [ 1227.545420] FAULT_INJECTION: forcing a failure. [ 1227.545420] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.581938] CPU: 1 PID: 27363 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 06:54:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:25 executing program 4: ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) [ 1227.589850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.599341] Call Trace: [ 1227.601931] dump_stack+0x1b2/0x281 [ 1227.605572] should_fail.cold+0x10a/0x149 [ 1227.609756] should_failslab+0xd6/0x130 [ 1227.613732] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1227.618399] ? dev_uevent_filter+0xd0/0xd0 [ 1227.622646] kobject_uevent_env+0x20c/0xf30 [ 1227.626971] ? internal_create_group+0x48f/0x710 [ 1227.631730] lo_ioctl+0x11a6/0x1cd0 [ 1227.635361] ? loop_set_status64+0xe0/0xe0 [ 1227.639599] blkdev_ioctl+0x540/0x1830 [ 1227.643487] ? blkpg_ioctl+0x8d0/0x8d0 [ 1227.647371] ? trace_hardirqs_on+0x10/0x10 [ 1227.651613] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1227.656711] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1227.661728] block_ioctl+0xd9/0x120 [ 1227.665361] ? blkdev_fallocate+0x3a0/0x3a0 [ 1227.668000] FAULT_INJECTION: forcing a failure. [ 1227.668000] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.669705] do_vfs_ioctl+0x75a/0xff0 [ 1227.669716] ? lock_acquire+0x170/0x3f0 [ 1227.669730] ? ioctl_preallocate+0x1a0/0x1a0 [ 1227.693082] ? __fget+0x265/0x3e0 [ 1227.696524] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.700482] ? security_file_ioctl+0x83/0xb0 [ 1227.704873] SyS_ioctl+0x7f/0xb0 [ 1227.708221] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.712202] do_syscall_64+0x1d5/0x640 [ 1227.716074] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1227.721265] RIP: 0033:0x7fe33b68cec7 [ 1227.724957] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1227.732650] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1227.739911] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1227.747168] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1227.754424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1227.761674] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1227.768938] CPU: 0 PID: 27385 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1227.776818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.779738] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1227.786161] Call Trace: [ 1227.786177] dump_stack+0x1b2/0x281 [ 1227.786191] should_fail.cold+0x10a/0x149 [ 1227.786203] should_failslab+0xd6/0x130 [ 1227.786216] kmem_cache_alloc_node+0x263/0x410 [ 1227.786228] __alloc_skb+0x5c/0x510 [ 1227.814262] kobject_uevent_env+0x882/0xf30 [ 1227.818574] lo_ioctl+0x11a6/0x1cd0 [ 1227.822208] ? loop_set_status64+0xe0/0xe0 [ 1227.826423] blkdev_ioctl+0x540/0x1830 [ 1227.830298] ? blkpg_ioctl+0x8d0/0x8d0 [ 1227.834162] ? trace_hardirqs_on+0x10/0x10 [ 1227.838374] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1227.843542] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1227.848559] block_ioctl+0xd9/0x120 [ 1227.852162] ? blkdev_fallocate+0x3a0/0x3a0 [ 1227.856468] do_vfs_ioctl+0x75a/0xff0 [ 1227.860250] ? lock_acquire+0x170/0x3f0 [ 1227.864203] ? ioctl_preallocate+0x1a0/0x1a0 [ 1227.868592] ? __fget+0x265/0x3e0 [ 1227.872023] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.876066] ? security_file_ioctl+0x83/0xb0 [ 1227.880458] SyS_ioctl+0x7f/0xb0 [ 1227.883803] ? do_vfs_ioctl+0xff0/0xff0 [ 1227.887754] do_syscall_64+0x1d5/0x640 [ 1227.891623] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1227.896791] RIP: 0033:0x7f10c0393ec7 [ 1227.900479] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1227.908165] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1227.915412] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1227.922661] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1227.929908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1227.937155] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 22) 06:54:25 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x8000000000000000, 0x40000) read$snddsp(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x12140, 0x0) epoll_pwait(r1, &(0x7f0000000140), 0x0, 0xfffffffe, &(0x7f0000000040)={[0x400000000009]}, 0x2) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x800) statx(r1, &(0x7f0000000000)='./file0\x00', 0x1000, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) 06:54:25 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) 06:54:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) prctl$PR_SET_THP_DISABLE(0x29, 0x1) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) 06:54:25 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], '\x00', 0x80000000}) 06:54:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 31) [ 1227.947153] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:25 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) 06:54:25 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000180)={0x0, [[0x7], [0x9], [0x6]], '\x00', [{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}]}) 06:54:25 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x8000000000000000, 0x40000) read$snddsp(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x12140, 0x0) epoll_pwait(r1, &(0x7f0000000140), 0x0, 0xfffffffe, &(0x7f0000000040)={[0x400000000009]}, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x800) (async) statx(r1, &(0x7f0000000000)='./file0\x00', 0x1000, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) 06:54:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000180)) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$search(0xa, r2, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000001c0)='user\x00', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)='\x00') epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_RESUME(r4, 0x4147, 0x0) 06:54:25 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) [ 1228.049273] FAULT_INJECTION: forcing a failure. [ 1228.049273] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.084806] CPU: 1 PID: 27415 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 06:54:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000180)) (async) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) (async) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$search(0xa, r2, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) (async) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000001c0)='user\x00', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)='\x00') (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_RESUME(r4, 0x4147, 0x0) [ 1228.092717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.102070] Call Trace: [ 1228.104664] dump_stack+0x1b2/0x281 [ 1228.108302] should_fail.cold+0x10a/0x149 [ 1228.112452] should_failslab+0xd6/0x130 [ 1228.116425] kmem_cache_alloc_node+0x263/0x410 [ 1228.121009] __alloc_skb+0x5c/0x510 [ 1228.124637] kobject_uevent_env+0x882/0xf30 [ 1228.128969] lo_ioctl+0x11a6/0x1cd0 [ 1228.132601] ? loop_set_status64+0xe0/0xe0 [ 1228.136840] blkdev_ioctl+0x540/0x1830 [ 1228.140735] ? blkpg_ioctl+0x8d0/0x8d0 [ 1228.144627] ? trace_hardirqs_on+0x10/0x10 [ 1228.148869] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1228.153963] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1228.158962] block_ioctl+0xd9/0x120 [ 1228.162577] ? blkdev_fallocate+0x3a0/0x3a0 [ 1228.166886] do_vfs_ioctl+0x75a/0xff0 [ 1228.170680] ? lock_acquire+0x170/0x3f0 [ 1228.174724] ? ioctl_preallocate+0x1a0/0x1a0 [ 1228.179111] ? __fget+0x265/0x3e0 [ 1228.182551] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.186521] ? security_file_ioctl+0x83/0xb0 [ 1228.190908] SyS_ioctl+0x7f/0xb0 [ 1228.194252] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.198203] do_syscall_64+0x1d5/0x640 [ 1228.202084] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1228.207274] RIP: 0033:0x7fe33b68cec7 [ 1228.210960] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1228.218645] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1228.225917] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1228.233176] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1228.240422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1228.247675] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1228.257915] FAULT_INJECTION: forcing a failure. [ 1228.257915] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.258664] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1228.275849] CPU: 1 PID: 27423 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1228.283733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.293080] Call Trace: [ 1228.295668] dump_stack+0x1b2/0x281 [ 1228.299288] should_fail.cold+0x10a/0x149 [ 1228.303415] should_failslab+0xd6/0x130 [ 1228.307369] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1228.312458] __kmalloc_node_track_caller+0x38/0x70 [ 1228.317385] __alloc_skb+0x96/0x510 [ 1228.320991] kobject_uevent_env+0x882/0xf30 [ 1228.325305] lo_ioctl+0x11a6/0x1cd0 [ 1228.328909] ? loop_set_status64+0xe0/0xe0 [ 1228.333131] blkdev_ioctl+0x540/0x1830 [ 1228.337013] ? blkpg_ioctl+0x8d0/0x8d0 [ 1228.340879] ? trace_hardirqs_on+0x10/0x10 [ 1228.345092] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1228.350168] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1228.355173] block_ioctl+0xd9/0x120 [ 1228.358776] ? blkdev_fallocate+0x3a0/0x3a0 [ 1228.363074] do_vfs_ioctl+0x75a/0xff0 [ 1228.366851] ? lock_acquire+0x170/0x3f0 [ 1228.370798] ? ioctl_preallocate+0x1a0/0x1a0 [ 1228.375190] ? __fget+0x265/0x3e0 [ 1228.378624] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.382577] ? security_file_ioctl+0x83/0xb0 [ 1228.386982] SyS_ioctl+0x7f/0xb0 [ 1228.390354] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.394311] do_syscall_64+0x1d5/0x640 [ 1228.398186] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1228.403352] RIP: 0033:0x7f10c0393ec7 [ 1228.407035] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1228.414720] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1228.421967] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1228.429210] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1228.436456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1228.443713] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 23) 06:54:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000180)) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$search(0xa, r2, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000001c0)='user\x00', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)='\x00') epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_RESUME(r4, 0x4147, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000180)) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) (async) add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) (async) keyctl$search(0xa, r2, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) (async) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000001c0)='user\x00', 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)='\x00') (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) (async) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_RESUME(r4, 0x4147, 0x0) (async) 06:54:25 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) 06:54:25 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x186c, 0x420081) ioctl$SNDRV_PCM_IOCTL_DRAIN(r1, 0x4144, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_RESUME(r2, 0x4147, 0x0) 06:54:25 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) open$dir(&(0x7f0000000300)='./file0\x00', 0x20102, 0x49) 06:54:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 32) [ 1228.470445] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:25 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) 06:54:25 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x186c, 0x420081) ioctl$SNDRV_PCM_IOCTL_DRAIN(r1, 0x4144, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_RESUME(r2, 0x4147, 0x0) 06:54:25 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) open$dir(&(0x7f0000000300)='./file0\x00', 0x20102, 0x49) 06:54:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x0, 0x0, @auto=[0x31, 0x24, 0x14]}, 0xb, 0x0) [ 1228.539772] FAULT_INJECTION: forcing a failure. [ 1228.539772] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.564794] CPU: 1 PID: 27456 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1228.572702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.582050] Call Trace: [ 1228.584653] dump_stack+0x1b2/0x281 06:54:26 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x186c, 0x420081) ioctl$SNDRV_PCM_IOCTL_DRAIN(r1, 0x4144, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f00000000c0)=0x8) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_RESUME(r2, 0x4147, 0x0) 06:54:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x0, 0x0, @auto=[0x31, 0x24, 0x14]}, 0xb, 0x0) [ 1228.588392] should_fail.cold+0x10a/0x149 [ 1228.592547] should_failslab+0xd6/0x130 [ 1228.596639] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1228.601751] __kmalloc_node_track_caller+0x38/0x70 [ 1228.606683] __alloc_skb+0x96/0x510 [ 1228.610316] kobject_uevent_env+0x882/0xf30 [ 1228.614666] lo_ioctl+0x11a6/0x1cd0 [ 1228.618303] ? loop_set_status64+0xe0/0xe0 [ 1228.622724] blkdev_ioctl+0x540/0x1830 [ 1228.626616] ? blkpg_ioctl+0x8d0/0x8d0 [ 1228.630504] ? trace_hardirqs_on+0x10/0x10 [ 1228.634751] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1228.639858] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1228.644875] block_ioctl+0xd9/0x120 [ 1228.648499] ? blkdev_fallocate+0x3a0/0x3a0 [ 1228.652947] do_vfs_ioctl+0x75a/0xff0 [ 1228.656752] ? lock_acquire+0x170/0x3f0 [ 1228.660710] ? ioctl_preallocate+0x1a0/0x1a0 [ 1228.665102] ? __fget+0x265/0x3e0 [ 1228.668537] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.672518] ? security_file_ioctl+0x83/0xb0 [ 1228.676910] SyS_ioctl+0x7f/0xb0 [ 1228.680260] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.684227] do_syscall_64+0x1d5/0x640 [ 1228.688094] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1228.693265] RIP: 0033:0x7fe33b68cec7 [ 1228.696966] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1228.704653] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1228.712006] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1228.719263] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1228.726618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1228.733876] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1228.748209] FAULT_INJECTION: forcing a failure. [ 1228.748209] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.767797] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1228.768986] CPU: 1 PID: 27466 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1228.781327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.790687] Call Trace: [ 1228.793262] dump_stack+0x1b2/0x281 [ 1228.796870] should_fail.cold+0x10a/0x149 [ 1228.801007] should_failslab+0xd6/0x130 [ 1228.804992] kmem_cache_alloc_node+0x263/0x410 [ 1228.809650] __alloc_skb+0x5c/0x510 [ 1228.813259] kobject_uevent_env+0x882/0xf30 [ 1228.817563] lo_ioctl+0x11a6/0x1cd0 [ 1228.821171] ? loop_set_status64+0xe0/0xe0 [ 1228.825385] blkdev_ioctl+0x540/0x1830 [ 1228.829256] ? blkpg_ioctl+0x8d0/0x8d0 [ 1228.833124] ? trace_hardirqs_on+0x10/0x10 [ 1228.837360] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1228.842469] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1228.847469] block_ioctl+0xd9/0x120 [ 1228.851075] ? blkdev_fallocate+0x3a0/0x3a0 [ 1228.855380] do_vfs_ioctl+0x75a/0xff0 [ 1228.859173] ? lock_acquire+0x170/0x3f0 [ 1228.863134] ? ioctl_preallocate+0x1a0/0x1a0 [ 1228.867528] ? __fget+0x265/0x3e0 [ 1228.870969] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.874951] ? security_file_ioctl+0x83/0xb0 [ 1228.879339] SyS_ioctl+0x7f/0xb0 [ 1228.882683] ? do_vfs_ioctl+0xff0/0xff0 [ 1228.886641] do_syscall_64+0x1d5/0x640 [ 1228.890544] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1228.895719] RIP: 0033:0x7f10c0393ec7 [ 1228.899427] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1228.907115] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1228.914365] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1228.921627] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1228.928877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 06:54:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 24) 06:54:26 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x0, 0x0, @auto=[0x31, 0x24, 0x14]}, 0xb, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x0, 0x0, @auto=[0x31, 0x24, 0x14]}, 0xb, 0x0) (async) 06:54:26 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x8, 0x200000) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:26 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) open$dir(&(0x7f0000000300)='./file0\x00', 0x20102, 0x49) 06:54:26 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000040)={0x0, &(0x7f0000000340)="543948392371ef6e568dbd976035f8a6cf944855aa6b27a484b65f798eda3e125bb5114ad44a5aaaa10bbb8c2f83c186ea0e4d303c9c80f6bfe5bcada687eb5badee849c3d3e66adee05afe43a631cd736c596616ce0fe85fe483450d614a9dadf6f0992b60f9e21992eb33c2f67b94254eddfff2ab1e67034bb6439754f5e9bf742339db82d25529efb566d3a79d2ac58768cfc4507b445fa0c23", 0x9b}) [ 1228.936123] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1228.953832] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 33) 06:54:26 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x8, 0x200000) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) (async) read$snddsp(r0, 0x0, 0x0) 06:54:26 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, 0x0) [ 1229.051638] FAULT_INJECTION: forcing a failure. [ 1229.051638] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.063890] CPU: 0 PID: 27505 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1229.071786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.081136] Call Trace: [ 1229.083727] dump_stack+0x1b2/0x281 [ 1229.087348] should_fail.cold+0x10a/0x149 [ 1229.091475] should_failslab+0xd6/0x130 [ 1229.095447] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1229.100532] __kmalloc_node_track_caller+0x38/0x70 [ 1229.105446] __alloc_skb+0x96/0x510 [ 1229.109071] kobject_uevent_env+0x882/0xf30 [ 1229.113375] lo_ioctl+0x11a6/0x1cd0 [ 1229.116980] ? loop_set_status64+0xe0/0xe0 [ 1229.121198] blkdev_ioctl+0x540/0x1830 [ 1229.125062] ? blkpg_ioctl+0x8d0/0x8d0 [ 1229.128926] ? trace_hardirqs_on+0x10/0x10 [ 1229.133143] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1229.138230] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1229.143269] block_ioctl+0xd9/0x120 [ 1229.146874] ? blkdev_fallocate+0x3a0/0x3a0 [ 1229.151179] do_vfs_ioctl+0x75a/0xff0 [ 1229.154974] ? lock_acquire+0x170/0x3f0 [ 1229.158944] ? ioctl_preallocate+0x1a0/0x1a0 [ 1229.163347] ? __fget+0x265/0x3e0 [ 1229.166783] ? do_vfs_ioctl+0xff0/0xff0 [ 1229.170753] ? security_file_ioctl+0x83/0xb0 [ 1229.175139] SyS_ioctl+0x7f/0xb0 [ 1229.178483] ? do_vfs_ioctl+0xff0/0xff0 [ 1229.182442] do_syscall_64+0x1d5/0x640 [ 1229.186409] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1229.191618] RIP: 0033:0x7fe33b68cec7 [ 1229.195413] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1229.203115] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1229.210372] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1229.217627] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1229.224876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1229.232131] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1229.243355] FAULT_INJECTION: forcing a failure. 06:54:26 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x8, 0x200000) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:26 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) 06:54:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) 06:54:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x942, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1229.243355] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.257818] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1229.267392] CPU: 0 PID: 27506 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1229.275291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.284640] Call Trace: [ 1229.287230] dump_stack+0x1b2/0x281 [ 1229.290859] should_fail.cold+0x10a/0x149 [ 1229.295012] should_failslab+0xd6/0x130 [ 1229.298989] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1229.304189] __kmalloc_node_track_caller+0x38/0x70 [ 1229.309123] __alloc_skb+0x96/0x510 [ 1229.312759] kobject_uevent_env+0x882/0xf30 [ 1229.317090] lo_ioctl+0x11a6/0x1cd0 [ 1229.320723] ? loop_set_status64+0xe0/0xe0 [ 1229.324965] blkdev_ioctl+0x540/0x1830 [ 1229.328860] ? blkpg_ioctl+0x8d0/0x8d0 [ 1229.332753] ? trace_hardirqs_on+0x10/0x10 [ 1229.336991] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1229.342088] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1229.347220] block_ioctl+0xd9/0x120 [ 1229.350832] ? blkdev_fallocate+0x3a0/0x3a0 [ 1229.355135] do_vfs_ioctl+0x75a/0xff0 [ 1229.358921] ? lock_acquire+0x170/0x3f0 [ 1229.362884] ? ioctl_preallocate+0x1a0/0x1a0 [ 1229.367274] ? __fget+0x265/0x3e0 [ 1229.370707] ? do_vfs_ioctl+0xff0/0xff0 [ 1229.374690] ? security_file_ioctl+0x83/0xb0 [ 1229.379077] SyS_ioctl+0x7f/0xb0 [ 1229.382421] ? do_vfs_ioctl+0xff0/0xff0 [ 1229.386394] do_syscall_64+0x1d5/0x640 [ 1229.390266] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1229.395442] RIP: 0033:0x7f10c0393ec7 [ 1229.399139] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1229.406836] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 [ 1229.414087] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1229.421342] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1229.428602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1229.435867] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 25) 06:54:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) 06:54:26 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) 06:54:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x942, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:26 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) mknodat(r0, &(0x7f0000000200)='./file0\x00', 0x8, 0x5) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x2b}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x6f4, "abc8e52bc833e87666ab387d76c6a5af1c5398758c818da90c1050888b169865"}) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0), 0x0, 0x105102) read$snddsp(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r3, 0xc2604111, &(0x7f0000000240)={0x7, [[0x5, 0x8, 0x5, 0x5, 0x400, 0x7fffffff, 0xffffffff, 0x3ff], [0x3, 0x20, 0x8001, 0xbb, 0x100, 0x2, 0x9, 0x5], [0x2, 0x40, 0xb80, 0x9, 0x93ca, 0xff, 0x5, 0x80000001]], '\x00', [{0x80, 0x1, 0x1, 0x1}, {0x4ac, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x100, 0x1, 0x1, 0x1, 0x1, 0x1}, {0xffffff63, 0xffffffc1, 0x0, 0x1}, {0xffff, 0x51, 0x1, 0x1, 0x0, 0x1}, {0x7f, 0x8, 0x1, 0x1, 0x1, 0x1}, {0xe5ff, 0x6, 0x0, 0x1, 0x1}, {0x5, 0x6}, {0xe22, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x20, 0x200, 0x1, 0x0, 0x1, 0x1}, {0x8001, 0x2, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1, 0x0, 0x1}]}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000140), 0x7, 0x304300) ioctl$SNDRV_PCM_IOCTL_STATUS32(r4, 0x806c4120, &(0x7f0000000180)) [ 1229.448643] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 34) 06:54:26 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 64) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) mknodat(r0, &(0x7f0000000200)='./file0\x00', 0x8, 0x5) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 64) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x2b}) (async, rerun: 64) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x6f4, "abc8e52bc833e87666ab387d76c6a5af1c5398758c818da90c1050888b169865"}) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0), 0x0, 0x105102) read$snddsp(r2, 0x0, 0x0) (async, rerun: 64) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 64) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) (async, rerun: 32) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 32) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r3, 0xc2604111, &(0x7f0000000240)={0x7, [[0x5, 0x8, 0x5, 0x5, 0x400, 0x7fffffff, 0xffffffff, 0x3ff], [0x3, 0x20, 0x8001, 0xbb, 0x100, 0x2, 0x9, 0x5], [0x2, 0x40, 0xb80, 0x9, 0x93ca, 0xff, 0x5, 0x80000001]], '\x00', [{0x80, 0x1, 0x1, 0x1}, {0x4ac, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x100, 0x1, 0x1, 0x1, 0x1, 0x1}, {0xffffff63, 0xffffffc1, 0x0, 0x1}, {0xffff, 0x51, 0x1, 0x1, 0x0, 0x1}, {0x7f, 0x8, 0x1, 0x1, 0x1, 0x1}, {0xe5ff, 0x6, 0x0, 0x1, 0x1}, {0x5, 0x6}, {0xe22, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x20, 0x200, 0x1, 0x0, 0x1, 0x1}, {0x8001, 0x2, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1, 0x0, 0x1}]}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000140), 0x7, 0x304300) ioctl$SNDRV_PCM_IOCTL_STATUS32(r4, 0x806c4120, &(0x7f0000000180)) 06:54:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x942, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:26 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) 06:54:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) [ 1229.545516] FAULT_INJECTION: forcing a failure. [ 1229.545516] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.559557] FAULT_INJECTION: forcing a failure. [ 1229.559557] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.582179] CPU: 0 PID: 27542 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 06:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)={0x1, 0x0, @d}, 0x18, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) [ 1229.590090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.599446] Call Trace: [ 1229.602044] dump_stack+0x1b2/0x281 [ 1229.605684] should_fail.cold+0x10a/0x149 [ 1229.609841] should_failslab+0xd6/0x130 [ 1229.613817] kmem_cache_alloc+0x28e/0x3c0 [ 1229.617970] getname_flags+0xc8/0x550 [ 1229.621775] SyS_mkdirat+0x83/0x270 [ 1229.625411] ? SyS_mknod+0x30/0x30 [ 1229.628946] ? fput_many+0xe/0x140 [ 1229.632484] ? do_syscall_64+0x4c/0x640 [ 1229.636457] ? SyS_mknod+0x30/0x30 [ 1229.639998] do_syscall_64+0x1d5/0x640 [ 1229.643894] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1229.649177] RIP: 0033:0x7f10c0393217 [ 1229.652990] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1229.660695] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1229.667949] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1229.675200] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1229.682455] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1229.689705] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1229.704733] CPU: 0 PID: 27543 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1229.712632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.721969] Call Trace: [ 1229.724547] dump_stack+0x1b2/0x281 [ 1229.728157] should_fail.cold+0x10a/0x149 [ 1229.732289] should_failslab+0xd6/0x130 [ 1229.736271] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1229.741355] __kmalloc_node_track_caller+0x38/0x70 [ 1229.746285] __alloc_skb+0x96/0x510 [ 1229.749896] kobject_uevent_env+0x882/0xf30 [ 1229.754217] lo_ioctl+0x11a6/0x1cd0 [ 1229.757834] ? loop_set_status64+0xe0/0xe0 [ 1229.762066] blkdev_ioctl+0x540/0x1830 [ 1229.765946] ? blkpg_ioctl+0x8d0/0x8d0 [ 1229.769817] ? trace_hardirqs_on+0x10/0x10 [ 1229.774036] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1229.779123] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1229.784243] block_ioctl+0xd9/0x120 [ 1229.787857] ? blkdev_fallocate+0x3a0/0x3a0 [ 1229.792189] do_vfs_ioctl+0x75a/0xff0 [ 1229.795979] ? lock_acquire+0x170/0x3f0 [ 1229.799950] ? ioctl_preallocate+0x1a0/0x1a0 [ 1229.804442] ? __fget+0x265/0x3e0 [ 1229.807896] ? do_vfs_ioctl+0xff0/0xff0 [ 1229.811857] ? security_file_ioctl+0x83/0xb0 [ 1229.816337] SyS_ioctl+0x7f/0xb0 [ 1229.819693] ? do_vfs_ioctl+0xff0/0xff0 [ 1229.823665] do_syscall_64+0x1d5/0x640 [ 1229.827549] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1229.833019] RIP: 0033:0x7fe33b68cec7 [ 1229.836763] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1229.844453] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1229.851704] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1229.858954] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1229.866203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1229.873450] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 06:54:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 26) 06:54:27 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000007c0)={'batadv_slave_0\x00', 0x7}) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000480)={0x2, [[0x3, 0x7, 0x8000, 0x1f, 0x3, 0x5, 0xfffffe00, 0x793], [0xac9, 0x7f, 0x400, 0x0, 0x9, 0xe8a4, 0x1bd, 0x2b], [0x1, 0x20, 0xffffffff, 0x7ff, 0x12, 0x81, 0x1d, 0x7]], '\x00', [{0x43a, 0x0, 0x1}, {0x7, 0x200, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x1, 0x0, 0x1}, {0x2, 0x40000, 0x0, 0x0, 0x1}, {0x4, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x8f9, 0x7ff, 0x1, 0x0, 0x1}, {0x8, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xffff8069, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}], '\x00', 0x6}) 06:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)={0x1, 0x0, @d}, 0x18, r2) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r3, 0x806c4120, &(0x7f0000000740)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) 06:54:27 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) mknodat(r0, &(0x7f0000000200)='./file0\x00', 0x8, 0x5) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x2b}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x6f4, "abc8e52bc833e87666ab387d76c6a5af1c5398758c818da90c1050888b169865"}) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0), 0x0, 0x105102) read$snddsp(r2, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r3, 0xc2604111, &(0x7f0000000240)={0x7, [[0x5, 0x8, 0x5, 0x5, 0x400, 0x7fffffff, 0xffffffff, 0x3ff], [0x3, 0x20, 0x8001, 0xbb, 0x100, 0x2, 0x9, 0x5], [0x2, 0x40, 0xb80, 0x9, 0x93ca, 0xff, 0x5, 0x80000001]], '\x00', [{0x80, 0x1, 0x1, 0x1}, {0x4ac, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x100, 0x1, 0x1, 0x1, 0x1, 0x1}, {0xffffff63, 0xffffffc1, 0x0, 0x1}, {0xffff, 0x51, 0x1, 0x1, 0x0, 0x1}, {0x7f, 0x8, 0x1, 0x1, 0x1, 0x1}, {0xe5ff, 0x6, 0x0, 0x1, 0x1}, {0x5, 0x6}, {0xe22, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x20, 0x200, 0x1, 0x0, 0x1, 0x1}, {0x8001, 0x2, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1, 0x0, 0x1}]}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000140), 0x7, 0x304300) ioctl$SNDRV_PCM_IOCTL_STATUS32(r4, 0x806c4120, &(0x7f0000000180)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) (async) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) mknodat(r0, &(0x7f0000000200)='./file0\x00', 0x8, 0x5) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x2b}) (async) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000040)={0x6f4, "abc8e52bc833e87666ab387d76c6a5af1c5398758c818da90c1050888b169865"}) (async) syz_open_dev$sndpcmc(&(0x7f00000000c0), 0x0, 0x105102) (async) read$snddsp(r2, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) (async) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r3, 0xc2604111, &(0x7f0000000240)={0x7, [[0x5, 0x8, 0x5, 0x5, 0x400, 0x7fffffff, 0xffffffff, 0x3ff], [0x3, 0x20, 0x8001, 0xbb, 0x100, 0x2, 0x9, 0x5], [0x2, 0x40, 0xb80, 0x9, 0x93ca, 0xff, 0x5, 0x80000001]], '\x00', [{0x80, 0x1, 0x1, 0x1}, {0x4ac, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x100, 0x1, 0x1, 0x1, 0x1, 0x1}, {0xffffff63, 0xffffffc1, 0x0, 0x1}, {0xffff, 0x51, 0x1, 0x1, 0x0, 0x1}, {0x7f, 0x8, 0x1, 0x1, 0x1, 0x1}, {0xe5ff, 0x6, 0x0, 0x1, 0x1}, {0x5, 0x6}, {0xe22, 0x80000001, 0x1, 0x1, 0x1, 0x1}, {0x20, 0x200, 0x1, 0x0, 0x1, 0x1}, {0x8001, 0x2, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1, 0x0, 0x1}]}) (async) syz_open_dev$sndpcmc(&(0x7f0000000140), 0x7, 0x304300) (async) ioctl$SNDRV_PCM_IOCTL_STATUS32(r4, 0x806c4120, &(0x7f0000000180)) (async) 06:54:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 35) [ 1229.892932] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f0000000740)) 06:54:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0xb) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x401, 0x20}, &(0x7f0000000040)=0xc) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000001200)={0x0, &(0x7f00000011c0)=[&(0x7f0000003340)="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", &(0x7f00000010c0)="c539f05090275def46799951d4a586a67601da8cb8a74b20f5cc0921d930a264011ef5926520db5f365cab19442ab9986c933a411ad02fe1c4aaa1749df6f711d0522de9e2582838de023bfff4059a64ffcf6ea27a7ecdda7408180a1cee4785abcc97db2be34fc39067b7544a7bc18c104fb6e14af1aba407abd110783c786c827901d11490d961367d5aa60d07e66854d6e7148b5b9e2e2816a5b9da5c442ed3674af92ec76e87603c72b9d6f2fc7e14e5c9550800a222db5af2392cfd090ad78ac18f83ba5086c4", &(0x7f00000000c0)="2cf1f01fb07cdaeb8b96159669b0a7367287974518fc907e63aa2d1b64408fa480016363075bdd59bdd184bf2d1f4fcd8cc37b7e35c5af5ece29f048a17a6cfbfe416fe370565a834f4fd188ec16ea533553804326d3306ddb8634879cc5ced04f2188a36470ac98a2e44200218bb74bfca68a2ef045255c6303e436f045ff942f2886b168d606960dd0f149ecdf2ee101720fd41641c2184f64cf36a31ca20e84188ed738534f773f3080a311b778bda8a8dcbce2ba259fa67f98a3e635360598b3cc8a06f4ae5f442c2031f197bc63980999b2af277e924405e3b3ed846649341ebfa18ec1924210e3fd099982835f2a80d86f157791504310ff55ec00000000000000"]}) [ 1229.979111] FAULT_INJECTION: forcing a failure. [ 1229.979111] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.005174] CPU: 0 PID: 27572 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1230.013087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.022452] Call Trace: [ 1230.025135] dump_stack+0x1b2/0x281 06:54:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0xb) (async, rerun: 64) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x401, 0x20}, &(0x7f0000000040)=0xc) (async, rerun: 64) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000001200)={0x0, &(0x7f00000011c0)=[&(0x7f0000003340)="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", &(0x7f00000010c0)="c539f05090275def46799951d4a586a67601da8cb8a74b20f5cc0921d930a264011ef5926520db5f365cab19442ab9986c933a411ad02fe1c4aaa1749df6f711d0522de9e2582838de023bfff4059a64ffcf6ea27a7ecdda7408180a1cee4785abcc97db2be34fc39067b7544a7bc18c104fb6e14af1aba407abd110783c786c827901d11490d961367d5aa60d07e66854d6e7148b5b9e2e2816a5b9da5c442ed3674af92ec76e87603c72b9d6f2fc7e14e5c9550800a222db5af2392cfd090ad78ac18f83ba5086c4", &(0x7f00000000c0)="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"]}) 06:54:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) 06:54:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) [ 1230.028767] should_fail.cold+0x10a/0x149 [ 1230.032928] should_failslab+0xd6/0x130 [ 1230.036918] kmem_cache_alloc_node+0x263/0x410 [ 1230.042287] __alloc_skb+0x5c/0x510 [ 1230.045918] kobject_uevent_env+0x882/0xf30 [ 1230.050244] lo_ioctl+0x11a6/0x1cd0 [ 1230.053882] ? loop_set_status64+0xe0/0xe0 [ 1230.058117] blkdev_ioctl+0x540/0x1830 [ 1230.062011] ? blkpg_ioctl+0x8d0/0x8d0 [ 1230.065898] ? trace_hardirqs_on+0x10/0x10 [ 1230.070142] ? _raw_spin_unlock_irqrestore+0x66/0xe0 06:54:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0xb) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x401, 0x20}, &(0x7f0000000040)=0xc) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000001200)={0x0, &(0x7f00000011c0)=[&(0x7f0000003340)="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", &(0x7f00000010c0)="c539f05090275def46799951d4a586a67601da8cb8a74b20f5cc0921d930a264011ef5926520db5f365cab19442ab9986c933a411ad02fe1c4aaa1749df6f711d0522de9e2582838de023bfff4059a64ffcf6ea27a7ecdda7408180a1cee4785abcc97db2be34fc39067b7544a7bc18c104fb6e14af1aba407abd110783c786c827901d11490d961367d5aa60d07e66854d6e7148b5b9e2e2816a5b9da5c442ed3674af92ec76e87603c72b9d6f2fc7e14e5c9550800a222db5af2392cfd090ad78ac18f83ba5086c4", &(0x7f00000000c0)="2cf1f01fb07cdaeb8b96159669b0a7367287974518fc907e63aa2d1b64408fa480016363075bdd59bdd184bf2d1f4fcd8cc37b7e35c5af5ece29f048a17a6cfbfe416fe370565a834f4fd188ec16ea533553804326d3306ddb8634879cc5ced04f2188a36470ac98a2e44200218bb74bfca68a2ef045255c6303e436f045ff942f2886b168d606960dd0f149ecdf2ee101720fd41641c2184f64cf36a31ca20e84188ed738534f773f3080a311b778bda8a8dcbce2ba259fa67f98a3e635360598b3cc8a06f4ae5f442c2031f197bc63980999b2af277e924405e3b3ed846649341ebfa18ec1924210e3fd099982835f2a80d86f157791504310ff55ec00000000000000"]}) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0xb) (async) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x401, 0x20}, &(0x7f0000000040)=0xc) (async) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000001200)={0x0, &(0x7f00000011c0)=[&(0x7f0000003340)="6430068291af2630defe76da49aefa05047cdbca5e878b64f633fe4517d76c93ef1952889388f3d32af3753bdc0c83f3b805bb48d5d2bc17bd938196e3996a6b05df08ba3f07f167ff0ccc788cf5b5ef6ba0efcaa32fb03d995285cdf37ba778b152eb1f7499db76a5578d72fdced709b2693bc1e9c5a1395da2af1a8110b103f8ba5e990e59f7379bd2068bc8545ed6554fcbf4e1653c03d5d2c4662a8865dd66764a5787d3add5866096f304c84b78d7373af13b0c64544c8ee8b550dd00f0398c2209a5d9f6a88d74e43431e6e0856ae93f149a706cf95e48089248638c7787bc8032fbc1105635e7a821af0e8d32ebfefc77ea9ebd6177398f2b09b80a6c5e7ea74cef85b156e6d7100923ae5ecedeeddaf4cfb60010154dff25ef9cacde1e2853da05b93111aea1b0382523d699ac36e4c40c3162c8949f227e3f36a8c4dcd0f8e957902d2b51c8df730e11550653ecbdaaea5ca943abec6c65d5a7af91d82e2bf51d1c2b98b2e4f32326964018173dd0a83f6202925169ce030340c217f334204e565eb035040a4e0e19c992d025b5d5e8d42d07da820b53f445463935def94a7d60605d6de8eaee9224f2cfa153c87f7cab5c72a0ee5bdca4fb0c7763dbea394b314557ff1e2f2bb41b70d323d3351f03ce776738723a831967caade8545b89f299fadc77cf9b7aed5c5d934aaaffeccbf4df53f2a34ec7d80ce9f41f9721a48f61b68b114751de45c64460241d8c9d0921b55602377b1e311f11232306eb48f4a860a5312c94f0aa1827938be369da47671eb340ef3b8397efa7431c0232e752c4a83a90663c4c804a6212758fccc5f77abda59c5df9245affaeb6b936596e4f5a108d884221c6b613cfacb30db4f9897da98122ccb12a0afa92292f326ac6633033362d85c7a5ab0f87347a1caf7df52112766ec885a132a7843598af2d7014f0c5945ee74f83e0eafa35a5d6cec4eead109ef6c06eb7e10ecc6b81f43fe8f41687d217f87ccdda73d3162acd16ac2210d37fb5a2cd49acc4cc74cbdd31ce2d5cc5ae020a78c54b6ec6a0033820506b57d5fdb14a9301a576c13af9c0f556739ea1b4da533a42cba05761cc57d213df9cc50bd79f2f072f22c73599b13f9642e2185ee3771caf4f1700978d0d45ffe265155a047a3427390da49f1a47649bd5097774e827985c33a57dda2f1affa9d1f18109b2c9f668553854ce70f43719b57c2b138c746d0248095e7c94a6104e3e065b21a2d54147b552bfadcadc608ffe43afba2fc37ce9502ed12bd566162fd29593fbcacca846e4e1b74b104b1598d5854f3ec837a8f8af43fd8a89846dd85a719a093f4a54b558879a8b0ed402c4e20bd8a851dbb392de784ee583bec4e72856191a2481c77fd01a35ea095fed650281c10983c0f0dc6376569c9981b21aa25a64a0310e5e6d0b91a8fc7ffd839eb0cbb543e69c3825269845628dc2407201d01042a3352fde3ed818ba3cb7911e4525f4c52906cae3229ff5eb09cfd04264ba4a50d01dfa351719c4e9ece9963798dd418d29a0f5228396a1ee4a19342f90b45c691837ee70691d9a9d7150bf8f0a887c925104a73b2f9a9978ecfd91403a6ad22e4b08929f225a2c818280ee05f69eac8c4d36c6eb5fdce54b9133b6a8f61df6efaa6b4614d9f771ee2d084d69f37bcf23620718299047f42ddbdd110c12922bec9cc25b02f85dfab6c0e3f3bc326bfe224c61100ac928334e98c3cd8b418b8cfa740206be8c70a17e17ed8527185b8c469feb26738f574fb006b8dde38715f82fd208612283e7acef4cc7f1c70b68efc28881923e5705c74dd34dc2724bc069ab0354541a34f204c756cdab358888a2283a1f03095211ef43875363b42e18a4aa67f75077a7ef13c0c83a9dfe9f2a694c5b49e346a4ddbac7210d39018f6edaf3d7bca19a9845d09baf3f6fa7ce316936bc5279ba11c07e66f444639e2cd0945331800bd65df6d0332a2b93d42252c8b5a567b8e2b623f1ba8fc87fd16a0cf9b106815efff9047c0092f6cf8bb16d92df1642c77ab956d1a1082db21f5a758581ed586f6e62e416652112f6c6893ea5b8600ac5a40b56da8f5dd13131c38d8ca0f88da8c65c89d6fd2af952cccff145bcbef1ec56ec5e9c77e42e1c57bdab57571348310b5447a35ffc1b51b269d653c0667a01116681723573ba9f4b38a5722f0cdc36ebc5f191d621d511a47d2369bb87b6e6329383d787861bb4d38ca1a2c6a9019fd32488fbf8a275b96535ef22276a58d3b4eefe8cac417b55405904cb9a5bb9b6eed74cda3ad0a5abeacd44b1c19010e2c733dea85e5ef0b27177de740c6cec31b893297bbb1d8562a9c42095bd5afc642d7653e1d902fa6ef88f6ca398d39f9dcffc7b0ddea3250018aeac992251fba4e1959af2c619c7265f3f0ed6aa1605b3309753f343f1c7bcbda7d707d68594949f08fb5d0263b35230305b6cf0c1f2a9e8fe37d85d0f4cd628d06f1adad7be7908a342d46730e0a248e9c6e1f0270405c54e5e4cca80329810d38dcfba5f2b71c15249747e3c0d28644495c2f083c27df96f613832186676d2b736c8be901de60013f83f2a99ee61532f0a1edebd8d7573a33401ef740b43cd2e19e742b2cf742e2b733802b17f58407a2e1ff430cc7b579c9aeed873324360a948c7531ceef70ef49f99ad878717f6aa37f0b415e42b17ba37a5ff2b09253afa1a07ae2c6ff683c9826d020f803990c168cafcb5aa740b1d8914aa14a0f90e23f8b9ffe2b6e541adb7432eebdd279087899f71dff3963c276635a206896ef491a84593fd90c0c4f116bae7875566e88d3c2b3957916bf195d82f872ef6887583f811115879d4600bf0f167258f1e4134c921205c48be720c1f42675e006c53b67ba5f732ef7fbf1b1fff55f73251f385590fbc13cf99d3a669af969132d3b1a2ea4d22fa4866885049f095044a983a6044d7c04c39e34389e9f56a24ebbb314575c7dccfa9e462d13face61e916300798671fa8be3dbc976cfd3341e0232c117ceef856f31dde1d80ed06192137e7b051b78d42f53d9bc008676bb83992b951a14f2786bfc16be9a92be2b1ae0dcb2db9de1b0b0cc431a0bc57b0f77c9e66f80e4903554885e620aa936552669e05212ef9315b999a5bd8d87f108d496c7f5d4394b2f82c1bbca1bcfc49393b8fbe6d305b5b17f2e4853ee6cd2d76de9fe2a0822f98536bbbfe24577b131829def17e22791e4b1f549d1db18ce958d26a8ccedceec721c0017530cffe55c2e845fab618c26bcfde62016130e63f11db3eff9ca8d2f9551a76ea2cf036c124ae363030c0fda0f15a33064c029a600e2da7268aa7a1eaf7fc54286855d51264ac634a4f72665eee1d56e32c11e092c18b6a2368d4840d026fca52e13eb4e0f4247667656d9bf7247ec2b4d431140e9c809e636b2ceda08f11653ecb540b00faae4ed5b9f39f2b006e16fbaf39c8133375dad0bcbc3e0938025fb6f8e44c72c8fd00a619da0d8c001d0e0fafdf881aa8869c9899bd942b003b0a89a5d2735798feb8d722cc5ee6014add97501c0cef09cb8f2f500dab4e22075b212d65b6fe157a67ac093d31faf2faac7dc6c5921c5d17bab13109c26749b9737f6881e47ba72b5b630568d40cb66b33d3eba42a2ebe69c78f154a620234dbdaa112dcdf6ea47839c7d35f6c68726bd99047afe8b9a09d259e7fc1e213288e9033c54b291cc90001ca732cb9b7be43d384fa5c8c4af27b61aea209d1e98dd61948a52c174015f6aa9278f9c0453a0c0d04b97c281df4215f80960a4fcb9bbae747b9734a644336144467a898f2642d559dcd6abaad5fb651532d06716c159ea4341f99f82a0c59a5d26913cbe6b775bef713e6179e62ec29121308c2647f2dfb2b908cd5a14be07e5cfa413ad7203dc6da920d3e2b812ba81a8861f3d5a5d2b6c7307c0ece8d0796ace92e28a64ae6490bed7516be7aa3e15fba4230874388e0dd285a3af482eb1cdbe02a4b2df0d4155c57e79271b513aaa8b69a1bdc28d217d580d7ed635a3e1834bf60a58a0529611987effa463d346ada4a02f7bfd42e59fde7b2c300d37f9ea3c0f8e03d328d2badf5423471ff338cc0a761e3db87bfc91454e8b25f23486627c7747591b7efd78a799b5b391b44f6374b5bf3156fa0e62a04f03d5ccc3a61905193bb3115dec1235a53d34881fa6c9eec199390eec855bdf3927cc9b5668d1eb6fd10de4681c8a035c8d71bb2d9538e8faefff6d331d2cf5ca49b7231ea43d979d8e1c9f8856c923e9d1e28c9cff1621e178cf433bcde55f1089f424457e84369172750b8aa9d31e039f7dfab7b49fb39b7de40a4418880acb074d37b1f83b68984454b590b5dcb2ecb4f2b607deacd7505702d26f66967e19db6f72ee95d68325aaec791605a8e8f4ede0fc0a4e074078bfdeaba709c10b379df20188e30cfbd836029e6a60c943fe9bddbad4a9682397b6e9a46bb83a4b87f1760c8fad77b723976aa7d9290fa5758fa0fa1450cc986a7b4658139412dd9eda9ede9f1c8e16233a6e3cfa602867e7360ac5893c4dfbb95d141d4c24d401a8fed7f9acb51a2aa976cf33592b5270c6d4042c05008f61877325ada5396821c5de6cb3d1269f998cf6a8ba1ca899c329718eea8462eab7212ca55e74e1339fce94a6def2b232e688f73a292d7f0fdfff9229babea3a515724fdeec67791b11807c86acbd49d5cf40c1c5d7e9f6d291d8251c0c3f96c7e07c46b75792fe5ffc85cf6c0571898632f68eb160fddcda9e3f05c440eb59646965b00f9bdda6c480395fd48b3a2049ac6481341639b5db47aee7e521b356a20e9f8a1610e0bf2547bc25b72ef47f35d2c5557977c5e81147ca5d261aed12f86ec17b37bd3deac28da51af37341c2f56dc7e579893db2728e0acee7d6d789589da4270e970eb5407c8a2f56fdfd5546c31af7159019dd69238dcdf00b7f0e32917103924e30d1d3eb257965b97b69754420b9ca20bc08d9b7259bab2f5aea2bb8d5400806a62edd3f015efaae904e50ac515a3b92e4d0c16dc7a089420dfcbf8a1dddefd1f14b846fe2cc2e80228f8e14e780344609f17c789ef138b442f531d0be402ff8f415eb9cdb8f493ab07c2e645f98e640ae5b2148ce685b090588aa68abc6d1ed2de23bea27342a0abe708ff5dcdbbb9945b0c5c820b75a8c40dad3e429488b782fc1bfa64efc1f9619eebf3a53f340a6c6bc7211fcafdcbf0da157852ac827e9dd5c672a2339d014b0c4961e18aef44ec3e6d3b67a8517fdc149036e2da6902092ffbeaa2bfcd070b9e38531d3a7c578f7d7f83e1867ea2aa76679de7a049b80495429f11403d980b8f7c55529dcaa6b774076487bc5747a0a4801dfc06712ddb4cee57791c3794a4ce8014ff3437d0267cf95c5760b2383eade4a0909657887b6b8d2696b9f9935f827276901ec1148fc44bb4a44e7f83481b2f016880c2dd97f711242570ba409dae18fbec767fb4ba18ed9150e697ace9d9b34509005f75a21e1fbf0dd74464ebc376e3260e5efff6d3cc23b7d51eee8ae64850245bac8221360c24544a66417d516a914a6ee1f756f015398cc6a085e2de0cf3b810a4bd2a525b9f7e068b44e4894d34e13db2825c5b8faa730e87abc6d142efccf2749d2f488660c154f11511d0bf568f061bccad66e476d91101d83c75cf125bce9b7a6381c1fb563d096dfaadd393f33f37b60695a9cf44e3a1dc792b16687d0619ae85639cd1b636e39b53de56487e0f6b188530f1d689c9f3ee68f11ef6310dd6411097fe27517feb2819019aba73824abbc9fd5b879e230e1b8c8d0bafb584c87e7f5558ea87cd2d5710f4443e6988c02e966f851eb23534e94fd4cbb62b325063c9bf26932c00915b8163495a9202d6e9ccc8f82098b7cbc2f3a0ff0b965338bcbf96fe1b5b96e6f5c83170d43e1d9350a5156b363b28354e7019a2d747c48ba7a2453a69935d96c5fb132a8db7b3a2201c57e3ef19b07713fe5b5b0ac00309d9557a1cba6ed4f2bed48b2b3fbd4aab2d135ac1ae42f283d6e43ca45dabbdd151e81c9c671c164c9a7", &(0x7f00000010c0)="c539f05090275def46799951d4a586a67601da8cb8a74b20f5cc0921d930a264011ef5926520db5f365cab19442ab9986c933a411ad02fe1c4aaa1749df6f711d0522de9e2582838de023bfff4059a64ffcf6ea27a7ecdda7408180a1cee4785abcc97db2be34fc39067b7544a7bc18c104fb6e14af1aba407abd110783c786c827901d11490d961367d5aa60d07e66854d6e7148b5b9e2e2816a5b9da5c442ed3674af92ec76e87603c72b9d6f2fc7e14e5c9550800a222db5af2392cfd090ad78ac18f83ba5086c4", &(0x7f00000000c0)="2cf1f01fb07cdaeb8b96159669b0a7367287974518fc907e63aa2d1b64408fa480016363075bdd59bdd184bf2d1f4fcd8cc37b7e35c5af5ece29f048a17a6cfbfe416fe370565a834f4fd188ec16ea533553804326d3306ddb8634879cc5ced04f2188a36470ac98a2e44200218bb74bfca68a2ef045255c6303e436f045ff942f2886b168d606960dd0f149ecdf2ee101720fd41641c2184f64cf36a31ca20e84188ed738534f773f3080a311b778bda8a8dcbce2ba259fa67f98a3e635360598b3cc8a06f4ae5f442c2031f197bc63980999b2af277e924405e3b3ed846649341ebfa18ec1924210e3fd099982835f2a80d86f157791504310ff55ec00000000000000"]}) (async) [ 1230.075241] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1230.080277] block_ioctl+0xd9/0x120 [ 1230.083911] ? blkdev_fallocate+0x3a0/0x3a0 [ 1230.088231] do_vfs_ioctl+0x75a/0xff0 [ 1230.092031] ? lock_acquire+0x170/0x3f0 [ 1230.096006] ? ioctl_preallocate+0x1a0/0x1a0 [ 1230.100415] ? __fget+0x265/0x3e0 [ 1230.103869] ? do_vfs_ioctl+0xff0/0xff0 [ 1230.107851] ? security_file_ioctl+0x83/0xb0 [ 1230.112261] SyS_ioctl+0x7f/0xb0 [ 1230.115624] ? do_vfs_ioctl+0xff0/0xff0 [ 1230.119606] do_syscall_64+0x1d5/0x640 [ 1230.123503] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1230.128681] RIP: 0033:0x7fe33b68cec7 [ 1230.132372] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1230.140061] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1230.147309] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1230.154559] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1230.161820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1230.169070] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1230.188070] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1230.194404] FAULT_INJECTION: forcing a failure. [ 1230.194404] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.209893] CPU: 0 PID: 27594 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1230.217794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.227143] Call Trace: [ 1230.229729] dump_stack+0x1b2/0x281 [ 1230.233359] should_fail.cold+0x10a/0x149 [ 1230.237507] should_failslab+0xd6/0x130 [ 1230.241485] kmem_cache_alloc+0x28e/0x3c0 [ 1230.245633] getname_flags+0xc8/0x550 [ 1230.249442] SyS_mkdirat+0x83/0x270 [ 1230.253070] ? SyS_mknod+0x30/0x30 [ 1230.256605] ? fput_many+0xe/0x140 [ 1230.260148] ? do_syscall_64+0x4c/0x640 [ 1230.264206] ? SyS_mknod+0x30/0x30 [ 1230.267741] do_syscall_64+0x1d5/0x640 [ 1230.271632] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1230.276815] RIP: 0033:0x7f10c0393217 [ 1230.280521] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 06:54:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 27) 06:54:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006162636465666768696a6b6c6d6e6f7000b2181a9986c409ded7b95cb2ad2d12322da88eb46a76cfee416fd1471e90ea4fb3215fb643e8ddcd4037c469a7635169c54ad21ff99326987b5330b2ae7af55319b3d9d5c6ba208146476eeef19c6b7cfc160b7b04f42a3ae720816d639584490c2ff21fd1921c4ac5213fdd93315946f11484b78d88da4a0ffd1eb96f9d5925d59a21d50671a893d5cacfbb5badf5179b2fb0fc111910abba6eeef9a622d854d424cdd1d90f746cf7233fa2db8fa1aa1a0fb9"], 0x18, r2) 06:54:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000000)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000040)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0xb, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x5}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x800}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48d5}, @map_fd={0x18, 0x14, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x956a7487054d1980, 0x7, 0x2, 0xffffffffffffffff, 0x1}], &(0x7f0000000140)='GPL\x00', 0x8, 0x14, &(0x7f0000000180)=""/20, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0xc016, 0x4e57f792}, 0x10, 0xffffffffffffffff}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xffff}, [@map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000300)='GPL\x00', 0x54, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xc, 0x9, 0x34}, 0x10, 0xffffffffffffffff}, 0x80) 06:54:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000700), 0x9, 0x490000) 06:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)={0x1, 0x0, @d}, 0x18, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)={0x1, 0x0, @d}, 0x18, r2) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) [ 1230.288228] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1230.295493] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1230.302758] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1230.310024] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1230.317295] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 36) 06:54:27 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 06:54:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000000)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000040)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0xb, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x5}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x800}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48d5}, @map_fd={0x18, 0x14, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x956a7487054d1980, 0x7, 0x2, 0xffffffffffffffff, 0x1}], &(0x7f0000000140)='GPL\x00', 0x8, 0x14, &(0x7f0000000180)=""/20, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0xc016, 0x4e57f792}, 0x10, 0xffffffffffffffff}, 0x80) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xffff}, [@map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000300)='GPL\x00', 0x54, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xc, 0x9, 0x34}, 0x10, 0xffffffffffffffff}, 0x80) 06:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161810000000000000061616161616131313131313131313131313131313131313131313131313131313131313131310c6e190c180b1a499726f5b71752d4fad5a454daaccb26bb5fdd07ea238f43dbf4d9aa7d663cca"], 0x48, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) ioctl$SNDRV_PCM_IOCTL_UNLINK(0xffffffffffffffff, 0x4161, 0x0) [ 1230.399279] FAULT_INJECTION: forcing a failure. [ 1230.399279] name failslab, interval 1, probability 0, space 0, times 0 06:54:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000000)) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000040)) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0xb, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x5}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x800}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48d5}, @map_fd={0x18, 0x14, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x956a7487054d1980, 0x7, 0x2, 0xffffffffffffffff, 0x1}], &(0x7f0000000140)='GPL\x00', 0x8, 0x14, &(0x7f0000000180)=""/20, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0xc016, 0x4e57f792}, 0x10, 0xffffffffffffffff}, 0x80) (async) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xffff}, [@map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000300)='GPL\x00', 0x54, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0xc, 0x9, 0x34}, 0x10, 0xffffffffffffffff}, 0x80) 06:54:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 06:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161810000000000000061616161616131313131313131313131313131313131313131313131313131313131313131310c6e190c180b1a499726f5b71752d4fad5a454daaccb26bb5fdd07ea238f43dbf4d9aa7d663cca"], 0x48, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) ioctl$SNDRV_PCM_IOCTL_UNLINK(0xffffffffffffffff, 0x4161, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161810000000000000061616161616131313131313131313131313131313131313131313131313131313131313131310c6e190c180b1a499726f5b71752d4fad5a454daaccb26bb5fdd07ea238f43dbf4d9aa7d663cca"], 0x48, 0xfffffffffffffffb) (async) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) ioctl$SNDRV_PCM_IOCTL_UNLINK(0xffffffffffffffff, 0x4161, 0x0) (async) [ 1230.471540] CPU: 1 PID: 27635 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1230.479447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.488801] Call Trace: [ 1230.491399] dump_stack+0x1b2/0x281 [ 1230.495039] should_fail.cold+0x10a/0x149 [ 1230.499190] should_failslab+0xd6/0x130 [ 1230.503167] kmem_cache_alloc_node+0x263/0x410 [ 1230.507750] __alloc_skb+0x5c/0x510 [ 1230.511379] kobject_uevent_env+0x882/0xf30 [ 1230.515705] lo_ioctl+0x11a6/0x1cd0 [ 1230.519330] ? loop_set_status64+0xe0/0xe0 [ 1230.523567] blkdev_ioctl+0x540/0x1830 [ 1230.527452] ? blkpg_ioctl+0x8d0/0x8d0 [ 1230.531364] ? trace_hardirqs_on+0x10/0x10 [ 1230.535587] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1230.540688] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1230.545694] block_ioctl+0xd9/0x120 [ 1230.549310] ? blkdev_fallocate+0x3a0/0x3a0 [ 1230.553624] do_vfs_ioctl+0x75a/0xff0 [ 1230.557430] ? lock_acquire+0x170/0x3f0 [ 1230.561402] ? ioctl_preallocate+0x1a0/0x1a0 [ 1230.565797] ? __fget+0x265/0x3e0 [ 1230.569233] ? do_vfs_ioctl+0xff0/0xff0 [ 1230.573202] ? security_file_ioctl+0x83/0xb0 [ 1230.577699] SyS_ioctl+0x7f/0xb0 [ 1230.581047] ? do_vfs_ioctl+0xff0/0xff0 [ 1230.585032] do_syscall_64+0x1d5/0x640 [ 1230.588912] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1230.594089] RIP: 0033:0x7fe33b68cec7 [ 1230.597783] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1230.605495] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1230.612757] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1230.620014] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1230.627450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1230.634704] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1230.652710] FAULT_INJECTION: forcing a failure. [ 1230.652710] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.661773] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1230.677546] CPU: 0 PID: 27647 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1230.685450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.694807] Call Trace: [ 1230.697398] dump_stack+0x1b2/0x281 [ 1230.701030] should_fail.cold+0x10a/0x149 [ 1230.705185] should_failslab+0xd6/0x130 [ 1230.709250] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1230.713928] ? kobj_ns_drop+0x80/0x80 [ 1230.717731] call_usermodehelper_setup+0x73/0x2e0 [ 1230.722581] kobject_uevent_env+0xc21/0xf30 [ 1230.727004] lo_ioctl+0x11a6/0x1cd0 [ 1230.730634] ? loop_set_status64+0xe0/0xe0 [ 1230.734869] blkdev_ioctl+0x540/0x1830 [ 1230.738760] ? blkpg_ioctl+0x8d0/0x8d0 [ 1230.742649] ? trace_hardirqs_on+0x10/0x10 [ 1230.746888] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1230.751991] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1230.757000] block_ioctl+0xd9/0x120 [ 1230.760606] ? blkdev_fallocate+0x3a0/0x3a0 [ 1230.764904] do_vfs_ioctl+0x75a/0xff0 [ 1230.768691] ? lock_acquire+0x170/0x3f0 [ 1230.772654] ? ioctl_preallocate+0x1a0/0x1a0 [ 1230.777057] ? __fget+0x265/0x3e0 [ 1230.780500] ? do_vfs_ioctl+0xff0/0xff0 [ 1230.784484] ? security_file_ioctl+0x83/0xb0 [ 1230.788878] SyS_ioctl+0x7f/0xb0 [ 1230.792225] ? do_vfs_ioctl+0xff0/0xff0 [ 1230.796185] do_syscall_64+0x1d5/0x640 [ 1230.800059] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1230.805231] RIP: 0033:0x7f10c0393ec7 [ 1230.808919] RSP: 002b:00007f10bed08f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1230.816622] RAX: ffffffffffffffda RBX: 00007f10c03dda20 RCX: 00007f10c0393ec7 06:54:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 28) 06:54:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f00000000c0)="409a7c3c2768bbfed33006377e440403a595c889096c01301c2fed1cc8d5f6c37550ea97b41f3ef142dbbf603ca8fe0f19641e0827df609272ca3b31819b1d75a2089f7a3cab6754f9230edda3517da8dfc80722534a4cbece14ca535e0393611eb2bbb1e589cdb48e6fb3bdc81b135af59a7f487c35fa354a9b44337fea8cb385f4f4d38f782f7afea10972b3e25c37d3765d0a02898295eaace2a4c70e0a13e70e29db2df83bface026c1f52d0b55f7475b04d58843765317b0f6e5d06a35aff863b", 0xc3}) 06:54:28 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000000000000616161616161616161616161616161616161810000000000000061616161616131313131313131313131313131313131313131313131313131313131313131310c6e190c180b1a499726f5b71752d4fad5a454daaccb26bb5fdd07ea238f43dbf4d9aa7d663cca"], 0x48, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) ioctl$SNDRV_PCM_IOCTL_UNLINK(0xffffffffffffffff, 0x4161, 0x0) 06:54:28 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000380)={0x3, [0x8, 0x3ff, 0xffff], [{0xe5, 0x7, 0x1, 0x1, 0x0, 0x1}, {0x8000, 0x5, 0x0, 0x1, 0x1}, {0x3, 0x68}, {0xfffffeff, 0xfe, 0x0, 0x0, 0x1}, {0x1ff, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x2, 0x6, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x6, 0x1, 0x1, 0x1}, {0x2, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0xffffffff, 0x1, 0x1, 0x1, 0x1}, {0x988a, 0x1f, 0x0, 0x0, 0x1, 0x1}, {0x400, 0xe7, 0x1}, {0x7ff, 0x6, 0x0, 0x0, 0x1}], 0x2}) 06:54:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) 06:54:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 37) [ 1230.823870] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1230.831118] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1230.838366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1230.845611] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1230.856114] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) 06:54:28 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) syz_open_dev$sndpcmp(&(0x7f0000000340), 0x101, 0x402001) 06:54:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f00000000c0)="409a7c3c2768bbfed33006377e440403a595c889096c01301c2fed1cc8d5f6c37550ea97b41f3ef142dbbf603ca8fe0f19641e0827df609272ca3b31819b1d75a2089f7a3cab6754f9230edda3517da8dfc80722534a4cbece14ca535e0393611eb2bbb1e589cdb48e6fb3bdc81b135af59a7f487c35fa354a9b44337fea8cb385f4f4d38f782f7afea10972b3e25c37d3765d0a02898295eaace2a4c70e0a13e70e29db2df83bface026c1f52d0b55f7475b04d58843765317b0f6e5d06a35aff863b", 0xc3}) 06:54:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1ff}, 0x8) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1230.942860] FAULT_INJECTION: forcing a failure. [ 1230.942860] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.967592] CPU: 1 PID: 27689 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1230.975498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.984850] Call Trace: [ 1230.987447] dump_stack+0x1b2/0x281 06:54:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1ff}, 0x8) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) socket$inet_sctp(0x2, 0x1, 0x84) (async) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1ff}, 0x8) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) 06:54:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f00000000c0)="409a7c3c2768bbfed33006377e440403a595c889096c01301c2fed1cc8d5f6c37550ea97b41f3ef142dbbf603ca8fe0f19641e0827df609272ca3b31819b1d75a2089f7a3cab6754f9230edda3517da8dfc80722534a4cbece14ca535e0393611eb2bbb1e589cdb48e6fb3bdc81b135af59a7f487c35fa354a9b44337fea8cb385f4f4d38f782f7afea10972b3e25c37d3765d0a02898295eaace2a4c70e0a13e70e29db2df83bface026c1f52d0b55f7475b04d58843765317b0f6e5d06a35aff863b", 0xc3}) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f00000000c0)="409a7c3c2768bbfed33006377e440403a595c889096c01301c2fed1cc8d5f6c37550ea97b41f3ef142dbbf603ca8fe0f19641e0827df609272ca3b31819b1d75a2089f7a3cab6754f9230edda3517da8dfc80722534a4cbece14ca535e0393611eb2bbb1e589cdb48e6fb3bdc81b135af59a7f487c35fa354a9b44337fea8cb385f4f4d38f782f7afea10972b3e25c37d3765d0a02898295eaace2a4c70e0a13e70e29db2df83bface026c1f52d0b55f7475b04d58843765317b0f6e5d06a35aff863b", 0xc3}) (async) [ 1230.991103] should_fail.cold+0x10a/0x149 [ 1230.995255] should_failslab+0xd6/0x130 [ 1230.999292] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1231.004401] __kmalloc_node_track_caller+0x38/0x70 [ 1231.009332] __alloc_skb+0x96/0x510 [ 1231.012962] kobject_uevent_env+0x882/0xf30 [ 1231.017293] lo_ioctl+0x11a6/0x1cd0 [ 1231.020924] ? loop_set_status64+0xe0/0xe0 [ 1231.025161] blkdev_ioctl+0x540/0x1830 [ 1231.029049] ? blkpg_ioctl+0x8d0/0x8d0 [ 1231.032938] ? trace_hardirqs_on+0x10/0x10 [ 1231.037178] ? _raw_spin_unlock_irqrestore+0x66/0xe0 06:54:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x1c000, 0x80) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={@none, 0x95}) read$snddsp(r0, 0x0, 0x0) [ 1231.042283] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1231.047300] block_ioctl+0xd9/0x120 [ 1231.050924] ? blkdev_fallocate+0x3a0/0x3a0 [ 1231.055242] do_vfs_ioctl+0x75a/0xff0 [ 1231.059044] ? lock_acquire+0x170/0x3f0 [ 1231.063015] ? ioctl_preallocate+0x1a0/0x1a0 [ 1231.067421] ? __fget+0x265/0x3e0 [ 1231.070873] ? do_vfs_ioctl+0xff0/0xff0 [ 1231.074845] ? security_file_ioctl+0x83/0xb0 [ 1231.079255] SyS_ioctl+0x7f/0xb0 [ 1231.082634] ? do_vfs_ioctl+0xff0/0xff0 [ 1231.086604] do_syscall_64+0x1d5/0x640 [ 1231.090498] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1231.095680] RIP: 0033:0x7fe33b68cec7 [ 1231.099374] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1231.107061] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1231.114310] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1231.121567] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1231.128823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1231.136071] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1231.150401] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1231.156545] FAULT_INJECTION: forcing a failure. [ 1231.156545] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.172458] CPU: 1 PID: 27697 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1231.180357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1231.189794] Call Trace: [ 1231.192389] dump_stack+0x1b2/0x281 [ 1231.196020] should_fail.cold+0x10a/0x149 [ 1231.200172] should_failslab+0xd6/0x130 [ 1231.204146] kmem_cache_alloc+0x28e/0x3c0 [ 1231.208304] ? ext4_sync_fs+0x7e0/0x7e0 [ 1231.212295] ext4_alloc_inode+0x1a/0x640 [ 1231.216356] ? ext4_sync_fs+0x7e0/0x7e0 [ 1231.220325] alloc_inode+0x5d/0x170 [ 1231.223950] new_inode+0x1d/0xf0 [ 1231.227320] __ext4_new_inode+0x360/0x4eb0 [ 1231.231558] ? kmem_cache_free+0x7c/0x2b0 [ 1231.235698] ? putname+0xcd/0x110 [ 1231.239147] ? SyS_mkdirat+0x95/0x270 [ 1231.242943] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1231.248316] ? ext4_free_inode+0x1460/0x1460 [ 1231.252720] ? lock_downgrade+0x740/0x740 [ 1231.256872] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1231.261971] ? dquot_initialize_needed+0x240/0x240 [ 1231.266907] ext4_mkdir+0x2e4/0xbd0 [ 1231.270537] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1231.275208] ? security_inode_mkdir+0xca/0x100 [ 1231.279792] vfs_mkdir+0x463/0x6e0 [ 1231.283333] SyS_mkdirat+0x1fd/0x270 [ 1231.287046] ? SyS_mknod+0x30/0x30 [ 1231.290757] ? fput_many+0xe/0x140 [ 1231.294296] ? do_syscall_64+0x4c/0x640 [ 1231.298267] ? SyS_mknod+0x30/0x30 [ 1231.301813] do_syscall_64+0x1d5/0x640 [ 1231.305705] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1231.310889] RIP: 0033:0x7f10c0393217 [ 1231.314592] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1231.322296] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1231.329562] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1231.336829] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1231.344100] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 06:54:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 29) 06:54:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x1c000, 0x80) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={@none, 0x95}) read$snddsp(r0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x1c000, 0x80) (async) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={@none, 0x95}) (async) read$snddsp(r0, 0x0, 0x0) (async) 06:54:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) 06:54:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1ff}, 0x8) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1231.351379] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 38) 06:54:28 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$join(0x1, &(0x7f0000000240)={'syz', 0x1}) 06:54:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x1c000, 0x80) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={@none, 0x95}) (async) read$snddsp(r0, 0x0, 0x0) 06:54:28 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) [ 1231.432325] FAULT_INJECTION: forcing a failure. [ 1231.432325] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.465928] CPU: 0 PID: 27746 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 06:54:28 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) 06:54:28 executing program 2: ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f00000000c0)={0x2}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:28 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) [ 1231.473837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1231.483189] Call Trace: [ 1231.485777] dump_stack+0x1b2/0x281 [ 1231.489407] should_fail.cold+0x10a/0x149 [ 1231.493553] should_failslab+0xd6/0x130 [ 1231.497527] kmem_cache_alloc_node+0x263/0x410 [ 1231.502109] __alloc_skb+0x5c/0x510 [ 1231.505735] kobject_uevent_env+0x882/0xf30 [ 1231.510061] lo_ioctl+0x11a6/0x1cd0 [ 1231.513686] ? loop_set_status64+0xe0/0xe0 [ 1231.517935] blkdev_ioctl+0x540/0x1830 [ 1231.521912] ? blkpg_ioctl+0x8d0/0x8d0 [ 1231.525798] ? trace_hardirqs_on+0x10/0x10 [ 1231.530036] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1231.535145] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1231.540164] block_ioctl+0xd9/0x120 [ 1231.543794] ? blkdev_fallocate+0x3a0/0x3a0 [ 1231.548152] do_vfs_ioctl+0x75a/0xff0 [ 1231.551951] ? lock_acquire+0x170/0x3f0 [ 1231.555923] ? ioctl_preallocate+0x1a0/0x1a0 [ 1231.560342] ? __fget+0x265/0x3e0 [ 1231.563883] ? do_vfs_ioctl+0xff0/0xff0 [ 1231.567871] ? security_file_ioctl+0x83/0xb0 [ 1231.572274] SyS_ioctl+0x7f/0xb0 [ 1231.575729] ? do_vfs_ioctl+0xff0/0xff0 [ 1231.579684] do_syscall_64+0x1d5/0x640 [ 1231.583557] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1231.588735] RIP: 0033:0x7fe33b68cec7 [ 1231.592435] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1231.600128] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1231.607380] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1231.614647] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1231.621897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1231.629300] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1231.646456] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1231.651218] FAULT_INJECTION: forcing a failure. [ 1231.651218] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.669168] CPU: 0 PID: 27748 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1231.677067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1231.686416] Call Trace: [ 1231.689003] dump_stack+0x1b2/0x281 [ 1231.692635] should_fail.cold+0x10a/0x149 [ 1231.696781] should_failslab+0xd6/0x130 [ 1231.700758] kmem_cache_alloc+0x28e/0x3c0 [ 1231.704906] ? ext4_sync_fs+0x7e0/0x7e0 [ 1231.708878] ext4_alloc_inode+0x1a/0x640 [ 1231.712939] ? ext4_sync_fs+0x7e0/0x7e0 [ 1231.716913] alloc_inode+0x5d/0x170 [ 1231.720538] new_inode+0x1d/0xf0 [ 1231.723993] __ext4_new_inode+0x360/0x4eb0 [ 1231.728228] ? kmem_cache_free+0x7c/0x2b0 [ 1231.732461] ? putname+0xcd/0x110 [ 1231.735909] ? SyS_mkdirat+0x95/0x270 [ 1231.739796] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1231.745169] ? ext4_free_inode+0x1460/0x1460 [ 1231.749576] ? lock_downgrade+0x740/0x740 [ 1231.753726] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1231.758823] ? dquot_initialize_needed+0x240/0x240 [ 1231.763759] ext4_mkdir+0x2e4/0xbd0 [ 1231.767391] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1231.772061] ? security_inode_mkdir+0xca/0x100 [ 1231.776648] vfs_mkdir+0x463/0x6e0 [ 1231.780191] SyS_mkdirat+0x1fd/0x270 [ 1231.783906] ? SyS_mknod+0x30/0x30 [ 1231.787452] ? fput_many+0xe/0x140 [ 1231.790990] ? do_syscall_64+0x4c/0x640 [ 1231.794958] ? SyS_mknod+0x30/0x30 [ 1231.798488] do_syscall_64+0x1d5/0x640 [ 1231.802368] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1231.807547] RIP: 0033:0x7f10c0393217 [ 1231.811236] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1231.818930] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1231.826275] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c 06:54:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 30) 06:54:29 executing program 2: ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f00000000c0)={0x2}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$clear(0x7, r1) r2 = add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="3092c2362b77576c92e5bdd774af0db04f5404f6932b60661170e4abba02ade05eea064c38f11b9e04", 0x29, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)={0x2, 0x0, @b}, 0x48, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="150c14031dc46dd848f952affe14f5013e57091e9ebf86d29bf94417d95c5c678483202b71499a722168", 0x2a, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x20000, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$search(0xa, r4, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r4) 06:54:29 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 39) 06:54:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1231.833523] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1231.840772] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1231.848020] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$clear(0x7, r1) r2 = add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="3092c2362b77576c92e5bdd774af0db04f5404f6932b60661170e4abba02ade05eea064c38f11b9e04", 0x29, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)={0x2, 0x0, @b}, 0x48, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="150c14031dc46dd848f952affe14f5013e57091e9ebf86d29bf94417d95c5c678483202b71499a722168", 0x2a, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x20000, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$search(0xa, r4, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$clear(0x7, r1) (async) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="3092c2362b77576c92e5bdd774af0db04f5404f6932b60661170e4abba02ade05eea064c38f11b9e04", 0x29, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)={0x2, 0x0, @b}, 0x48, r2) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="150c14031dc46dd848f952affe14f5013e57091e9ebf86d29bf94417d95c5c678483202b71499a722168", 0x2a, r1) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x20000, 0x0) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) (async) keyctl$search(0xa, r4, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r4) (async) 06:54:29 executing program 0: ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:29 executing program 2: ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f00000000c0)={0x2}) (async) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) [ 1231.924308] FAULT_INJECTION: forcing a failure. [ 1231.924308] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.935878] CPU: 0 PID: 27793 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1231.943777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1231.953127] Call Trace: [ 1231.955713] dump_stack+0x1b2/0x281 [ 1231.959354] should_fail.cold+0x10a/0x149 [ 1231.963512] should_failslab+0xd6/0x130 [ 1231.967486] kmem_cache_alloc_node_trace+0x25a/0x400 06:54:29 executing program 0: ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:29 executing program 2: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x800, 0x7}, 0x8) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) [ 1231.972591] __kmalloc_node_track_caller+0x38/0x70 [ 1231.977518] __alloc_skb+0x96/0x510 [ 1231.981145] kobject_uevent_env+0x882/0xf30 [ 1231.985472] lo_ioctl+0x11a6/0x1cd0 [ 1231.989097] ? loop_set_status64+0xe0/0xe0 [ 1231.993328] blkdev_ioctl+0x540/0x1830 [ 1231.997221] ? blkpg_ioctl+0x8d0/0x8d0 [ 1232.001121] ? trace_hardirqs_on+0x10/0x10 [ 1232.005355] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1232.010453] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1232.015471] block_ioctl+0xd9/0x120 [ 1232.019094] ? blkdev_fallocate+0x3a0/0x3a0 06:54:29 executing program 0: ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) [ 1232.023432] do_vfs_ioctl+0x75a/0xff0 [ 1232.027246] ? lock_acquire+0x170/0x3f0 [ 1232.031219] ? ioctl_preallocate+0x1a0/0x1a0 [ 1232.035630] ? __fget+0x265/0x3e0 [ 1232.039079] ? do_vfs_ioctl+0xff0/0xff0 [ 1232.043051] ? security_file_ioctl+0x83/0xb0 [ 1232.047465] SyS_ioctl+0x7f/0xb0 [ 1232.050823] ? do_vfs_ioctl+0xff0/0xff0 [ 1232.054792] do_syscall_64+0x1d5/0x640 [ 1232.058677] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1232.063877] RIP: 0033:0x7fe33b68cec7 [ 1232.067586] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1232.075291] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1232.082559] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1232.089808] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1232.097054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1232.104306] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1232.119462] FAULT_INJECTION: forcing a failure. [ 1232.119462] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.130954] CPU: 0 PID: 27792 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1232.138836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.139697] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1232.148185] Call Trace: [ 1232.148246] dump_stack+0x1b2/0x281 [ 1232.148260] should_fail.cold+0x10a/0x149 [ 1232.148271] should_failslab+0xd6/0x130 [ 1232.148283] kmem_cache_alloc+0x40/0x3c0 [ 1232.148294] __es_insert_extent+0x338/0x1360 [ 1232.148301] ? __es_shrink+0x8c0/0x8c0 [ 1232.148312] ? lock_acquire+0x170/0x3f0 [ 1232.148320] ? ext4_es_insert_extent+0x11f/0x530 [ 1232.148333] ext4_es_insert_extent+0x1b9/0x530 [ 1232.193871] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1232.199670] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1232.205126] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 1232.210929] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 1232.215516] ? __lock_acquire+0x5fc/0x3f20 [ 1232.219754] ? __lock_acquire+0x5fc/0x3f20 [ 1232.223991] ? mark_buffer_dirty+0x95/0x480 [ 1232.228308] ? trace_hardirqs_on+0x10/0x10 [ 1232.232540] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 1232.237905] ? ext4_find_delalloc_cluster+0x180/0x180 [ 1232.243089] ? trace_hardirqs_on+0x10/0x10 [ 1232.247325] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 1232.252171] ? ext4_es_lookup_extent+0x321/0xac0 [ 1232.257012] ? lock_acquire+0x170/0x3f0 [ 1232.260989] ? lock_acquire+0x170/0x3f0 [ 1232.264964] ? ext4_map_blocks+0x29f/0x1730 [ 1232.269289] ext4_map_blocks+0xb19/0x1730 [ 1232.273438] ? ext4_issue_zeroout+0x150/0x150 [ 1232.277925] ? __ext4_new_inode+0x27c/0x4eb0 [ 1232.282335] ext4_getblk+0x98/0x3f0 [ 1232.285971] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1232.290385] ext4_bread+0x6c/0x1a0 [ 1232.293931] ? ext4_getblk+0x3f0/0x3f0 [ 1232.297808] ? dquot_initialize_needed+0x240/0x240 [ 1232.302755] ext4_append+0x143/0x350 [ 1232.306540] ext4_mkdir+0x4c9/0xbd0 [ 1232.310158] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1232.315076] ? security_inode_mkdir+0xca/0x100 [ 1232.319637] vfs_mkdir+0x463/0x6e0 [ 1232.323153] SyS_mkdirat+0x1fd/0x270 [ 1232.326850] ? SyS_mknod+0x30/0x30 [ 1232.330364] ? fput_many+0xe/0x140 [ 1232.333883] ? do_syscall_64+0x4c/0x640 [ 1232.337864] ? SyS_mknod+0x30/0x30 [ 1232.341397] do_syscall_64+0x1d5/0x640 [ 1232.345273] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1232.350445] RIP: 0033:0x7f10c0393217 [ 1232.354134] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1232.361823] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1232.369075] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c 06:54:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 31) 06:54:29 executing program 2: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x800, 0x7}, 0x8) (async) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:29 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$clear(0x7, r1) r2 = add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="3092c2362b77576c92e5bdd774af0db04f5404f6932b60661170e4abba02ade05eea064c38f11b9e04", 0x29, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)={0x2, 0x0, @b}, 0x48, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="150c14031dc46dd848f952affe14f5013e57091e9ebf86d29bf94417d95c5c678483202b71499a722168", 0x2a, r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x20000, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$search(0xa, r4, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$clear(0x7, r1) (async) add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="3092c2362b77576c92e5bdd774af0db04f5404f6932b60661170e4abba02ade05eea064c38f11b9e04", 0x29, 0xfffffffffffffffe) (async) add_key$fscrypt_provisioning(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)={0x2, 0x0, @b}, 0x48, r2) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="150c14031dc46dd848f952affe14f5013e57091e9ebf86d29bf94417d95c5c678483202b71499a722168", 0x2a, r1) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x20000, 0x0) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) (async) keyctl$search(0xa, r4, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, r4) (async) [ 1232.376342] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1232.383604] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1232.390861] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1232.400741] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 40) 06:54:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:29 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:29 executing program 2: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x800, 0x7}, 0x8) (async) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) [ 1232.503421] FAULT_INJECTION: forcing a failure. [ 1232.503421] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.525683] CPU: 1 PID: 27852 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1232.533589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.542937] Call Trace: [ 1232.545523] dump_stack+0x1b2/0x281 [ 1232.549153] should_fail.cold+0x10a/0x149 06:54:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:30 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x202c00) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x3f, 0x28000) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f00000003c0)={0x0, &(0x7f0000000380)=[&(0x7f0000000300)="438bfe109a8182ae7db16b94b9f9655333db6373e7d60e0f5d8955ca858cfeee1058c4d77b5f0c0ed35852544765cd9e01bcffbc3c7905c4e20322aa93479dd37b890fc90d9ed7a158e0c95ff0b1a32317bf3849efb01e321a1b6240d3f6b5195dca040c67"]}) read$snddsp(r0, 0x0, 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x80001, 0xa) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x5}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0xfffa, 0x800b, 0xfff, 0x81, 0x400, 0x2, 0x3}, &(0x7f00000004c0)=0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r3, 0x81204101, &(0x7f00000000c0)) socket$inet_sctp(0x2, 0x5, 0x84) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=r5, @ANYBLOB="25000000a39379aead6356b2fd85dd736b488fcc148399b9455876910000"], &(0x7f0000000280)=0x2d) 06:54:30 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) [ 1232.553301] should_failslab+0xd6/0x130 [ 1232.557275] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1232.562382] __kmalloc_node_track_caller+0x38/0x70 [ 1232.567314] __alloc_skb+0x96/0x510 [ 1232.570951] kobject_uevent_env+0x882/0xf30 [ 1232.575282] lo_ioctl+0x11a6/0x1cd0 [ 1232.578912] ? loop_set_status64+0xe0/0xe0 [ 1232.583143] blkdev_ioctl+0x540/0x1830 [ 1232.587033] ? blkpg_ioctl+0x8d0/0x8d0 [ 1232.591012] ? trace_hardirqs_on+0x10/0x10 [ 1232.595248] ? _raw_spin_unlock_irqrestore+0x66/0xe0 06:54:30 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x202c00) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x3f, 0x28000) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f00000003c0)={0x0, &(0x7f0000000380)=[&(0x7f0000000300)="438bfe109a8182ae7db16b94b9f9655333db6373e7d60e0f5d8955ca858cfeee1058c4d77b5f0c0ed35852544765cd9e01bcffbc3c7905c4e20322aa93479dd37b890fc90d9ed7a158e0c95ff0b1a32317bf3849efb01e321a1b6240d3f6b5195dca040c67"]}) read$snddsp(r0, 0x0, 0x0) (async) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x80001, 0xa) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x5}, 0x8) (async, rerun: 64) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0xfffa, 0x800b, 0xfff, 0x81, 0x400, 0x2, 0x3}, &(0x7f00000004c0)=0x20) (async, rerun: 64) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r3, 0x81204101, &(0x7f00000000c0)) socket$inet_sctp(0x2, 0x5, 0x84) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) (async, rerun: 32) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 32) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=r5, @ANYBLOB="25000000a39379aead6356b2fd85dd736b488fcc148399b9455876910000"], &(0x7f0000000280)=0x2d) [ 1232.600349] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1232.605371] block_ioctl+0xd9/0x120 [ 1232.609004] ? blkdev_fallocate+0x3a0/0x3a0 [ 1232.613332] do_vfs_ioctl+0x75a/0xff0 [ 1232.617135] ? lock_acquire+0x170/0x3f0 [ 1232.621223] ? ioctl_preallocate+0x1a0/0x1a0 [ 1232.625631] ? __fget+0x265/0x3e0 [ 1232.629088] ? do_vfs_ioctl+0xff0/0xff0 [ 1232.633071] ? security_file_ioctl+0x83/0xb0 [ 1232.637483] SyS_ioctl+0x7f/0xb0 [ 1232.640852] ? do_vfs_ioctl+0xff0/0xff0 [ 1232.644827] do_syscall_64+0x1d5/0x640 [ 1232.648716] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1232.653921] RIP: 0033:0x7fe33b68cec7 [ 1232.657626] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1232.665332] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1232.672597] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1232.679860] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1232.687119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1232.694376] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1232.707925] FAULT_INJECTION: forcing a failure. [ 1232.707925] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.719390] CPU: 1 PID: 27871 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1232.727476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.736837] Call Trace: [ 1232.739425] dump_stack+0x1b2/0x281 [ 1232.743057] should_fail.cold+0x10a/0x149 [ 1232.747214] should_failslab+0xd6/0x130 [ 1232.751197] kmem_cache_alloc+0x40/0x3c0 [ 1232.755262] __es_insert_extent+0x338/0x1360 [ 1232.759666] ? __es_shrink+0x8c0/0x8c0 [ 1232.763648] ? lock_acquire+0x170/0x3f0 [ 1232.767622] ? ext4_es_insert_extent+0x11f/0x530 [ 1232.772381] ext4_es_insert_extent+0x1b9/0x530 [ 1232.776966] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1232.782765] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1232.788233] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 1232.794032] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 1232.798616] ? __lock_acquire+0x5fc/0x3f20 [ 1232.802850] ? __lock_acquire+0x5fc/0x3f20 [ 1232.807087] ? mark_buffer_dirty+0x95/0x480 [ 1232.811410] ? trace_hardirqs_on+0x10/0x10 [ 1232.815668] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 1232.821048] ? ext4_find_delalloc_cluster+0x180/0x180 [ 1232.826322] ? trace_hardirqs_on+0x10/0x10 [ 1232.830556] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 1232.835399] ? ext4_es_lookup_extent+0x321/0xac0 [ 1232.840159] ? lock_acquire+0x170/0x3f0 [ 1232.844136] ? lock_acquire+0x170/0x3f0 [ 1232.848118] ? ext4_map_blocks+0x29f/0x1730 [ 1232.852449] ext4_map_blocks+0xb19/0x1730 [ 1232.856600] ? ext4_issue_zeroout+0x150/0x150 [ 1232.861096] ? __ext4_new_inode+0x27c/0x4eb0 [ 1232.865509] ext4_getblk+0x98/0x3f0 [ 1232.869133] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1232.873459] ext4_bread+0x6c/0x1a0 [ 1232.876994] ? ext4_getblk+0x3f0/0x3f0 [ 1232.880886] ? dquot_initialize_needed+0x240/0x240 [ 1232.885814] ext4_append+0x143/0x350 [ 1232.889527] ext4_mkdir+0x4c9/0xbd0 [ 1232.893161] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1232.897602] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1232.897826] ? security_inode_mkdir+0xca/0x100 [ 1232.907999] vfs_mkdir+0x463/0x6e0 [ 1232.911531] SyS_mkdirat+0x1fd/0x270 [ 1232.915240] ? SyS_mknod+0x30/0x30 [ 1232.918774] ? fput_many+0xe/0x140 [ 1232.922309] ? do_syscall_64+0x4c/0x640 [ 1232.926276] ? SyS_mknod+0x30/0x30 [ 1232.929808] do_syscall_64+0x1d5/0x640 [ 1232.933694] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1232.938867] RIP: 0033:0x7f10c0393217 [ 1232.942560] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1232.950255] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 06:54:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 32) 06:54:30 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:30 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:30 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x202c00) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x3f, 0x28000) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f00000003c0)={0x0, &(0x7f0000000380)=[&(0x7f0000000300)="438bfe109a8182ae7db16b94b9f9655333db6373e7d60e0f5d8955ca858cfeee1058c4d77b5f0c0ed35852544765cd9e01bcffbc3c7905c4e20322aa93479dd37b890fc90d9ed7a158e0c95ff0b1a32317bf3849efb01e321a1b6240d3f6b5195dca040c67"]}) read$snddsp(r0, 0x0, 0x0) (async) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000400)='.pending_reads\x00', 0x80001, 0xa) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x5}, 0x8) (async, rerun: 32) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0xfffa, 0x800b, 0xfff, 0x81, 0x400, 0x2, 0x3}, &(0x7f00000004c0)=0x20) (async, rerun: 32) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r3, 0x81204101, &(0x7f00000000c0)) socket$inet_sctp(0x2, 0x5, 0x84) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) (async) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=r5, @ANYBLOB="25000000a39379aead6356b2fd85dd736b488fcc148399b9455876910000"], &(0x7f0000000280)=0x2d) [ 1232.957505] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1232.964758] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1232.972007] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1232.979256] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1232.990015] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 41) 06:54:30 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$search(0xa, r3, &(0x7f00000000c0)='ceph\x00', &(0x7f00000003c0)={'syz', 0x3}, r0) 06:54:30 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:30 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x4000000000000, 0xa000) read$snddsp(r0, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f0000000080)={0xfffff3c0, [0x6, 0xfffffff7, 0x40], [{0x3, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x6, 0xfa19, 0x0, 0x0, 0x1}, {0x7, 0x3, 0x1, 0x0, 0x1, 0x1}, {0x200, 0x5, 0x1, 0x1}, {0x9, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0xffff}, {0x0, 0x100}, {0x3, 0xe817, 0x1, 0x1, 0x1}, {0x1ff8000, 0x0, 0x1}, {0xd1, 0x8, 0x0, 0x1, 0x1}, {0x6, 0x20000, 0x1}, {0x6, 0x9, 0x1, 0x0, 0x1}], 0x8001}) 06:54:30 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f00000002c0)={0x0, &(0x7f0000000040)=[&(0x7f00000000c0)="b24e4eeeb709457ad2a4745f011e434904cb6598113e34eb49a33c3b7b7b976a4a1f8377d7f9cf8223dbe64ba8d668aa766d1cf668f49032cb5851e4f807016d95dc1ee9b17283175916d3de46e0cfbac236e8415a5b2c0ef3d7138a1ed690eca5f68230670e20b57c92c245420f1137fcba0a8d622bd790b6f7551ea08f63102b075ab820b288fee5770577adb20c01c891c93317f14d8a4cb9652d2afc3e437f47bb172811c13ef0599d2083c386bf3afc1d6b4fc4d0954adfc6d1cf9847af59b9d01fc0fa07748ba0be4b138fbf194681d1cb0c46e900ccbcccc4", &(0x7f00000001c0)="2d799e35633ab47abd88998cf93a1ce5120815e1d5d07b1e71148910ca5a79853b2e06028ec628c11cf104c8aaca82bf1adca8eae814f2d33496a84193b68fc434faee94ec0b31d7d1f45790a41c9befcce4329a5e1f196194f9169fbbc921741c90001e6c0a978f2a092531e3c90a0043a87b641d9726903631abeeb6af57e2acf68839560db5a5285764b37102a370483b3980073454f0741a8f1481dd16923d4c29ffde71b7deb9752ba5f9f1e87a6f0935c2d688e14a73559f060fadaa47c5c54afc8f4d13856ac37b57f635a94e89ec25", &(0x7f0000000000)="7b9323179f256c018eebe3dac313c3c333765c447a7ed25dbaa5b388747ed1d0e4bb3ea9c29ffff5632ad2c5718a7f4cfbcd476a5e9a40d01adee648197c02"]}) 06:54:30 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1233.068306] FAULT_INJECTION: forcing a failure. [ 1233.068306] name failslab, interval 1, probability 0, space 0, times 0 06:54:30 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$search(0xa, r3, &(0x7f00000000c0)='ceph\x00', &(0x7f00000003c0)={'syz', 0x3}, r0) add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$clear(0x7, r1) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) (async) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r2) (async) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r1) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) (async) keyctl$search(0xa, r3, &(0x7f00000000c0)='ceph\x00', &(0x7f00000003c0)={'syz', 0x3}, r0) (async) 06:54:30 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) (async, rerun: 64) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (rerun: 64) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) (async) r3 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) (async) keyctl$search(0xa, r3, &(0x7f00000000c0)='ceph\x00', &(0x7f00000003c0)={'syz', 0x3}, r0) [ 1233.116808] CPU: 0 PID: 27909 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1233.124714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.134069] Call Trace: [ 1233.136676] dump_stack+0x1b2/0x281 [ 1233.140497] should_fail.cold+0x10a/0x149 [ 1233.144650] should_failslab+0xd6/0x130 [ 1233.148623] kmem_cache_alloc_node+0x263/0x410 [ 1233.153204] __alloc_skb+0x5c/0x510 [ 1233.156827] kobject_uevent_env+0x882/0xf30 [ 1233.161156] lo_ioctl+0x11a6/0x1cd0 [ 1233.164792] ? loop_set_status64+0xe0/0xe0 [ 1233.169037] blkdev_ioctl+0x540/0x1830 [ 1233.172931] ? blkpg_ioctl+0x8d0/0x8d0 [ 1233.176811] ? trace_hardirqs_on+0x10/0x10 [ 1233.181048] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1233.186170] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1233.191167] block_ioctl+0xd9/0x120 [ 1233.194781] ? blkdev_fallocate+0x3a0/0x3a0 [ 1233.199085] do_vfs_ioctl+0x75a/0xff0 [ 1233.202883] ? lock_acquire+0x170/0x3f0 [ 1233.206843] ? ioctl_preallocate+0x1a0/0x1a0 [ 1233.211260] ? __fget+0x265/0x3e0 [ 1233.214701] ? do_vfs_ioctl+0xff0/0xff0 [ 1233.218655] ? security_file_ioctl+0x83/0xb0 [ 1233.223044] SyS_ioctl+0x7f/0xb0 [ 1233.226388] ? do_vfs_ioctl+0xff0/0xff0 [ 1233.230340] do_syscall_64+0x1d5/0x640 [ 1233.234208] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1233.239374] RIP: 0033:0x7fe33b68cec7 [ 1233.243059] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1233.250744] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1233.257991] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1233.265236] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1233.272482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1233.279727] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1233.295415] FAULT_INJECTION: forcing a failure. [ 1233.295415] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.322429] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1233.345254] CPU: 1 PID: 27919 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1233.353163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.362520] Call Trace: [ 1233.365105] dump_stack+0x1b2/0x281 [ 1233.368734] should_fail.cold+0x10a/0x149 [ 1233.372890] should_failslab+0xd6/0x130 [ 1233.376866] __kmalloc+0x2c1/0x400 [ 1233.380403] ? ext4_find_extent+0x879/0xbc0 [ 1233.384725] ext4_find_extent+0x879/0xbc0 [ 1233.388877] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1233.394334] ext4_ext_map_blocks+0x19a/0x6b10 [ 1233.398841] ? __lock_acquire+0x5fc/0x3f20 [ 1233.403081] ? mark_buffer_dirty+0x95/0x480 [ 1233.407401] ? trace_hardirqs_on+0x10/0x10 [ 1233.411638] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 1233.416997] ? ext4_find_delalloc_cluster+0x180/0x180 [ 1233.422186] ? trace_hardirqs_on+0x10/0x10 [ 1233.426421] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 1233.431263] ? ext4_es_lookup_extent+0x321/0xac0 [ 1233.436040] ? lock_acquire+0x170/0x3f0 [ 1233.440042] ? lock_acquire+0x170/0x3f0 [ 1233.444022] ? ext4_map_blocks+0x623/0x1730 [ 1233.448349] ext4_map_blocks+0x675/0x1730 [ 1233.452503] ? ext4_issue_zeroout+0x150/0x150 [ 1233.456993] ? __ext4_new_inode+0x27c/0x4eb0 [ 1233.461410] ext4_getblk+0x98/0x3f0 [ 1233.465042] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1233.469355] ext4_bread+0x6c/0x1a0 [ 1233.472880] ? ext4_getblk+0x3f0/0x3f0 [ 1233.476759] ? dquot_initialize_needed+0x240/0x240 [ 1233.481717] ext4_append+0x143/0x350 [ 1233.485411] ext4_mkdir+0x4c9/0xbd0 [ 1233.489050] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1233.493726] ? security_inode_mkdir+0xca/0x100 [ 1233.498293] vfs_mkdir+0x463/0x6e0 [ 1233.501815] SyS_mkdirat+0x1fd/0x270 [ 1233.505512] ? SyS_mknod+0x30/0x30 [ 1233.509040] ? fput_many+0xe/0x140 [ 1233.512561] ? do_syscall_64+0x4c/0x640 [ 1233.516512] ? SyS_mknod+0x30/0x30 [ 1233.520033] do_syscall_64+0x1d5/0x640 [ 1233.523908] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1233.529073] RIP: 0033:0x7f10c0393217 [ 1233.532760] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1233.540451] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1233.547700] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1233.554960] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1233.562208] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 06:54:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 33) 06:54:31 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, 0x0) 06:54:31 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x4000000000000, 0xa000) read$snddsp(r0, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f0000000080)={0xfffff3c0, [0x6, 0xfffffff7, 0x40], [{0x3, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x6, 0xfa19, 0x0, 0x0, 0x1}, {0x7, 0x3, 0x1, 0x0, 0x1, 0x1}, {0x200, 0x5, 0x1, 0x1}, {0x9, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0xffff}, {0x0, 0x100}, {0x3, 0xe817, 0x1, 0x1, 0x1}, {0x1ff8000, 0x0, 0x1}, {0xd1, 0x8, 0x0, 0x1, 0x1}, {0x6, 0x20000, 0x1}, {0x6, 0x9, 0x1, 0x0, 0x1}], 0x8001}) syz_open_dev$sndpcmc(&(0x7f0000000040), 0x4000000000000, 0xa000) (async) read$snddsp(r0, 0x0, 0x0) (async) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f0000000080)={0xfffff3c0, [0x6, 0xfffffff7, 0x40], [{0x3, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x6, 0xfa19, 0x0, 0x0, 0x1}, {0x7, 0x3, 0x1, 0x0, 0x1, 0x1}, {0x200, 0x5, 0x1, 0x1}, {0x9, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0xffff}, {0x0, 0x100}, {0x3, 0xe817, 0x1, 0x1, 0x1}, {0x1ff8000, 0x0, 0x1}, {0xd1, 0x8, 0x0, 0x1, 0x1}, {0x6, 0x20000, 0x1}, {0x6, 0x9, 0x1, 0x0, 0x1}], 0x8001}) (async) [ 1233.569455] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 42) 06:54:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xfa, "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"}, &(0x7f0000000080)=0x102) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0xffffffff}, &(0x7f0000000300)=0x8) r2 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r2, &(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x1}, r3) 06:54:31 executing program 4: keyctl$join(0x1, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:31 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$search(0xa, r3, &(0x7f00000000c0)='ceph\x00', &(0x7f00000003c0)={'syz', 0x3}, r0) 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x4000000000000, 0xa000) read$snddsp(r0, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x3}) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f0000000080)={0xfffff3c0, [0x6, 0xfffffff7, 0x40], [{0x3, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x6, 0xfa19, 0x0, 0x0, 0x1}, {0x7, 0x3, 0x1, 0x0, 0x1, 0x1}, {0x200, 0x5, 0x1, 0x1}, {0x9, 0x3, 0x1, 0x1, 0x1, 0x1}, {0x3f, 0xffff}, {0x0, 0x100}, {0x3, 0xe817, 0x1, 0x1, 0x1}, {0x1ff8000, 0x0, 0x1}, {0xd1, 0x8, 0x0, 0x1, 0x1}, {0x6, 0x20000, 0x1}, {0x6, 0x9, 0x1, 0x0, 0x1}], 0x8001}) 06:54:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async, rerun: 64) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xfa, "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"}, &(0x7f0000000080)=0x102) (rerun: 64) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0xffffffff}, &(0x7f0000000300)=0x8) (async) r2 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async, rerun: 32) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (rerun: 32) add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r2, &(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x1}, r3) [ 1233.657921] FAULT_INJECTION: forcing a failure. [ 1233.657921] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.667758] FAULT_INJECTION: forcing a failure. [ 1233.667758] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.720046] CPU: 1 PID: 27979 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1233.727952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.737307] Call Trace: [ 1233.739898] dump_stack+0x1b2/0x281 [ 1233.743527] should_fail.cold+0x10a/0x149 [ 1233.747677] should_failslab+0xd6/0x130 [ 1233.751654] kmem_cache_alloc+0x28e/0x3c0 [ 1233.755801] ext4_mb_new_blocks+0x514/0x3db0 [ 1233.760211] ? ext4_find_extent+0x6f7/0xbc0 [ 1233.764530] ? ext4_ext_search_right+0x2bc/0xaa0 [ 1233.769282] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 1233.774296] ext4_ext_map_blocks+0x2845/0x6b10 [ 1233.778986] ? __lock_acquire+0x5fc/0x3f20 [ 1233.783239] ? mark_buffer_dirty+0x95/0x480 [ 1233.787550] ? trace_hardirqs_on+0x10/0x10 [ 1233.791784] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 1233.797147] ? ext4_find_delalloc_cluster+0x180/0x180 [ 1233.802322] ? trace_hardirqs_on+0x10/0x10 [ 1233.806548] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 1233.811391] ? ext4_es_lookup_extent+0x321/0xac0 [ 1233.816145] ? lock_acquire+0x170/0x3f0 [ 1233.820121] ext4_map_blocks+0x675/0x1730 [ 1233.824264] ? ext4_issue_zeroout+0x150/0x150 [ 1233.828753] ? __ext4_new_inode+0x27c/0x4eb0 [ 1233.833164] ext4_getblk+0x98/0x3f0 [ 1233.836780] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1233.841096] ext4_bread+0x6c/0x1a0 [ 1233.844632] ? ext4_getblk+0x3f0/0x3f0 [ 1233.848507] ? dquot_initialize_needed+0x240/0x240 [ 1233.853426] ext4_append+0x143/0x350 [ 1233.857139] ext4_mkdir+0x4c9/0xbd0 [ 1233.860767] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1233.865436] ? security_inode_mkdir+0xca/0x100 06:54:31 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$search(0xa, r3, &(0x7f00000000c0)='ceph\x00', &(0x7f00000003c0)={'syz', 0x3}, r0) 06:54:31 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r1) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) keyctl$search(0xa, r3, &(0x7f00000000c0)='ceph\x00', &(0x7f00000003c0)={'syz', 0x3}, r0) [ 1233.870031] vfs_mkdir+0x463/0x6e0 [ 1233.873573] SyS_mkdirat+0x1fd/0x270 [ 1233.877281] ? SyS_mknod+0x30/0x30 [ 1233.880810] ? fput_many+0xe/0x140 [ 1233.884342] ? do_syscall_64+0x4c/0x640 [ 1233.888319] ? SyS_mknod+0x30/0x30 [ 1233.891861] do_syscall_64+0x1d5/0x640 [ 1233.895742] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1233.901016] RIP: 0033:0x7f10c0393217 [ 1233.904710] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1233.912414] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1233.919673] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1233.926935] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1233.934198] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1233.941460] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1233.969033] CPU: 0 PID: 27971 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1233.976941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.986291] Call Trace: [ 1233.988888] dump_stack+0x1b2/0x281 [ 1233.992524] should_fail.cold+0x10a/0x149 [ 1233.996671] should_failslab+0xd6/0x130 [ 1234.000644] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1234.005397] ? kobj_ns_drop+0x80/0x80 [ 1234.009195] call_usermodehelper_setup+0x73/0x2e0 [ 1234.014050] kobject_uevent_env+0xc21/0xf30 [ 1234.018377] lo_ioctl+0x11a6/0x1cd0 [ 1234.022010] ? loop_set_status64+0xe0/0xe0 [ 1234.026241] blkdev_ioctl+0x540/0x1830 [ 1234.030122] ? blkpg_ioctl+0x8d0/0x8d0 [ 1234.033998] ? trace_hardirqs_on+0x10/0x10 [ 1234.038216] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1234.043299] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1234.048296] block_ioctl+0xd9/0x120 [ 1234.051899] ? blkdev_fallocate+0x3a0/0x3a0 [ 1234.056199] do_vfs_ioctl+0x75a/0xff0 [ 1234.059981] ? lock_acquire+0x170/0x3f0 [ 1234.063931] ? ioctl_preallocate+0x1a0/0x1a0 [ 1234.068321] ? __fget+0x265/0x3e0 [ 1234.071752] ? do_vfs_ioctl+0xff0/0xff0 [ 1234.075705] ? security_file_ioctl+0x83/0xb0 [ 1234.080089] SyS_ioctl+0x7f/0xb0 [ 1234.083434] ? do_vfs_ioctl+0xff0/0xff0 [ 1234.087391] do_syscall_64+0x1d5/0x640 [ 1234.091256] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1234.096434] RIP: 0033:0x7fe33b68cec7 [ 1234.100139] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1234.107946] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 06:54:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 34) 06:54:31 executing program 4: keyctl$join(0x1, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:31 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xfa, "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"}, &(0x7f0000000080)=0x102) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0xffffffff}, &(0x7f0000000300)=0x8) r2 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r2, &(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x1}, r3) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xfa, "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"}, &(0x7f0000000080)=0x102) (async) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0xffffffff}, &(0x7f0000000300)=0x8) (async) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r0) (async) keyctl$search(0xa, r2, &(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x1}, r3) (async) 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500, 0x241, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r1, 0x0) 06:54:31 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) 06:54:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 43) [ 1234.115194] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1234.122440] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1234.129694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1234.136950] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1234.152615] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500, 0x241, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r1, 0x0) 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500, 0x241, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r1, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500, 0x241, &(0x7f00000000c0)) (async) setreuid(r1, 0x0) (async) [ 1234.248315] FAULT_INJECTION: forcing a failure. [ 1234.248315] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.274399] CPU: 0 PID: 28024 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1234.282302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.291644] Call Trace: [ 1234.294227] dump_stack+0x1b2/0x281 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2, 0x11) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000180)) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x6, 0x3, 0x1, 0x7, 0x8, 0xfffffffd, {0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x2, 0x6, 0x1a0a, 0x1f}}, &(0x7f0000000040)=0xb0) ioperm(0x2, 0xa56, 0x100000001) read$snddsp(r0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$SNDRV_PCM_IOCTL_UNLINK(r2, 0x4161, 0x0) 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2, 0x11) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000180)) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x6, 0x3, 0x1, 0x7, 0x8, 0xfffffffd, {0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x2, 0x6, 0x1a0a, 0x1f}}, &(0x7f0000000040)=0xb0) ioperm(0x2, 0xa56, 0x100000001) read$snddsp(r0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$SNDRV_PCM_IOCTL_UNLINK(r2, 0x4161, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2, 0x11) (async) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000180)) (async) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) (async) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x6, 0x3, 0x1, 0x7, 0x8, 0xfffffffd, {0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x2, 0x6, 0x1a0a, 0x1f}}, &(0x7f0000000040)=0xb0) (async) ioperm(0x2, 0xa56, 0x100000001) (async) read$snddsp(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$SNDRV_PCM_IOCTL_UNLINK(r2, 0x4161, 0x0) (async) 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2, 0x11) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000180)) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x6, 0x3, 0x1, 0x7, 0x8, 0xfffffffd, {0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x2, 0x6, 0x1a0a, 0x1f}}, &(0x7f0000000040)=0xb0) ioperm(0x2, 0xa56, 0x100000001) read$snddsp(r0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) ioctl$SNDRV_PCM_IOCTL_UNLINK(r2, 0x4161, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2, 0x11) (async) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000180)) (async) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) (async) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x6, 0x3, 0x1, 0x7, 0x8, 0xfffffffd, {0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x2, 0x6, 0x1a0a, 0x1f}}, &(0x7f0000000040)=0xb0) (async) ioperm(0x2, 0xa56, 0x100000001) (async) read$snddsp(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) (async) ioctl$SNDRV_PCM_IOCTL_UNLINK(r2, 0x4161, 0x0) (async) [ 1234.297860] should_fail.cold+0x10a/0x149 [ 1234.302011] should_failslab+0xd6/0x130 [ 1234.305992] kmem_cache_alloc_node+0x263/0x410 [ 1234.311361] __alloc_skb+0x5c/0x510 [ 1234.314996] kobject_uevent_env+0x882/0xf30 [ 1234.319321] lo_ioctl+0x11a6/0x1cd0 [ 1234.322949] ? loop_set_status64+0xe0/0xe0 [ 1234.327181] blkdev_ioctl+0x540/0x1830 [ 1234.331065] ? blkpg_ioctl+0x8d0/0x8d0 [ 1234.334943] ? trace_hardirqs_on+0x10/0x10 [ 1234.339178] ? _raw_spin_unlock_irqrestore+0x66/0xe0 06:54:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r0, 0x4147, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x2000, 0x8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x20, 0x1f], [{0x3, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x7, 0xfff}, {0x1000, 0x6, 0x0, 0x1, 0x0, 0x1}, {0x200, 0x2, 0x1, 0x1, 0x0, 0x1}, {0xfffffff6, 0xaf, 0x1, 0x0, 0x1, 0x1}, {0xfffffff9, 0x7ff, 0x0, 0x1, 0x1}, {0x7cd, 0x7fff, 0x0, 0x1, 0x1, 0x1}, {0x1000, 0x47b8, 0x1, 0x1, 0x1}, {0xff, 0xed, 0x1, 0x1, 0x1}, {0x3f, 0xf2, 0x0, 0x1, 0x0, 0x1}, {0x9, 0x3f, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1}], 0xb7}) [ 1234.344280] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1234.349301] block_ioctl+0xd9/0x120 [ 1234.352925] ? blkdev_fallocate+0x3a0/0x3a0 [ 1234.357242] do_vfs_ioctl+0x75a/0xff0 [ 1234.361035] ? lock_acquire+0x170/0x3f0 [ 1234.365012] ? ioctl_preallocate+0x1a0/0x1a0 [ 1234.369420] ? __fget+0x265/0x3e0 [ 1234.372870] ? do_vfs_ioctl+0xff0/0xff0 [ 1234.376845] ? security_file_ioctl+0x83/0xb0 [ 1234.381249] SyS_ioctl+0x7f/0xb0 [ 1234.384599] ? do_vfs_ioctl+0xff0/0xff0 [ 1234.388559] do_syscall_64+0x1d5/0x640 [ 1234.392439] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1234.397611] RIP: 0033:0x7fe33b68cec7 [ 1234.401312] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1234.409002] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1234.416252] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1234.423502] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1234.430763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1234.438016] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1234.459535] FAULT_INJECTION: forcing a failure. [ 1234.459535] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.471003] CPU: 0 PID: 28025 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1234.478889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.488241] Call Trace: [ 1234.490831] dump_stack+0x1b2/0x281 [ 1234.494470] should_fail.cold+0x10a/0x149 [ 1234.498622] should_failslab+0xd6/0x130 [ 1234.502600] kmem_cache_alloc+0x40/0x3c0 [ 1234.506658] __es_insert_extent+0x338/0x1360 [ 1234.511078] ext4_es_insert_extent+0x1b9/0x530 [ 1234.515661] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1234.521464] ext4_map_blocks+0x887/0x1730 [ 1234.525613] ? ext4_issue_zeroout+0x150/0x150 [ 1234.530109] ? __ext4_new_inode+0x27c/0x4eb0 [ 1234.534523] ext4_getblk+0x98/0x3f0 [ 1234.538147] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1234.542474] ext4_bread+0x6c/0x1a0 [ 1234.546011] ? ext4_getblk+0x3f0/0x3f0 [ 1234.549893] ? dquot_initialize_needed+0x240/0x240 [ 1234.554821] ext4_append+0x143/0x350 [ 1234.558535] ext4_mkdir+0x4c9/0xbd0 [ 1234.562164] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1234.566831] ? security_inode_mkdir+0xca/0x100 [ 1234.571428] vfs_mkdir+0x463/0x6e0 [ 1234.574972] SyS_mkdirat+0x1fd/0x270 [ 1234.578683] ? SyS_mknod+0x30/0x30 [ 1234.582217] ? fput_many+0xe/0x140 [ 1234.584256] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1234.585749] ? do_syscall_64+0x4c/0x640 [ 1234.585760] ? SyS_mknod+0x30/0x30 [ 1234.585770] do_syscall_64+0x1d5/0x640 [ 1234.585785] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1234.585795] RIP: 0033:0x7f10c0393217 [ 1234.611608] RSP: 002b:00007f10bed08f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1234.619301] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393217 [ 1234.626548] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1234.633798] RBP: 00007f10bed091d0 R08: 0000000000000000 R09: 00007f10bed091d0 [ 1234.641050] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1234.648303] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 35) 06:54:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r0, 0x4147, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x2000, 0x8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x20, 0x1f], [{0x3, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x7, 0xfff}, {0x1000, 0x6, 0x0, 0x1, 0x0, 0x1}, {0x200, 0x2, 0x1, 0x1, 0x0, 0x1}, {0xfffffff6, 0xaf, 0x1, 0x0, 0x1, 0x1}, {0xfffffff9, 0x7ff, 0x0, 0x1, 0x1}, {0x7cd, 0x7fff, 0x0, 0x1, 0x1, 0x1}, {0x1000, 0x47b8, 0x1, 0x1, 0x1}, {0xff, 0xed, 0x1, 0x1, 0x1}, {0x3f, 0xf2, 0x0, 0x1, 0x0, 0x1}, {0x9, 0x3f, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1}], 0xb7}) 06:54:32 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 06:54:32 executing program 4: keyctl$join(0x1, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x0, 0x0, @auto=[0x1e, 0x29, 0x1e, 0x3f, 0x31]}, 0xd, r2) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x2, 0x3, 0x23e}) [ 1234.657738] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 44) 06:54:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r0, 0x4147, 0x0) (async, rerun: 64) read$snddsp(r0, 0x0, 0x0) (async, rerun: 64) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x2000, 0x8) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f00000000c0)={0x5, [0x20, 0x1f], [{0x3, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x7, 0xfff}, {0x1000, 0x6, 0x0, 0x1, 0x0, 0x1}, {0x200, 0x2, 0x1, 0x1, 0x0, 0x1}, {0xfffffff6, 0xaf, 0x1, 0x0, 0x1, 0x1}, {0xfffffff9, 0x7ff, 0x0, 0x1, 0x1}, {0x7cd, 0x7fff, 0x0, 0x1, 0x1, 0x1}, {0x1000, 0x47b8, 0x1, 0x1, 0x1}, {0xff, 0xed, 0x1, 0x1, 0x1}, {0x3f, 0xf2, 0x0, 0x1, 0x0, 0x1}, {0x9, 0x3f, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1}], 0xb7}) 06:54:32 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, r0) 06:54:32 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async, rerun: 32) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (rerun: 32) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x0, 0x0, @auto=[0x1e, 0x29, 0x1e, 0x3f, 0x31]}, 0xd, r2) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x2, 0x3, 0x23e}) [ 1234.748482] FAULT_INJECTION: forcing a failure. [ 1234.748482] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.782477] FAULT_INJECTION: forcing a failure. [ 1234.782477] name failslab, interval 1, probability 0, space 0, times 0 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)={0x0, 0x0, @auto=[0x1e, 0x29, 0x1e, 0x3f, 0x31]}, 0xd, r2) (async) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x2, 0x3, 0x23e}) [ 1234.790053] CPU: 0 PID: 28099 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1234.801560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.810903] Call Trace: [ 1234.813487] dump_stack+0x1b2/0x281 [ 1234.817117] should_fail.cold+0x10a/0x149 [ 1234.821260] should_failslab+0xd6/0x130 [ 1234.825235] kmem_cache_alloc+0x28e/0x3c0 [ 1234.829385] getname_flags+0xc8/0x550 [ 1234.833180] SyS_mkdirat+0x83/0x270 [ 1234.836793] ? SyS_mknod+0x30/0x30 [ 1234.840321] ? fput_many+0xe/0x140 [ 1234.843850] ? do_syscall_64+0x4c/0x640 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x50, 0xfffffffffffffffa) keyctl$search(0xa, r1, &(0x7f0000000180)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) keyctl$search(0xa, r1, &(0x7f0000000100)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, r1) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e90cfd31b77593fc69fcb853fa7ef892362d5e1f77ecfbff0e33cee8e5fe757056d610d7bac318de76ed376f", 0x2c, 0xffffffffffffffff) [ 1234.847811] ? SyS_mknod+0x30/0x30 [ 1234.851341] do_syscall_64+0x1d5/0x640 [ 1234.855215] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1234.860389] RIP: 0033:0x7fe33b68c217 [ 1234.864085] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1234.871784] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1234.879042] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1234.886297] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1234.893549] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1234.900898] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1234.933571] CPU: 1 PID: 28105 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1234.941471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.950822] Call Trace: [ 1234.953413] dump_stack+0x1b2/0x281 [ 1234.957050] should_fail.cold+0x10a/0x149 [ 1234.961209] should_failslab+0xd6/0x130 [ 1234.965186] __kmalloc_track_caller+0x2bc/0x400 [ 1234.969849] ? strndup_user+0x5b/0xf0 [ 1234.973648] memdup_user+0x22/0xa0 [ 1234.977189] strndup_user+0x5b/0xf0 [ 1234.980820] ? copy_mnt_ns+0xa30/0xa30 [ 1234.984708] SyS_mount+0x39/0x120 [ 1234.988156] ? copy_mnt_ns+0xa30/0xa30 [ 1234.992049] do_syscall_64+0x1d5/0x640 06:54:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 36) 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x50, 0xfffffffffffffffa) keyctl$search(0xa, r1, &(0x7f0000000180)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) keyctl$search(0xa, r1, &(0x7f0000000100)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, r1) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e90cfd31b77593fc69fcb853fa7ef892362d5e1f77ecfbff0e33cee8e5fe757056d610d7bac318de76ed376f", 0x2c, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x50, 0xfffffffffffffffa) (async) keyctl$search(0xa, r1, &(0x7f0000000180)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) (async) keyctl$search(0xa, r1, &(0x7f0000000100)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, r1) (async) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e90cfd31b77593fc69fcb853fa7ef892362d5e1f77ecfbff0e33cee8e5fe757056d610d7bac318de76ed376f", 0x2c, 0xffffffffffffffff) (async) 06:54:32 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:32 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x5, 0x60b01) read$snddsp(r0, 0x0, 0x0) [ 1234.995939] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1235.001123] RIP: 0033:0x7f10c039563a [ 1235.004824] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1235.012553] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1235.019821] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1235.027082] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1235.034348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1235.041611] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 45) 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x50, 0xfffffffffffffffa) keyctl$search(0xa, r1, &(0x7f0000000180)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) keyctl$search(0xa, r1, &(0x7f0000000100)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, r1) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e90cfd31b77593fc69fcb853fa7ef892362d5e1f77ecfbff0e33cee8e5fe757056d610d7bac318de76ed376f", 0x2c, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x50, 0xfffffffffffffffa) (async) keyctl$search(0xa, r1, &(0x7f0000000180)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) (async) keyctl$search(0xa, r1, &(0x7f0000000100)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x0}, r1) (async) add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e90cfd31b77593fc69fcb853fa7ef892362d5e1f77ecfbff0e33cee8e5fe757056d610d7bac318de76ed376f", 0x2c, 0xffffffffffffffff) (async) 06:54:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x5, 0x60b01) read$snddsp(r0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x5, 0x60b01) (async) read$snddsp(r0, 0x0, 0x0) (async) [ 1235.142316] FAULT_INJECTION: forcing a failure. [ 1235.142316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1235.154225] CPU: 0 PID: 28150 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1235.162101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.171460] Call Trace: [ 1235.174050] dump_stack+0x1b2/0x281 [ 1235.177689] should_fail.cold+0x10a/0x149 [ 1235.181837] __alloc_pages_nodemask+0x22c/0x2720 [ 1235.186599] ? kobject_uevent_env+0x274/0xf30 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, &(0x7f0000000200)={0x0, 0x1, r2}) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r3, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x5, 0x60b01) read$snddsp(r0, 0x0, 0x0) [ 1235.191099] ? __lock_acquire+0x5fc/0x3f20 [ 1235.195334] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1235.200178] ? blkdev_ioctl+0xf4/0x1830 [ 1235.204158] ? blkpg_ioctl+0x8d0/0x8d0 [ 1235.208048] ? trace_hardirqs_on+0x10/0x10 [ 1235.208960] FAULT_INJECTION: forcing a failure. [ 1235.208960] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.212281] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1235.212295] cache_grow_begin+0x91/0x700 [ 1235.212304] ? fs_reclaim_release+0xd0/0x110 [ 1235.212315] ? check_preemption_disabled+0x35/0x240 [ 1235.212329] cache_alloc_refill+0x273/0x350 [ 1235.246330] kmem_cache_alloc+0x333/0x3c0 [ 1235.250460] getname_flags+0xc8/0x550 [ 1235.254243] SyS_mkdirat+0x83/0x270 [ 1235.257852] ? SyS_mknod+0x30/0x30 [ 1235.261371] ? fput_many+0xe/0x140 [ 1235.264896] ? do_syscall_64+0x4c/0x640 [ 1235.268884] ? SyS_mknod+0x30/0x30 [ 1235.272408] do_syscall_64+0x1d5/0x640 [ 1235.276278] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1235.281446] RIP: 0033:0x7fe33b68c217 [ 1235.285136] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1235.292834] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1235.300081] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1235.307330] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1235.314579] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1235.321829] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1235.329103] CPU: 1 PID: 28151 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1235.337328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.346677] Call Trace: [ 1235.349270] dump_stack+0x1b2/0x281 [ 1235.352901] should_fail.cold+0x10a/0x149 [ 1235.357047] should_failslab+0xd6/0x130 [ 1235.361021] __kmalloc_track_caller+0x2bc/0x400 [ 1235.365694] ? strndup_user+0x5b/0xf0 [ 1235.369501] memdup_user+0x22/0xa0 [ 1235.373039] strndup_user+0x5b/0xf0 [ 1235.376667] ? copy_mnt_ns+0xa30/0xa30 [ 1235.380552] SyS_mount+0x68/0x120 [ 1235.384006] ? copy_mnt_ns+0xa30/0xa30 [ 1235.387892] do_syscall_64+0x1d5/0x640 [ 1235.391782] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1235.396966] RIP: 0033:0x7f10c039563a [ 1235.400669] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1235.408372] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1235.415642] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1235.422908] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1235.430177] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 06:54:32 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:32 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1235.437458] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1235.443172] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 37) 06:54:32 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async, rerun: 32) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 32) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 64) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) (rerun: 64) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, &(0x7f0000000200)={0x0, 0x1, r2}) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r3, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:32 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, 0x0) 06:54:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x73, 0x280300) read$snddsp(r0, 0x0, 0x0) 06:54:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 46) 06:54:33 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, 0x0) 06:54:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x73, 0x280300) read$snddsp(r0, 0x0, 0x0) 06:54:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, &(0x7f0000000200)={0x0, 0x1, r2}) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0xa, r3, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r1, 0xc01064c2, &(0x7f0000000200)={0x0, 0x1, r2}) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) (async) keyctl$search(0xa, r3, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) [ 1235.590138] FAULT_INJECTION: forcing a failure. [ 1235.590138] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.602901] CPU: 0 PID: 28197 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1235.610808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.620159] Call Trace: [ 1235.622748] dump_stack+0x1b2/0x281 [ 1235.626388] should_fail.cold+0x10a/0x149 [ 1235.630540] should_failslab+0xd6/0x130 [ 1235.634517] kmem_cache_alloc_node_trace+0x25a/0x400 06:54:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x73, 0x280300) read$snddsp(r0, 0x0, 0x0) 06:54:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)={r0, 0x9}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f00000000c0)={0x80, [0x8, 0x78d57f68, 0x9], [{0x40b, 0xfff, 0x0, 0x0, 0x1, 0x1}, {0x8, 0xd30, 0x0, 0x1, 0x0, 0x1}, {0x3, 0x9, 0x1, 0x1, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x0, 0x1}, {0x10000, 0x7, 0x1, 0x0, 0x1, 0x1}, {0x10001, 0x337}, {0xfff, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x68}, {0xffff, 0x7, 0x0, 0x1, 0x1}, {0x3ff, 0xb5, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x1, 0x1, 0x1, 0x1, 0x1}, {0x2005, 0x7}], 0x40}) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000200)={0x0, &(0x7f00000001c0)=[&(0x7f0000000000)="a3794fc21cb81e20b220b72e59ae2b96972a47baa60316d1229fea08f3e4ec2a94bb467c8d1d0c5afe4bdf2a7bb49377479f2a48bedbeb0b806940c8256b56183da604d6a51fb5d7ae1721574a530456a01d62d4f12402c9fe973564761c2cc5c69b2de48e866d62b8549383818ecc6f93c13908"]}) read$snddsp(r1, 0x0, 0x0) 06:54:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1235.639628] __kmalloc_node_track_caller+0x38/0x70 [ 1235.644557] __alloc_skb+0x96/0x510 [ 1235.648182] kobject_uevent_env+0x882/0xf30 [ 1235.652511] lo_ioctl+0x11a6/0x1cd0 [ 1235.656137] ? loop_set_status64+0xe0/0xe0 [ 1235.660378] blkdev_ioctl+0x540/0x1830 [ 1235.664263] ? blkpg_ioctl+0x8d0/0x8d0 [ 1235.668144] ? trace_hardirqs_on+0x10/0x10 [ 1235.672378] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1235.677477] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1235.682516] block_ioctl+0xd9/0x120 [ 1235.686140] ? blkdev_fallocate+0x3a0/0x3a0 [ 1235.690457] do_vfs_ioctl+0x75a/0xff0 [ 1235.694263] ? lock_acquire+0x170/0x3f0 [ 1235.698233] ? ioctl_preallocate+0x1a0/0x1a0 [ 1235.702642] ? __fget+0x265/0x3e0 [ 1235.706089] ? do_vfs_ioctl+0xff0/0xff0 [ 1235.710061] ? security_file_ioctl+0x83/0xb0 [ 1235.714466] SyS_ioctl+0x7f/0xb0 [ 1235.717827] ? do_vfs_ioctl+0xff0/0xff0 [ 1235.721820] do_syscall_64+0x1d5/0x640 [ 1235.725719] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1235.730886] RIP: 0033:0x7fe33b68cec7 [ 1235.734577] RSP: 002b:00007fe33a001f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1235.742267] RAX: ffffffffffffffda RBX: 00007fe33b6d6a20 RCX: 00007fe33b68cec7 [ 1235.749528] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1235.756790] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1235.764033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1235.771280] R13: 0000000000000004 R14: 0000000020000480 R15: 0000000000000000 [ 1235.788362] FAULT_INJECTION: forcing a failure. [ 1235.788362] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.806226] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1235.812275] CPU: 0 PID: 28199 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1235.820157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1235.829507] Call Trace: [ 1235.832096] dump_stack+0x1b2/0x281 [ 1235.835741] should_fail.cold+0x10a/0x149 [ 1235.839888] should_failslab+0xd6/0x130 [ 1235.843861] kmem_cache_alloc+0x28e/0x3c0 [ 1235.848015] getname_flags+0xc8/0x550 [ 1235.851811] ? __do_page_fault+0x159/0xad0 [ 1235.856048] user_path_at_empty+0x2a/0x50 [ 1235.860196] do_mount+0x118/0x2a30 [ 1235.863739] ? __do_page_fault+0x159/0xad0 [ 1235.867975] ? retint_kernel+0x2d/0x2d [ 1235.871859] ? copy_mount_string+0x40/0x40 [ 1235.876093] ? memset+0x20/0x40 [ 1235.879370] ? copy_mount_options+0x1fa/0x2f0 [ 1235.883862] ? copy_mnt_ns+0xa30/0xa30 [ 1235.887750] SyS_mount+0xa8/0x120 [ 1235.891198] ? copy_mnt_ns+0xa30/0xa30 [ 1235.895085] do_syscall_64+0x1d5/0x640 [ 1235.898975] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1235.904157] RIP: 0033:0x7f10c039563a [ 1235.907858] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1235.915558] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1235.922822] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1235.930086] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 06:54:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 38) 06:54:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)={r0, 0x9}) (async) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f00000000c0)={0x80, [0x8, 0x78d57f68, 0x9], [{0x40b, 0xfff, 0x0, 0x0, 0x1, 0x1}, {0x8, 0xd30, 0x0, 0x1, 0x0, 0x1}, {0x3, 0x9, 0x1, 0x1, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x0, 0x1}, {0x10000, 0x7, 0x1, 0x0, 0x1, 0x1}, {0x10001, 0x337}, {0xfff, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x68}, {0xffff, 0x7, 0x0, 0x1, 0x1}, {0x3ff, 0xb5, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x1, 0x1, 0x1, 0x1, 0x1}, {0x2005, 0x7}], 0x40}) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000200)={0x0, &(0x7f00000001c0)=[&(0x7f0000000000)="a3794fc21cb81e20b220b72e59ae2b96972a47baa60316d1229fea08f3e4ec2a94bb467c8d1d0c5afe4bdf2a7bb49377479f2a48bedbeb0b806940c8256b56183da604d6a51fb5d7ae1721574a530456a01d62d4f12402c9fe973564761c2cc5c69b2de48e866d62b8549383818ecc6f93c13908"]}) (async) read$snddsp(r1, 0x0, 0x0) 06:54:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) (async) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:33 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:33 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, 0x0) 06:54:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 47) [ 1235.937348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1235.944610] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:33 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:33 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) (async) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$search(0xa, r3, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1236.028118] FAULT_INJECTION: forcing a failure. [ 1236.028118] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.054547] FAULT_INJECTION: forcing a failure. [ 1236.054547] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1236.066368] CPU: 1 PID: 28257 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 06:54:33 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)={r0, 0x9}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f00000000c0)={0x80, [0x8, 0x78d57f68, 0x9], [{0x40b, 0xfff, 0x0, 0x0, 0x1, 0x1}, {0x8, 0xd30, 0x0, 0x1, 0x0, 0x1}, {0x3, 0x9, 0x1, 0x1, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x0, 0x1}, {0x10000, 0x7, 0x1, 0x0, 0x1, 0x1}, {0x10001, 0x337}, {0xfff, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x68}, {0xffff, 0x7, 0x0, 0x1, 0x1}, {0x3ff, 0xb5, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x1, 0x1, 0x1, 0x1, 0x1}, {0x2005, 0x7}], 0x40}) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000200)={0x0, &(0x7f00000001c0)=[&(0x7f0000000000)="a3794fc21cb81e20b220b72e59ae2b96972a47baa60316d1229fea08f3e4ec2a94bb467c8d1d0c5afe4bdf2a7bb49377479f2a48bedbeb0b806940c8256b56183da604d6a51fb5d7ae1721574a530456a01d62d4f12402c9fe973564761c2cc5c69b2de48e866d62b8549383818ecc6f93c13908"]}) read$snddsp(r1, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000240)={r0, 0x9}) (async) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f00000000c0)={0x80, [0x8, 0x78d57f68, 0x9], [{0x40b, 0xfff, 0x0, 0x0, 0x1, 0x1}, {0x8, 0xd30, 0x0, 0x1, 0x0, 0x1}, {0x3, 0x9, 0x1, 0x1, 0x1, 0x1}, {0x5, 0x6, 0x1, 0x0, 0x1}, {0x10000, 0x7, 0x1, 0x0, 0x1, 0x1}, {0x10001, 0x337}, {0xfff, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x68}, {0xffff, 0x7, 0x0, 0x1, 0x1}, {0x3ff, 0xb5, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x1, 0x1, 0x1, 0x1, 0x1}, {0x2005, 0x7}], 0x40}) (async) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000200)={0x0, &(0x7f00000001c0)=[&(0x7f0000000000)="a3794fc21cb81e20b220b72e59ae2b96972a47baa60316d1229fea08f3e4ec2a94bb467c8d1d0c5afe4bdf2a7bb49377479f2a48bedbeb0b806940c8256b56183da604d6a51fb5d7ae1721574a530456a01d62d4f12402c9fe973564761c2cc5c69b2de48e866d62b8549383818ecc6f93c13908"]}) (async) read$snddsp(r1, 0x0, 0x0) (async) [ 1236.074245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.083598] Call Trace: [ 1236.086188] dump_stack+0x1b2/0x281 [ 1236.089816] should_fail.cold+0x10a/0x149 [ 1236.093969] __alloc_pages_nodemask+0x22c/0x2720 [ 1236.098738] ? __lock_acquire+0x5fc/0x3f20 [ 1236.102980] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1236.107828] ? trace_hardirqs_on+0x10/0x10 [ 1236.112064] ? trace_hardirqs_on+0x10/0x10 [ 1236.116304] ? reacquire_held_locks+0xb5/0x3f0 [ 1236.120886] ? dput.part.0+0x3b4/0x710 [ 1236.124772] ? list_lru_add+0x22a/0x490 06:54:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$clear(0x7, 0xfffffffffffffffa) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) r2 = epoll_create(0x1) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000240)={0x80000014}) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x5) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x7f, 0x1, [0x50]}, &(0x7f00000000c0)=0xa) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r4, 0xd2ca, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r5, 0x6f}, 0xc) [ 1236.128751] cache_grow_begin+0x91/0x700 [ 1236.132800] ? fs_reclaim_release+0xd0/0x110 [ 1236.137207] ? check_preemption_disabled+0x35/0x240 [ 1236.142222] cache_alloc_refill+0x273/0x350 [ 1236.146548] kmem_cache_alloc_trace+0x340/0x3d0 [ 1236.151211] ? copy_mnt_ns+0xa30/0xa30 [ 1236.155095] copy_mount_options+0x59/0x2f0 [ 1236.159320] ? copy_mnt_ns+0xa30/0xa30 [ 1236.163199] SyS_mount+0x84/0x120 [ 1236.166642] ? copy_mnt_ns+0xa30/0xa30 [ 1236.170525] do_syscall_64+0x1d5/0x640 [ 1236.174410] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1236.179588] RIP: 0033:0x7f10c039563a [ 1236.183289] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1236.190989] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1236.198249] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1236.205507] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1236.212763] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1236.220026] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1236.227707] CPU: 0 PID: 28254 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1236.235594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.244939] Call Trace: [ 1236.247522] dump_stack+0x1b2/0x281 [ 1236.251153] should_fail.cold+0x10a/0x149 [ 1236.255307] should_failslab+0xd6/0x130 [ 1236.259281] kmem_cache_alloc+0x28e/0x3c0 [ 1236.263429] ? ext4_sync_fs+0x7e0/0x7e0 [ 1236.267401] ext4_alloc_inode+0x1a/0x640 [ 1236.271456] ? ext4_sync_fs+0x7e0/0x7e0 [ 1236.275432] alloc_inode+0x5d/0x170 [ 1236.279055] new_inode+0x1d/0xf0 [ 1236.282424] __ext4_new_inode+0x360/0x4eb0 [ 1236.286657] ? kmem_cache_free+0x7c/0x2b0 [ 1236.290797] ? putname+0xcd/0x110 [ 1236.294247] ? SyS_mkdirat+0x95/0x270 [ 1236.298045] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1236.303410] ? ext4_free_inode+0x1460/0x1460 [ 1236.307819] ? lock_downgrade+0x740/0x740 [ 1236.311969] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1236.317069] ? dquot_initialize_needed+0x240/0x240 [ 1236.321998] ext4_mkdir+0x2e4/0xbd0 [ 1236.325627] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1236.330294] ? security_inode_mkdir+0xca/0x100 [ 1236.334875] vfs_mkdir+0x463/0x6e0 [ 1236.338411] SyS_mkdirat+0x1fd/0x270 [ 1236.342119] ? SyS_mknod+0x30/0x30 [ 1236.345652] ? fput_many+0xe/0x140 [ 1236.349186] ? do_syscall_64+0x4c/0x640 [ 1236.353162] ? SyS_mknod+0x30/0x30 [ 1236.356700] do_syscall_64+0x1d5/0x640 [ 1236.360588] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1236.365779] RIP: 0033:0x7fe33b68c217 [ 1236.369486] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1236.376531] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1236.377184] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1236.377191] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1236.377202] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1236.377206] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1236.377214] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 06:54:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 39) 06:54:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$clear(0x7, 0xfffffffffffffffa) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) r2 = epoll_create(0x1) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000240)={0x80000014}) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x5) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x7f, 0x1, [0x50]}, &(0x7f00000000c0)=0xa) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r4, 0xd2ca, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r5, 0x6f}, 0xc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) keyctl$clear(0x7, 0xfffffffffffffffa) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) epoll_create(0x1) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) (async) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) (async) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000240)={0x80000014}) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x5) (async) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x7f, 0x1, [0x50]}, &(0x7f00000000c0)=0xa) (async) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r4, 0xd2ca, 0x20}, &(0x7f0000000200)=0xc) (async) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r5, 0x6f}, 0xc) (async) 06:54:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x20040) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:33 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:33 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r0) 06:54:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 48) [ 1236.535552] FAULT_INJECTION: forcing a failure. [ 1236.535552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1236.547370] CPU: 1 PID: 28316 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1236.555332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.564678] Call Trace: [ 1236.567258] dump_stack+0x1b2/0x281 [ 1236.570957] should_fail.cold+0x10a/0x149 [ 1236.575091] __alloc_pages_nodemask+0x22c/0x2720 [ 1236.579828] ? kobject_uevent_env+0x274/0xf30 [ 1236.584315] ? __lock_acquire+0x5fc/0x3f20 [ 1236.588537] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1236.593366] ? blkdev_ioctl+0xf4/0x1830 [ 1236.597319] ? blkpg_ioctl+0x8d0/0x8d0 [ 1236.601189] ? trace_hardirqs_on+0x10/0x10 [ 1236.605407] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 1236.610490] cache_grow_begin+0x91/0x700 [ 1236.614529] ? fs_reclaim_release+0xd0/0x110 [ 1236.618915] ? check_preemption_disabled+0x35/0x240 [ 1236.623923] cache_alloc_refill+0x273/0x350 [ 1236.628233] kmem_cache_alloc+0x333/0x3c0 [ 1236.632364] getname_flags+0xc8/0x550 [ 1236.636149] SyS_mkdirat+0x83/0x270 [ 1236.639763] ? SyS_mknod+0x30/0x30 [ 1236.643281] ? fput_many+0xe/0x140 [ 1236.646807] ? do_syscall_64+0x4c/0x640 [ 1236.650761] ? SyS_mknod+0x30/0x30 [ 1236.654279] do_syscall_64+0x1d5/0x640 [ 1236.658151] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1236.663317] RIP: 0033:0x7fe33b68c217 [ 1236.667019] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1236.674706] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 06:54:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x20040) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:34 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1236.681958] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1236.689208] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1236.696458] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1236.703704] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1236.718028] FAULT_INJECTION: forcing a failure. [ 1236.718028] name failslab, interval 1, probability 0, space 0, times 0 [ 1236.729467] CPU: 0 PID: 28321 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1236.737347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.746699] Call Trace: [ 1236.749286] dump_stack+0x1b2/0x281 [ 1236.752916] should_fail.cold+0x10a/0x149 [ 1236.757068] should_failslab+0xd6/0x130 [ 1236.761045] kmem_cache_alloc+0x28e/0x3c0 [ 1236.765189] alloc_vfsmnt+0x23/0x7f0 [ 1236.768896] ? _raw_read_unlock+0x29/0x40 [ 1236.773049] vfs_kern_mount.part.0+0x27/0x470 [ 1236.777543] do_mount+0xe65/0x2a30 [ 1236.781167] ? __do_page_fault+0x159/0xad0 [ 1236.785397] ? retint_kernel+0x2d/0x2d [ 1236.789285] ? copy_mount_string+0x40/0x40 [ 1236.793520] ? memset+0x20/0x40 [ 1236.796800] ? copy_mount_options+0x1fa/0x2f0 [ 1236.801303] ? copy_mnt_ns+0xa30/0xa30 [ 1236.805188] SyS_mount+0xa8/0x120 [ 1236.808635] ? copy_mnt_ns+0xa30/0xa30 [ 1236.812526] do_syscall_64+0x1d5/0x640 [ 1236.816418] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1236.821611] RIP: 0033:0x7f10c039563a [ 1236.825313] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:54:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) keyctl$clear(0x7, 0xfffffffffffffffa) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) r2 = epoll_create(0x1) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) (async) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000940)=0x9) (async) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f0000000240)={0x80000014}) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x5) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x7f, 0x1, [0x50]}, &(0x7f00000000c0)=0xa) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r4, 0xd2ca, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r5, 0x6f}, 0xc) 06:54:34 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r0) 06:54:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, 0x0, &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1236.833015] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1236.840283] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1236.847546] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1236.854809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1236.862071] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1236.864754] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 49) 06:54:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 40) 06:54:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, 0x0, &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:34 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r0) [ 1237.070723] FAULT_INJECTION: forcing a failure. [ 1237.070723] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.102990] CPU: 1 PID: 28348 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1237.108385] FAULT_INJECTION: forcing a failure. [ 1237.108385] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.110887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.110892] Call Trace: [ 1237.110909] dump_stack+0x1b2/0x281 [ 1237.110924] should_fail.cold+0x10a/0x149 [ 1237.110938] should_failslab+0xd6/0x130 [ 1237.110951] kmem_cache_alloc+0x28e/0x3c0 [ 1237.110965] getname_flags+0xc8/0x550 [ 1237.110976] ? __do_page_fault+0x159/0xad0 [ 1237.110988] user_path_at_empty+0x2a/0x50 [ 1237.110999] do_mount+0x118/0x2a30 [ 1237.111011] ? __do_page_fault+0x159/0xad0 [ 1237.111020] ? retint_kernel+0x2d/0x2d [ 1237.111030] ? copy_mount_string+0x40/0x40 [ 1237.111042] ? memset+0x20/0x40 [ 1237.111052] ? copy_mount_options+0x1fa/0x2f0 [ 1237.111060] ? copy_mnt_ns+0xa30/0xa30 [ 1237.111070] SyS_mount+0xa8/0x120 [ 1237.111083] ? copy_mnt_ns+0xa30/0xa30 [ 1237.196845] do_syscall_64+0x1d5/0x640 [ 1237.200729] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1237.205909] RIP: 0033:0x7f10c039563a [ 1237.209616] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.217308] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1237.224561] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1237.231821] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1237.239087] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1237.246347] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1237.253612] CPU: 0 PID: 28354 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1237.261507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.270856] Call Trace: [ 1237.273441] dump_stack+0x1b2/0x281 [ 1237.277073] should_fail.cold+0x10a/0x149 [ 1237.281226] should_failslab+0xd6/0x130 [ 1237.285203] __kmalloc+0x2c1/0x400 [ 1237.288739] ? ext4_find_extent+0x879/0xbc0 [ 1237.293057] ext4_find_extent+0x879/0xbc0 [ 1237.297207] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1237.302744] ext4_ext_map_blocks+0x19a/0x6b10 [ 1237.307237] ? __lock_acquire+0x5fc/0x3f20 [ 1237.311480] ? __lock_acquire+0x5fc/0x3f20 [ 1237.315718] ? mark_buffer_dirty+0x95/0x480 [ 1237.320037] ? trace_hardirqs_on+0x10/0x10 [ 1237.324270] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 1237.329636] ? ext4_find_delalloc_cluster+0x180/0x180 [ 1237.334821] ? trace_hardirqs_on+0x10/0x10 [ 1237.339052] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 1237.343894] ? ext4_es_lookup_extent+0x321/0xac0 [ 1237.348643] ? lock_acquire+0x170/0x3f0 [ 1237.352624] ? lock_acquire+0x170/0x3f0 [ 1237.356591] ? ext4_map_blocks+0x29f/0x1730 [ 1237.360919] ext4_map_blocks+0xb19/0x1730 [ 1237.365076] ? ext4_issue_zeroout+0x150/0x150 [ 1237.369573] ? __ext4_new_inode+0x27c/0x4eb0 [ 1237.373986] ext4_getblk+0x98/0x3f0 [ 1237.377618] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1237.381941] ext4_bread+0x6c/0x1a0 [ 1237.385479] ? ext4_getblk+0x3f0/0x3f0 [ 1237.389358] ? dquot_initialize_needed+0x240/0x240 [ 1237.394284] ext4_append+0x143/0x350 [ 1237.398003] ext4_mkdir+0x4c9/0xbd0 [ 1237.401633] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1237.406299] ? security_inode_mkdir+0xca/0x100 [ 1237.410891] vfs_mkdir+0x463/0x6e0 [ 1237.414438] SyS_mkdirat+0x1fd/0x270 [ 1237.418147] ? SyS_mknod+0x30/0x30 [ 1237.421681] ? fput_many+0xe/0x140 [ 1237.425216] ? do_syscall_64+0x4c/0x640 [ 1237.429186] ? SyS_mknod+0x30/0x30 [ 1237.432722] do_syscall_64+0x1d5/0x640 [ 1237.436615] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1237.441813] RIP: 0033:0x7fe33b68c217 [ 1237.445521] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1237.453221] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1237.460492] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c 06:54:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, 0x0, &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x20040) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', 0x0, 0xfffffffffffffffa) 06:54:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffa) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffa) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) 06:54:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) (async) read$snddsp(r0, 0x0, 0x0) 06:54:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', 0x0, 0xfffffffffffffffa) 06:54:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 50) 06:54:34 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:34 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)={0x3, 0x0, @b}, 0x48, 0xfffffffffffffffa) (async, rerun: 64) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (rerun: 64) 06:54:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 41) [ 1237.467763] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1237.475027] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1237.482289] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1237.494525] XFS (loop5): invalid log iosize: 1 [not 12-30] 06:54:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', 0x0, 0xfffffffffffffffa) 06:54:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) (async) read$snddsp(r0, 0x0, 0x0) 06:54:35 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:35 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r0) 06:54:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x10001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x1000, "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"}, &(0x7f0000001100)=0x1008) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x480400) syz_open_dev$sndpcmc(&(0x7f0000001140), 0xddd, 0x0) read$snddsp(r3, 0x0, 0x0) [ 1237.604179] FAULT_INJECTION: forcing a failure. [ 1237.604179] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.631739] FAULT_INJECTION: forcing a failure. [ 1237.631739] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.654011] CPU: 0 PID: 28411 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1237.661911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.671260] Call Trace: [ 1237.673845] dump_stack+0x1b2/0x281 [ 1237.677476] should_fail.cold+0x10a/0x149 [ 1237.681626] should_failslab+0xd6/0x130 [ 1237.685598] __kmalloc+0x2c1/0x400 [ 1237.689216] ? ext4_find_extent+0x879/0xbc0 [ 1237.693546] ext4_find_extent+0x879/0xbc0 [ 1237.697695] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1237.703147] ext4_ext_map_blocks+0x19a/0x6b10 [ 1237.707650] ? __lock_acquire+0x5fc/0x3f20 [ 1237.711887] ? mark_buffer_dirty+0x95/0x480 [ 1237.716213] ? trace_hardirqs_on+0x10/0x10 [ 1237.720450] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 1237.725811] ? ext4_find_delalloc_cluster+0x180/0x180 [ 1237.731000] ? trace_hardirqs_on+0x10/0x10 [ 1237.735242] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 1237.740082] ? ext4_es_lookup_extent+0x321/0xac0 [ 1237.744840] ? lock_acquire+0x170/0x3f0 [ 1237.748814] ? lock_acquire+0x170/0x3f0 [ 1237.752782] ? ext4_map_blocks+0x623/0x1730 [ 1237.757097] ext4_map_blocks+0x675/0x1730 [ 1237.761226] ? ext4_issue_zeroout+0x150/0x150 [ 1237.765874] ? __ext4_new_inode+0x27c/0x4eb0 [ 1237.770273] ext4_getblk+0x98/0x3f0 [ 1237.773886] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1237.778207] ext4_bread+0x6c/0x1a0 [ 1237.781727] ? ext4_getblk+0x3f0/0x3f0 [ 1237.785592] ? dquot_initialize_needed+0x240/0x240 [ 1237.790501] ext4_append+0x143/0x350 [ 1237.794198] ext4_mkdir+0x4c9/0xbd0 [ 1237.797812] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1237.802464] ? security_inode_mkdir+0xca/0x100 [ 1237.807027] vfs_mkdir+0x463/0x6e0 [ 1237.810552] SyS_mkdirat+0x1fd/0x270 [ 1237.814248] ? SyS_mknod+0x30/0x30 [ 1237.817762] ? fput_many+0xe/0x140 [ 1237.821278] ? do_syscall_64+0x4c/0x640 [ 1237.825229] ? SyS_mknod+0x30/0x30 [ 1237.828750] do_syscall_64+0x1d5/0x640 [ 1237.832622] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1237.837786] RIP: 0033:0x7fe33b68c217 [ 1237.841478] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 06:54:35 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:35 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="16cc70db0bb55ac451517764792a6ff36d598a1fcc1b07829c6a28a88e6fe715192c8e4b76f4213554ff82d1820bfae5168b10782bc35316eb900a5750b2956aeef1ff0d936fcedb2f", 0x49, r0) keyctl$join(0x1, &(0x7f0000000180)={'syz', 0x0}) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0x8) [ 1237.849169] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1237.856414] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1237.863662] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1237.870918] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1237.878181] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1237.908560] CPU: 1 PID: 28412 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1237.916469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1237.925827] Call Trace: [ 1237.928420] dump_stack+0x1b2/0x281 [ 1237.932138] should_fail.cold+0x10a/0x149 [ 1237.936294] should_failslab+0xd6/0x130 [ 1237.940269] __kmalloc_track_caller+0x2bc/0x400 [ 1237.944934] ? kstrdup_const+0x35/0x60 [ 1237.948820] ? lock_downgrade+0x740/0x740 [ 1237.952962] kstrdup+0x36/0x70 [ 1237.956151] kstrdup_const+0x35/0x60 [ 1237.959859] alloc_vfsmnt+0xe0/0x7f0 [ 1237.963572] ? _raw_read_unlock+0x29/0x40 [ 1237.967718] vfs_kern_mount.part.0+0x27/0x470 [ 1237.972226] do_mount+0xe65/0x2a30 [ 1237.975854] ? __do_page_fault+0x159/0xad0 [ 1237.980081] ? retint_kernel+0x2d/0x2d [ 1237.983964] ? copy_mount_string+0x40/0x40 [ 1237.988201] ? memset+0x20/0x40 [ 1237.991483] ? copy_mount_options+0x1fa/0x2f0 [ 1237.995982] ? copy_mnt_ns+0xa30/0xa30 [ 1237.999867] SyS_mount+0xa8/0x120 [ 1238.003311] ? copy_mnt_ns+0xa30/0xa30 [ 1238.007202] do_syscall_64+0x1d5/0x640 [ 1238.011090] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1238.016268] RIP: 0033:0x7f10c039563a [ 1238.020060] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.027766] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1238.035028] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1238.042296] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1238.049560] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1238.056823] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 51) 06:54:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x10001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x1000, "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"}, &(0x7f0000001100)=0x1008) (async) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x480400) (async) syz_open_dev$sndpcmc(&(0x7f0000001140), 0xddd, 0x0) read$snddsp(r3, 0x0, 0x0) 06:54:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async, rerun: 32) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="16cc70db0bb55ac451517764792a6ff36d598a1fcc1b07829c6a28a88e6fe715192c8e4b76f4213554ff82d1820bfae5168b10782bc35316eb900a5750b2956aeef1ff0d936fcedb2f", 0x49, r0) (async, rerun: 32) keyctl$join(0x1, &(0x7f0000000180)={'syz', 0x0}) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0x8) 06:54:35 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:35 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 42) 06:54:35 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x10001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x1000, "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"}, &(0x7f0000001100)=0x1008) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x480400) syz_open_dev$sndpcmc(&(0x7f0000001140), 0xddd, 0x0) read$snddsp(r3, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x10001}, &(0x7f0000000040)=0x8) (async) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x1000, "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"}, &(0x7f0000001100)=0x1008) (async) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x480400) (async) syz_open_dev$sndpcmc(&(0x7f0000001140), 0xddd, 0x0) (async) read$snddsp(r3, 0x0, 0x0) (async) 06:54:35 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) read$snddsp(r0, 0x0, 0x0) [ 1238.173224] FAULT_INJECTION: forcing a failure. [ 1238.173224] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.179669] FAULT_INJECTION: forcing a failure. [ 1238.179669] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.224519] CPU: 1 PID: 28470 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1238.232428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.241774] Call Trace: [ 1238.244359] dump_stack+0x1b2/0x281 [ 1238.247990] should_fail.cold+0x10a/0x149 [ 1238.252132] should_failslab+0xd6/0x130 [ 1238.256102] __kmalloc_track_caller+0x2bc/0x400 [ 1238.260769] ? strndup_user+0x5b/0xf0 [ 1238.264586] memdup_user+0x22/0xa0 [ 1238.268113] strndup_user+0x5b/0xf0 [ 1238.271719] ? copy_mnt_ns+0xa30/0xa30 [ 1238.275586] SyS_mount+0x39/0x120 [ 1238.279020] ? copy_mnt_ns+0xa30/0xa30 [ 1238.282890] do_syscall_64+0x1d5/0x640 [ 1238.286787] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1238.291967] RIP: 0033:0x7fe33b68e63a [ 1238.295661] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.303358] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1238.310617] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1238.317872] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1238.325129] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1238.332382] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1238.339647] CPU: 0 PID: 28459 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1238.347529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.356873] Call Trace: [ 1238.359460] dump_stack+0x1b2/0x281 [ 1238.363087] should_fail.cold+0x10a/0x149 [ 1238.367238] should_failslab+0xd6/0x130 [ 1238.371214] kmem_cache_alloc+0x28e/0x3c0 [ 1238.375362] alloc_vfsmnt+0x23/0x7f0 [ 1238.379069] ? _raw_read_unlock+0x29/0x40 [ 1238.383213] vfs_kern_mount.part.0+0x27/0x470 [ 1238.387707] do_mount+0xe65/0x2a30 [ 1238.391248] ? __do_page_fault+0x159/0xad0 [ 1238.395478] ? retint_kernel+0x2d/0x2d [ 1238.399363] ? copy_mount_string+0x40/0x40 [ 1238.403597] ? memset+0x20/0x40 [ 1238.406875] ? copy_mount_options+0x1fa/0x2f0 [ 1238.411452] ? copy_mnt_ns+0xa30/0xa30 [ 1238.415339] SyS_mount+0xa8/0x120 [ 1238.418788] ? copy_mnt_ns+0xa30/0xa30 06:54:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="16cc70db0bb55ac451517764792a6ff36d598a1fcc1b07829c6a28a88e6fe715192c8e4b76f4213554ff82d1820bfae5168b10782bc35316eb900a5750b2956aeef1ff0d936fcedb2f", 0x49, r0) (async) keyctl$join(0x1, &(0x7f0000000180)={'syz', 0x0}) (async) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0x8) 06:54:35 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x5, 0x88080) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:35 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x5, 0x88080) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) (async) read$snddsp(r0, 0x0, 0x0) [ 1238.422674] do_syscall_64+0x1d5/0x640 [ 1238.426567] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1238.431750] RIP: 0033:0x7f10c039563a [ 1238.435450] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.443152] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1238.450412] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1238.457856] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1238.465152] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1238.472413] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 52) 06:54:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:35 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x20040) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:35 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000200)={0x0, "1af754b475940f4bc19850e76c3e198380e2942e97be7e5e3986b149b0dca3b8"}) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)=',[\x00') keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:35 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x5, 0x88080) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) (async) read$snddsp(r0, 0x0, 0x0) 06:54:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 43) [ 1238.593582] FAULT_INJECTION: forcing a failure. [ 1238.593582] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.605203] CPU: 1 PID: 28530 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1238.613095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.622447] Call Trace: [ 1238.625042] dump_stack+0x1b2/0x281 [ 1238.628678] should_fail.cold+0x10a/0x149 [ 1238.632828] should_failslab+0xd6/0x130 [ 1238.636809] kmem_cache_alloc+0x40/0x3c0 [ 1238.640869] __es_insert_extent+0x338/0x1360 [ 1238.645309] ext4_es_insert_extent+0x1b9/0x530 [ 1238.649892] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1238.655702] ext4_map_blocks+0x887/0x1730 [ 1238.659853] ? ext4_issue_zeroout+0x150/0x150 [ 1238.664377] ? __ext4_new_inode+0x27c/0x4eb0 [ 1238.668791] ext4_getblk+0x98/0x3f0 [ 1238.672420] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1238.676750] ext4_bread+0x6c/0x1a0 [ 1238.680374] ? ext4_getblk+0x3f0/0x3f0 [ 1238.684259] ? dquot_initialize_needed+0x240/0x240 [ 1238.689186] ext4_append+0x143/0x350 [ 1238.692898] ext4_mkdir+0x4c9/0xbd0 [ 1238.696528] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1238.701200] ? security_inode_mkdir+0xca/0x100 [ 1238.705883] vfs_mkdir+0x463/0x6e0 [ 1238.709425] SyS_mkdirat+0x1fd/0x270 [ 1238.713150] ? SyS_mknod+0x30/0x30 [ 1238.716777] ? fput_many+0xe/0x140 [ 1238.720316] ? do_syscall_64+0x4c/0x640 [ 1238.724284] ? SyS_mknod+0x30/0x30 [ 1238.727825] do_syscall_64+0x1d5/0x640 [ 1238.731720] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1238.736904] RIP: 0033:0x7fe33b68c217 06:54:36 executing program 2: socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0xe2, "00e99dae7243eb726f49ea17a9582460e0ebfd12e285c8e940f8b8f96913897938a531d847ced25ed092696dcad45f0c409c10f624736ece9e65516c0ccfa52754d9deaa0598cb65965b88ac96a6a81e465739ba2336cc9ac3f6244292e81ad362cb75886316a542971bdde1afff1f3753139744a1ca2cdc057b76c7b7e511b508d48cc34be957730733aebec88af0eba83b39aae11794623fd6ac2b59d7017ae64907385ec85778c5b104469803d76eec19a563f7350967e333b6e548e54d0370c5f34b2bd21cbb3c74ce2e9ca3cf94297ca097413e2a55d3f6dcae1a7d3f1681e9"}, &(0x7f0000000100)=0xea) read$snddsp(0xffffffffffffffff, 0x0, 0x0) 06:54:36 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x20040) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:36 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000200)={0x0, "1af754b475940f4bc19850e76c3e198380e2942e97be7e5e3986b149b0dca3b8"}) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)=',[\x00') keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000200)={0x0, "1af754b475940f4bc19850e76c3e198380e2942e97be7e5e3986b149b0dca3b8"}) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) (async) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) (async) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)=',[\x00') (async) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) 06:54:36 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000200)={0x0, "1af754b475940f4bc19850e76c3e198380e2942e97be7e5e3986b149b0dca3b8"}) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)=',[\x00') (async) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1238.740607] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1238.748310] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1238.755574] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1238.762840] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1238.770119] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1238.777391] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 06:54:36 executing program 2: socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0xe2, "00e99dae7243eb726f49ea17a9582460e0ebfd12e285c8e940f8b8f96913897938a531d847ced25ed092696dcad45f0c409c10f624736ece9e65516c0ccfa52754d9deaa0598cb65965b88ac96a6a81e465739ba2336cc9ac3f6244292e81ad362cb75886316a542971bdde1afff1f3753139744a1ca2cdc057b76c7b7e511b508d48cc34be957730733aebec88af0eba83b39aae11794623fd6ac2b59d7017ae64907385ec85778c5b104469803d76eec19a563f7350967e333b6e548e54d0370c5f34b2bd21cbb3c74ce2e9ca3cf94297ca097413e2a55d3f6dcae1a7d3f1681e9"}, &(0x7f0000000100)=0xea) read$snddsp(0xffffffffffffffff, 0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) (async) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0xe2, "00e99dae7243eb726f49ea17a9582460e0ebfd12e285c8e940f8b8f96913897938a531d847ced25ed092696dcad45f0c409c10f624736ece9e65516c0ccfa52754d9deaa0598cb65965b88ac96a6a81e465739ba2336cc9ac3f6244292e81ad362cb75886316a542971bdde1afff1f3753139744a1ca2cdc057b76c7b7e511b508d48cc34be957730733aebec88af0eba83b39aae11794623fd6ac2b59d7017ae64907385ec85778c5b104469803d76eec19a563f7350967e333b6e548e54d0370c5f34b2bd21cbb3c74ce2e9ca3cf94297ca097413e2a55d3f6dcae1a7d3f1681e9"}, &(0x7f0000000100)=0xea) (async) read$snddsp(0xffffffffffffffff, 0x0, 0x0) (async) 06:54:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) [ 1238.799559] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1238.820709] FAULT_INJECTION: forcing a failure. [ 1238.820709] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.858938] CPU: 1 PID: 28529 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1238.866842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1238.876195] Call Trace: [ 1238.878785] dump_stack+0x1b2/0x281 [ 1238.882417] should_fail.cold+0x10a/0x149 [ 1238.886565] should_failslab+0xd6/0x130 [ 1238.890541] kmem_cache_alloc+0x28e/0x3c0 [ 1238.894700] getname_kernel+0x4e/0x340 [ 1238.898591] kern_path+0x1b/0x40 [ 1238.901956] lookup_bdev+0xc6/0x1c0 [ 1238.905581] ? bd_acquire+0x440/0x440 [ 1238.909381] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1238.914827] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1238.919842] blkdev_get_by_path+0x1b/0xa0 [ 1238.923985] mount_bdev+0x4c/0x360 [ 1238.927520] ? xfs_parseargs+0x1130/0x1130 [ 1238.931749] mount_fs+0x92/0x2a0 [ 1238.935114] vfs_kern_mount.part.0+0x5b/0x470 [ 1238.939609] do_mount+0xe65/0x2a30 [ 1238.943151] ? __do_page_fault+0x159/0xad0 [ 1238.947382] ? retint_kernel+0x2d/0x2d [ 1238.951268] ? copy_mount_string+0x40/0x40 [ 1238.955511] ? memset+0x20/0x40 [ 1238.958788] ? copy_mount_options+0x1fa/0x2f0 [ 1238.963282] ? copy_mnt_ns+0xa30/0xa30 [ 1238.967171] SyS_mount+0xa8/0x120 [ 1238.970623] ? copy_mnt_ns+0xa30/0xa30 [ 1238.974509] do_syscall_64+0x1d5/0x640 [ 1238.978396] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1238.983579] RIP: 0033:0x7f10c039563a [ 1238.987283] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.994984] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1239.002246] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1239.009513] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1239.016762] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1239.024009] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 53) 06:54:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 44) 06:54:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:36 executing program 2: socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0xe2, "00e99dae7243eb726f49ea17a9582460e0ebfd12e285c8e940f8b8f96913897938a531d847ced25ed092696dcad45f0c409c10f624736ece9e65516c0ccfa52754d9deaa0598cb65965b88ac96a6a81e465739ba2336cc9ac3f6244292e81ad362cb75886316a542971bdde1afff1f3753139744a1ca2cdc057b76c7b7e511b508d48cc34be957730733aebec88af0eba83b39aae11794623fd6ac2b59d7017ae64907385ec85778c5b104469803d76eec19a563f7350967e333b6e548e54d0370c5f34b2bd21cbb3c74ce2e9ca3cf94297ca097413e2a55d3f6dcae1a7d3f1681e9"}, &(0x7f0000000100)=0xea) (async) read$snddsp(0xffffffffffffffff, 0x0, 0x0) 06:54:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$get_persistent(0x16, 0xee00, r1) 06:54:36 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x20040) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$get_persistent(0x16, 0xee00, r1) [ 1239.122115] FAULT_INJECTION: forcing a failure. [ 1239.122115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1239.133940] CPU: 1 PID: 28592 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1239.141817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.151167] Call Trace: [ 1239.153758] dump_stack+0x1b2/0x281 [ 1239.157388] should_fail.cold+0x10a/0x149 [ 1239.161539] __alloc_pages_nodemask+0x22c/0x2720 [ 1239.166291] ? __save_stack_trace+0x63/0x160 06:54:36 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$get_persistent(0x16, 0xee00, r1) [ 1239.170697] ? is_bpf_text_address+0x91/0x150 [ 1239.175192] ? __lock_acquire+0x5fc/0x3f20 [ 1239.179423] ? cmp_ex_sort+0xb0/0xb0 [ 1239.183140] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1239.187977] ? search_extable+0x6f/0x80 [ 1239.191947] ? trim_init_extable+0x280/0x280 [ 1239.196348] ? __kernel_text_address+0x9/0x30 [ 1239.200839] ? copy_mount_options+0x194/0x2f0 [ 1239.205332] ? fixup_exception+0x93/0xd0 [ 1239.209389] ? no_context+0x9c/0x7c0 [ 1239.213100] ? force_sig_info_fault.constprop.0+0x260/0x260 [ 1239.218807] ? bad_area_access_error+0x1f8/0x3e0 [ 1239.220719] FAULT_INJECTION: forcing a failure. [ 1239.220719] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.223562] cache_grow_begin+0x91/0x700 [ 1239.223573] ? fs_reclaim_release+0xd0/0x110 [ 1239.223584] ? check_preemption_disabled+0x35/0x240 [ 1239.223598] cache_alloc_refill+0x273/0x350 [ 1239.252487] kmem_cache_alloc+0x333/0x3c0 [ 1239.256622] getname_flags+0xc8/0x550 [ 1239.260425] ? __do_page_fault+0x159/0xad0 [ 1239.264642] user_path_at_empty+0x2a/0x50 [ 1239.268773] do_mount+0x118/0x2a30 [ 1239.272302] ? __do_page_fault+0x159/0xad0 [ 1239.276518] ? retint_kernel+0x2d/0x2d [ 1239.280400] ? copy_mount_string+0x40/0x40 [ 1239.284627] ? memset+0x20/0x40 [ 1239.287889] ? copy_mount_options+0x1fa/0x2f0 [ 1239.292365] ? copy_mnt_ns+0xa30/0xa30 [ 1239.296236] SyS_mount+0xa8/0x120 [ 1239.299668] ? copy_mnt_ns+0xa30/0xa30 [ 1239.303536] do_syscall_64+0x1d5/0x640 [ 1239.307408] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1239.312581] RIP: 0033:0x7f10c039563a [ 1239.316270] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1239.323961] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1239.331224] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1239.338563] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1239.345823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1239.353071] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1239.360334] CPU: 0 PID: 28595 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1239.368218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.377563] Call Trace: [ 1239.380187] dump_stack+0x1b2/0x281 [ 1239.383816] should_fail.cold+0x10a/0x149 [ 1239.387966] should_failslab+0xd6/0x130 [ 1239.391942] kmem_cache_alloc+0x40/0x3c0 [ 1239.396001] __es_insert_extent+0x338/0x1360 [ 1239.400418] ext4_es_insert_extent+0x1b9/0x530 [ 1239.405004] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1239.410813] ext4_map_blocks+0x887/0x1730 [ 1239.414965] ? ext4_issue_zeroout+0x150/0x150 [ 1239.419457] ? __ext4_new_inode+0x27c/0x4eb0 [ 1239.423870] ext4_getblk+0x98/0x3f0 [ 1239.427497] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1239.431826] ext4_bread+0x6c/0x1a0 [ 1239.435361] ? ext4_getblk+0x3f0/0x3f0 [ 1239.439246] ? dquot_initialize_needed+0x240/0x240 [ 1239.444180] ext4_append+0x143/0x350 [ 1239.447894] ext4_mkdir+0x4c9/0xbd0 [ 1239.451530] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1239.456209] ? security_inode_mkdir+0xca/0x100 [ 1239.460800] vfs_mkdir+0x463/0x6e0 [ 1239.464342] SyS_mkdirat+0x1fd/0x270 [ 1239.468054] ? SyS_mknod+0x30/0x30 06:54:36 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x620101) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x480302) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) read$snddsp(r0, 0x0, 0x0) 06:54:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:36 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x20040) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) [ 1239.471589] ? fput_many+0xe/0x140 [ 1239.474521] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1239.475122] ? do_syscall_64+0x4c/0x640 [ 1239.475133] ? SyS_mknod+0x30/0x30 [ 1239.475144] do_syscall_64+0x1d5/0x640 [ 1239.475159] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1239.475168] RIP: 0033:0x7fe33b68c217 [ 1239.502643] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1239.510355] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 06:54:36 executing program 4: ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) 06:54:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 54) [ 1239.517616] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1239.524892] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1239.532184] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1239.539446] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1239.596819] FAULT_INJECTION: forcing a failure. [ 1239.596819] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.608616] CPU: 0 PID: 28630 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1239.616500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.625856] Call Trace: [ 1239.628445] dump_stack+0x1b2/0x281 [ 1239.632080] should_fail.cold+0x10a/0x149 [ 1239.636232] should_failslab+0xd6/0x130 [ 1239.640210] __kmalloc+0x2c1/0x400 [ 1239.643746] ? __list_lru_init+0x67/0x710 [ 1239.647893] __list_lru_init+0x67/0x710 [ 1239.649695] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1239.651865] sget_userns+0x504/0xc10 [ 1239.651911] ? set_bdev_super+0x110/0x110 [ 1239.665362] ? ns_test_super+0x50/0x50 [ 1239.669260] ? set_bdev_super+0x110/0x110 [ 1239.673410] ? ns_test_super+0x50/0x50 [ 1239.677293] sget+0xd1/0x110 [ 1239.680339] mount_bdev+0xcd/0x360 [ 1239.683864] ? xfs_parseargs+0x1130/0x1130 [ 1239.688080] mount_fs+0x92/0x2a0 [ 1239.691430] vfs_kern_mount.part.0+0x5b/0x470 [ 1239.695918] do_mount+0xe65/0x2a30 [ 1239.699449] ? __do_page_fault+0x159/0xad0 [ 1239.703662] ? retint_kernel+0x2d/0x2d [ 1239.707545] ? copy_mount_string+0x40/0x40 [ 1239.711846] ? memset+0x20/0x40 [ 1239.715103] ? copy_mount_options+0x1fa/0x2f0 [ 1239.719574] ? copy_mnt_ns+0xa30/0xa30 [ 1239.723442] SyS_mount+0xa8/0x120 [ 1239.726871] ? copy_mnt_ns+0xa30/0xa30 [ 1239.730735] do_syscall_64+0x1d5/0x640 [ 1239.734603] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1239.739772] RIP: 0033:0x7f10c039563a [ 1239.743467] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1239.751166] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1239.758432] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1239.765689] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1239.772937] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1239.780184] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 45) 06:54:37 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000200)=0x100) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="734f53f8b7da8f374b745cb67b1af9cab37262adaea6d923da0c9e372b919471257913c6f60163ec0655cbf366c8abd0066d2208355b3ae0fc4211217fa19e583206dae285d0910c5ba35b9e5a56485c1d8a75c273586d870c84ac246fecb9b6a0b78fa4f57daea2f57aee36d8363f030e2958dbd329a5", 0x77, r1) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) 06:54:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x620101) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x480302) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) (async, rerun: 32) read$snddsp(r0, 0x0, 0x0) (rerun: 32) 06:54:37 executing program 4: ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) 06:54:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 55) 06:54:37 executing program 4: ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) 06:54:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) [ 1239.902541] encrypted_key: insufficient parameters specified [ 1239.921193] FAULT_INJECTION: forcing a failure. [ 1239.921193] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1239.924552] FAULT_INJECTION: forcing a failure. [ 1239.924552] name failslab, interval 1, probability 0, space 0, times 0 [ 1239.944443] CPU: 1 PID: 28654 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 06:54:37 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000200)=0x100) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="734f53f8b7da8f374b745cb67b1af9cab37262adaea6d923da0c9e372b919471257913c6f60163ec0655cbf366c8abd0066d2208355b3ae0fc4211217fa19e583206dae285d0910c5ba35b9e5a56485c1d8a75c273586d870c84ac246fecb9b6a0b78fa4f57daea2f57aee36d8363f030e2958dbd329a5", 0x77, r1) (async) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) 06:54:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x620101) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x480302) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) read$snddsp(r0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x620101) (async) syz_open_dev$sndpcmc(&(0x7f0000000000), 0x4, 0x480302) (async) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) 06:54:37 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x20040) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) [ 1239.952322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1239.961764] Call Trace: [ 1239.964361] dump_stack+0x1b2/0x281 [ 1239.967991] should_fail.cold+0x10a/0x149 [ 1239.972147] should_failslab+0xd6/0x130 [ 1239.976128] kmem_cache_alloc+0x40/0x3c0 [ 1239.980191] __es_insert_extent+0x338/0x1360 [ 1239.984711] ext4_es_insert_extent+0x1b9/0x530 [ 1239.989428] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1239.995321] ext4_map_blocks+0x887/0x1730 [ 1239.999477] ? ext4_issue_zeroout+0x150/0x150 [ 1240.003971] ? __ext4_new_inode+0x27c/0x4eb0 [ 1240.008392] ext4_getblk+0x98/0x3f0 [ 1240.012024] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1240.016348] ext4_bread+0x6c/0x1a0 [ 1240.019883] ? ext4_getblk+0x3f0/0x3f0 [ 1240.023767] ? dquot_initialize_needed+0x240/0x240 [ 1240.028698] ext4_append+0x143/0x350 [ 1240.028954] encrypted_key: insufficient parameters specified [ 1240.032409] ext4_mkdir+0x4c9/0xbd0 [ 1240.032427] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1240.032441] ? security_inode_mkdir+0xca/0x100 [ 1240.032455] vfs_mkdir+0x463/0x6e0 [ 1240.032466] SyS_mkdirat+0x1fd/0x270 [ 1240.032475] ? SyS_mknod+0x30/0x30 [ 1240.032483] ? fput_many+0xe/0x140 [ 1240.032493] ? do_syscall_64+0x4c/0x640 [ 1240.032500] ? SyS_mknod+0x30/0x30 [ 1240.032510] do_syscall_64+0x1d5/0x640 [ 1240.032524] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1240.032533] RIP: 0033:0x7fe33b68c217 [ 1240.085617] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1240.093326] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1240.100597] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1240.107861] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1240.115120] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1240.122378] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1240.129655] CPU: 0 PID: 28655 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1240.137543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.146894] Call Trace: [ 1240.148341] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1240.149478] dump_stack+0x1b2/0x281 [ 1240.149493] should_fail.cold+0x10a/0x149 [ 1240.149506] __alloc_pages_nodemask+0x22c/0x2720 [ 1240.167608] ? trace_hardirqs_on+0x10/0x10 [ 1240.171854] ? pcpu_alloc+0xbe0/0xf50 [ 1240.175660] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1240.180514] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1240.185970] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1240.190994] alloc_pages_current+0x155/0x260 [ 1240.195403] ? __lockdep_init_map+0x100/0x560 [ 1240.199896] get_zeroed_page+0x19/0x50 [ 1240.203781] mount_fs+0x1c7/0x2a0 [ 1240.207233] vfs_kern_mount.part.0+0x5b/0x470 [ 1240.211728] do_mount+0xe65/0x2a30 [ 1240.215263] ? __do_page_fault+0x159/0xad0 [ 1240.219478] ? retint_kernel+0x2d/0x2d [ 1240.223358] ? copy_mount_string+0x40/0x40 [ 1240.227575] ? memset+0x20/0x40 [ 1240.230831] ? copy_mount_options+0x1fa/0x2f0 [ 1240.235304] ? copy_mnt_ns+0xa30/0xa30 [ 1240.239189] SyS_mount+0xa8/0x120 [ 1240.242620] ? copy_mnt_ns+0xa30/0xa30 [ 1240.246486] do_syscall_64+0x1d5/0x640 06:54:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000400), 0x0, 0x640000) r1 = socket(0x21, 0x80000, 0x177d80) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x101, 0x401, 0x0, 0x800, 0x4}, 0x14) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) r3 = openat$incfs(r2, &(0x7f0000000140)='.pending_reads\x00', 0x82440, 0x170) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast2, 0x80000000}}, 0x8ad8, 0x0, 0x8000, 0x3, 0x28, 0x4}, 0x9c) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f00000000c0)=0x4) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r4, 0xc1004110, &(0x7f0000000240)={0x7, [0x4, 0xf0, 0x2], [{0x0, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x4, 0x3, 0x0, 0x0, 0x0, 0x1}, {0x101, 0x8000, 0x1, 0x1}, {0xffffffff, 0x101, 0x0, 0x0, 0x1}, {0x4d3dc7b9, 0x9, 0x1}, {0x2, 0xb9c, 0x0, 0x1, 0x0, 0x1}, {0x6, 0x7, 0x0, 0x1, 0x1}, {0xfff, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1}, {0x6, 0x80000000, 0x1, 0x1}, {0xffff8000, 0x1ffc0, 0x0, 0x0, 0x1}, {0x3bf4f80b, 0x3, 0x0, 0x1}], 0x1}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x202000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x5}, &(0x7f00000003c0)=0x8) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) ioctl$PPPIOCSDEBUG(r6, 0x40047440, &(0x7f0000000940)=0x9) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f0000000040)=0x2000200) read$snddsp(r0, 0x0, 0x0) [ 1240.250354] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1240.255522] RIP: 0033:0x7f10c039563a [ 1240.259227] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1240.266911] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1240.274157] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1240.281488] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1240.288740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1240.295988] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 46) 06:54:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000400), 0x0, 0x640000) (async) r1 = socket(0x21, 0x80000, 0x177d80) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x101, 0x401, 0x0, 0x800, 0x4}, 0x14) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) r3 = openat$incfs(r2, &(0x7f0000000140)='.pending_reads\x00', 0x82440, 0x170) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast2, 0x80000000}}, 0x8ad8, 0x0, 0x8000, 0x3, 0x28, 0x4}, 0x9c) (async) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) (async, rerun: 64) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f00000000c0)=0x4) (async, rerun: 64) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r4, 0xc1004110, &(0x7f0000000240)={0x7, [0x4, 0xf0, 0x2], [{0x0, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x4, 0x3, 0x0, 0x0, 0x0, 0x1}, {0x101, 0x8000, 0x1, 0x1}, {0xffffffff, 0x101, 0x0, 0x0, 0x1}, {0x4d3dc7b9, 0x9, 0x1}, {0x2, 0xb9c, 0x0, 0x1, 0x0, 0x1}, {0x6, 0x7, 0x0, 0x1, 0x1}, {0xfff, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1}, {0x6, 0x80000000, 0x1, 0x1}, {0xffff8000, 0x1ffc0, 0x0, 0x0, 0x1}, {0x3bf4f80b, 0x3, 0x0, 0x1}], 0x1}) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x202000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x5}, &(0x7f00000003c0)=0x8) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) (async) ioctl$PPPIOCSDEBUG(r6, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f0000000040)=0x2000200) read$snddsp(r0, 0x0, 0x0) 06:54:37 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000200)=0x100) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="734f53f8b7da8f374b745cb67b1af9cab37262adaea6d923da0c9e372b919471257913c6f60163ec0655cbf366c8abd0066d2208355b3ae0fc4211217fa19e583206dae285d0910c5ba35b9e5a56485c1d8a75c273586d870c84ac246fecb9b6a0b78fa4f57daea2f57aee36d8363f030e2958dbd329a5", 0x77, r1) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) 06:54:37 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x20040) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 56) 06:54:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:37 executing program 4: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x20040) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) 06:54:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000400), 0x0, 0x640000) (async) r1 = socket(0x21, 0x80000, 0x177d80) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x101, 0x401, 0x0, 0x800, 0x4}, 0x14) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) r3 = openat$incfs(r2, &(0x7f0000000140)='.pending_reads\x00', 0x82440, 0x170) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast2, 0x80000000}}, 0x8ad8, 0x0, 0x8000, 0x3, 0x28, 0x4}, 0x9c) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000940)=0x9) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f00000000c0)=0x4) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r4) (async) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r4, 0xc1004110, &(0x7f0000000240)={0x7, [0x4, 0xf0, 0x2], [{0x0, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x4, 0x3, 0x0, 0x0, 0x0, 0x1}, {0x101, 0x8000, 0x1, 0x1}, {0xffffffff, 0x101, 0x0, 0x0, 0x1}, {0x4d3dc7b9, 0x9, 0x1}, {0x2, 0xb9c, 0x0, 0x1, 0x0, 0x1}, {0x6, 0x7, 0x0, 0x1, 0x1}, {0xfff, 0x0, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1}, {0x6, 0x80000000, 0x1, 0x1}, {0xffff8000, 0x1ffc0, 0x0, 0x0, 0x1}, {0x3bf4f80b, 0x3, 0x0, 0x1}], 0x1}) (async, rerun: 64) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x202000, 0x0) (rerun: 64) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x5}, &(0x7f00000003c0)=0x8) (async) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) ioctl$PPPIOCSDEBUG(r6, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$PPPIOCSFLAGS1(r6, 0x40047459, &(0x7f0000000040)=0x2000200) (async) read$snddsp(r0, 0x0, 0x0) 06:54:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) keyctl$clear(0x7, r2) [ 1240.406862] encrypted_key: insufficient parameters specified [ 1240.430978] FAULT_INJECTION: forcing a failure. [ 1240.430978] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.432846] FAULT_INJECTION: forcing a failure. [ 1240.432846] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.481262] CPU: 0 PID: 28704 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1240.489178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.498528] Call Trace: [ 1240.501116] dump_stack+0x1b2/0x281 [ 1240.504853] should_fail.cold+0x10a/0x149 [ 1240.508997] should_failslab+0xd6/0x130 [ 1240.512958] __kmalloc_track_caller+0x2bc/0x400 [ 1240.517608] ? strndup_user+0x5b/0xf0 [ 1240.521418] memdup_user+0x22/0xa0 [ 1240.524941] strndup_user+0x5b/0xf0 [ 1240.528555] ? copy_mnt_ns+0xa30/0xa30 [ 1240.532430] SyS_mount+0x68/0x120 [ 1240.535876] ? copy_mnt_ns+0xa30/0xa30 [ 1240.539762] do_syscall_64+0x1d5/0x640 [ 1240.543638] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1240.548808] RIP: 0033:0x7fe33b68e63a [ 1240.552508] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1240.560216] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1240.567467] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1240.574719] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 06:54:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) keyctl$clear(0x7, r2) 06:54:38 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x4141, 0x0) [ 1240.581980] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1240.589229] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1240.596498] CPU: 1 PID: 28708 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1240.604377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.613723] Call Trace: [ 1240.616309] dump_stack+0x1b2/0x281 [ 1240.619941] should_fail.cold+0x10a/0x149 [ 1240.624204] should_failslab+0xd6/0x130 [ 1240.628179] __kmalloc+0x2c1/0x400 [ 1240.631720] ? __list_lru_init+0x67/0x710 [ 1240.635873] __list_lru_init+0x67/0x710 [ 1240.639849] sget_userns+0x504/0xc10 [ 1240.643559] ? set_bdev_super+0x110/0x110 [ 1240.647707] ? ns_test_super+0x50/0x50 [ 1240.651595] ? set_bdev_super+0x110/0x110 [ 1240.655745] ? ns_test_super+0x50/0x50 [ 1240.659635] sget+0xd1/0x110 [ 1240.662657] mount_bdev+0xcd/0x360 [ 1240.666190] ? xfs_parseargs+0x1130/0x1130 [ 1240.670426] mount_fs+0x92/0x2a0 [ 1240.673801] vfs_kern_mount.part.0+0x5b/0x470 [ 1240.678297] do_mount+0xe65/0x2a30 [ 1240.681845] ? __do_page_fault+0x159/0xad0 [ 1240.686074] ? retint_kernel+0x2d/0x2d [ 1240.689961] ? copy_mount_string+0x40/0x40 [ 1240.694198] ? memset+0x20/0x40 [ 1240.697474] ? copy_mount_options+0x1fa/0x2f0 [ 1240.701963] ? copy_mnt_ns+0xa30/0xa30 [ 1240.705848] SyS_mount+0xa8/0x120 [ 1240.709298] ? copy_mnt_ns+0xa30/0xa30 [ 1240.713188] do_syscall_64+0x1d5/0x640 [ 1240.717087] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1240.722270] RIP: 0033:0x7f10c039563a [ 1240.725974] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1240.733678] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1240.740939] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1240.748203] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1240.755558] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1240.763081] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 47) 06:54:38 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x101902) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x4, @remote, 0x3}}}, &(0x7f00000001c0)=0x84) r1 = socket$inet_sctp(0x2, 0xe, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x3f}, 0x8) read$snddsp(r0, 0x0, 0x0) 06:54:38 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) 06:54:38 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r0) 06:54:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 57) 06:54:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) keyctl$clear(0x7, r2) 06:54:38 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r0) 06:54:38 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) 06:54:38 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x101902) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x4, @remote, 0x3}}}, &(0x7f00000001c0)=0x84) (async) r1 = socket$inet_sctp(0x2, 0xe, 0x84) (async) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x3f}, 0x8) (async) read$snddsp(r0, 0x0, 0x0) 06:54:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1240.915164] FAULT_INJECTION: forcing a failure. [ 1240.915164] name failslab, interval 1, probability 0, space 0, times 0 [ 1240.929193] FAULT_INJECTION: forcing a failure. [ 1240.929193] name failslab, interval 1, probability 0, space 0, times 0 06:54:38 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) [ 1240.956926] CPU: 1 PID: 28761 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1240.964856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.974207] Call Trace: [ 1240.976794] dump_stack+0x1b2/0x281 [ 1240.980421] should_fail.cold+0x10a/0x149 [ 1240.984569] should_failslab+0xd6/0x130 [ 1240.988546] __kmalloc_track_caller+0x2bc/0x400 [ 1240.993213] ? kstrdup_const+0x35/0x60 [ 1240.997100] ? lock_downgrade+0x740/0x740 [ 1241.001246] kstrdup+0x36/0x70 [ 1241.004440] kstrdup_const+0x35/0x60 [ 1241.008163] alloc_vfsmnt+0xe0/0x7f0 [ 1241.011906] ? _raw_read_unlock+0x29/0x40 [ 1241.016061] vfs_kern_mount.part.0+0x27/0x470 [ 1241.020558] do_mount+0xe65/0x2a30 [ 1241.024101] ? __do_page_fault+0x159/0xad0 [ 1241.028337] ? retint_kernel+0x2d/0x2d [ 1241.032223] ? copy_mount_string+0x40/0x40 [ 1241.036454] ? memset+0x20/0x40 [ 1241.039736] ? copy_mount_options+0x1fa/0x2f0 [ 1241.044227] ? copy_mnt_ns+0xa30/0xa30 [ 1241.048112] SyS_mount+0xa8/0x120 [ 1241.051560] ? copy_mnt_ns+0xa30/0xa30 [ 1241.055443] do_syscall_64+0x1d5/0x640 [ 1241.059331] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1241.064602] RIP: 0033:0x7fe33b68e63a [ 1241.068307] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1241.076097] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1241.083362] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1241.090624] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1241.097886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 06:54:38 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x101902) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x4, @remote, 0x3}}}, &(0x7f00000001c0)=0x84) r1 = socket$inet_sctp(0x2, 0xe, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x3f}, 0x8) read$snddsp(r0, 0x0, 0x0) [ 1241.105152] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1241.128049] CPU: 1 PID: 28764 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1241.135951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.145306] Call Trace: [ 1241.147896] dump_stack+0x1b2/0x281 [ 1241.151530] should_fail.cold+0x10a/0x149 [ 1241.155686] should_failslab+0xd6/0x130 [ 1241.159668] __kmalloc+0x2c1/0x400 [ 1241.163213] ? match_strdup+0x58/0xa0 [ 1241.167031] match_strdup+0x58/0xa0 [ 1241.170657] suffix_kstrtoint.constprop.0+0x61/0x1d0 [ 1241.175759] ? xfs_fs_inode_init_once+0xc0/0xc0 [ 1241.180423] ? memcpy+0x35/0x50 [ 1241.183703] xfs_parseargs+0x828/0x1130 [ 1241.187676] ? suffix_kstrtoint.constprop.0+0x1d0/0x1d0 [ 1241.193052] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1241.198069] ? init_timer_key+0x68/0x300 [ 1241.202132] xfs_fs_fill_super+0x53a/0x1380 [ 1241.206453] mount_bdev+0x2b3/0x360 [ 1241.210072] ? xfs_parseargs+0x1130/0x1130 [ 1241.214300] mount_fs+0x92/0x2a0 [ 1241.217674] vfs_kern_mount.part.0+0x5b/0x470 [ 1241.222181] do_mount+0xe65/0x2a30 [ 1241.225723] ? __do_page_fault+0x159/0xad0 [ 1241.229956] ? retint_kernel+0x2d/0x2d [ 1241.233839] ? copy_mount_string+0x40/0x40 [ 1241.238164] ? memset+0x20/0x40 [ 1241.241443] ? copy_mount_options+0x1fa/0x2f0 [ 1241.245936] ? copy_mnt_ns+0xa30/0xa30 [ 1241.249829] SyS_mount+0xa8/0x120 [ 1241.253289] ? copy_mnt_ns+0xa30/0xa30 [ 1241.257173] do_syscall_64+0x1d5/0x640 [ 1241.261066] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1241.266251] RIP: 0033:0x7f10c039563a [ 1241.270002] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1241.277703] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1241.284956] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1241.292205] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1241.299556] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1241.306903] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 48) 06:54:38 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(0xffffffffffffffff, 0x4141, 0x0) 06:54:38 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r0) 06:54:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) (async) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) 06:54:38 executing program 2: read$snddsp(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x5a38c0, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000000)) 06:54:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 58) 06:54:38 executing program 2: read$snddsp(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x5a38c0, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000000)) read$snddsp(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x5a38c0, 0x0) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000000)) (async) 06:54:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:38 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1241.442461] FAULT_INJECTION: forcing a failure. [ 1241.442461] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.453802] CPU: 1 PID: 28821 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1241.461784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.471134] Call Trace: [ 1241.473728] dump_stack+0x1b2/0x281 [ 1241.477361] should_fail.cold+0x10a/0x149 [ 1241.481519] should_failslab+0xd6/0x130 [ 1241.485496] kmem_cache_alloc+0x40/0x3c0 06:54:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x2}) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) 06:54:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1241.489555] __es_insert_extent+0x338/0x1360 [ 1241.493973] ext4_es_insert_extent+0x1b9/0x530 [ 1241.498560] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1241.504373] ext4_map_blocks+0x887/0x1730 [ 1241.508531] ? ext4_issue_zeroout+0x150/0x150 [ 1241.513031] ? __ext4_new_inode+0x27c/0x4eb0 [ 1241.517460] ext4_getblk+0x98/0x3f0 [ 1241.521114] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1241.525446] ext4_bread+0x6c/0x1a0 [ 1241.528989] ? ext4_getblk+0x3f0/0x3f0 [ 1241.532881] ? dquot_initialize_needed+0x240/0x240 [ 1241.537817] ext4_append+0x143/0x350 [ 1241.541537] ext4_mkdir+0x4c9/0xbd0 [ 1241.545173] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 1241.549849] ? security_inode_mkdir+0xca/0x100 [ 1241.554433] vfs_mkdir+0x463/0x6e0 [ 1241.557979] SyS_mkdirat+0x1fd/0x270 [ 1241.558641] FAULT_INJECTION: forcing a failure. [ 1241.558641] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.561699] ? SyS_mknod+0x30/0x30 [ 1241.561708] ? fput_many+0xe/0x140 [ 1241.561717] ? do_syscall_64+0x4c/0x640 [ 1241.561726] ? SyS_mknod+0x30/0x30 [ 1241.561734] do_syscall_64+0x1d5/0x640 [ 1241.561748] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1241.561757] RIP: 0033:0x7fe33b68c217 [ 1241.561762] RSP: 002b:00007fe33a001f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1241.607910] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68c217 [ 1241.615191] RDX: 00000000000001ff RSI: 0000000020000240 RDI: 00000000ffffff9c [ 1241.622476] RBP: 00007fe33a0021d0 R08: 0000000000000000 R09: 00007fe33a0021d0 [ 1241.629745] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000200 [ 1241.637018] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1241.644303] CPU: 0 PID: 28822 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1241.646543] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1241.652191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.652195] Call Trace: [ 1241.652211] dump_stack+0x1b2/0x281 [ 1241.652224] should_fail.cold+0x10a/0x149 [ 1241.652237] should_failslab+0xd6/0x130 [ 1241.652249] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1241.652262] xfs_fs_fill_super+0x50/0x1380 [ 1241.690377] mount_bdev+0x2b3/0x360 [ 1241.694009] ? xfs_parseargs+0x1130/0x1130 [ 1241.698243] mount_fs+0x92/0x2a0 [ 1241.701615] vfs_kern_mount.part.0+0x5b/0x470 [ 1241.706202] do_mount+0xe65/0x2a30 [ 1241.709744] ? __do_page_fault+0x159/0xad0 [ 1241.713983] ? retint_kernel+0x2d/0x2d [ 1241.717873] ? copy_mount_string+0x40/0x40 [ 1241.722108] ? memset+0x20/0x40 [ 1241.725391] ? copy_mount_options+0x1fa/0x2f0 [ 1241.729890] ? copy_mnt_ns+0xa30/0xa30 [ 1241.733786] SyS_mount+0xa8/0x120 [ 1241.737242] ? copy_mnt_ns+0xa30/0xa30 [ 1241.741131] do_syscall_64+0x1d5/0x640 [ 1241.745026] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1241.750210] RIP: 0033:0x7f10c039563a [ 1241.753916] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1241.761617] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1241.768876] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1241.776123] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1241.783370] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 06:54:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 49) 06:54:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x2}) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async, rerun: 32) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (rerun: 32) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async, rerun: 64) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) (rerun: 64) 06:54:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:39 executing program 2: read$snddsp(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(0xffffffffffffffff, 0x4147, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) (async) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x5a38c0, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r0, 0x80184132, &(0x7f0000000000)) 06:54:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 59) [ 1241.790617] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(0x0, &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) 06:54:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x2}) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r2) 06:54:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3e551bafa0cb8bb4ea9ade237d514633bc783cd65d60a74c26305f60dbac81ccc4611e391e6a5be289302b4e75dfabbf545fdd5cf88bccfa248e4743e1262edfcbc6abe7dffb57d6a832feffe9f19e7165d3b9e21e9dd53ac0cdda77048d8a8327443ca1e18cdf29bb0428d6aa665f1a88d68181e0c1c149cb41a4984d1ef193563a6a1f0aefb0e1b077", 0x8a, r0) keyctl$search(0xa, r2, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, r3) 06:54:39 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x200) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) 06:54:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) keyctl$search(0xa, r0, &(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, r2) r3 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r3) r4 = add_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="88f413158dc209708fb5475dcff14fe63400e796a652cfd549e4cac62bd7915e345cc39a47298270cb5e310dfcaa81f37c432db151ca324f208af7ff3ff5b31ce9e9d8be41e9306954fe1838300c6f4e3e20a0683e95795574e7dbe8c67f83bf968f1b9b6a88f1c4251176ab7c8e42cb8762c537f42b4f0e6438ee026047d209b9b288df87327a84803fc0f216e84eda18ac1ac2b9317dd94277c7c54e8184adee6835c1e208247bfdec798488f3ec5e5962afc558d42e4196a49fde28a75f2aba838ac826", 0xc5, r2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) [ 1241.953880] FAULT_INJECTION: forcing a failure. [ 1241.953880] name failslab, interval 1, probability 0, space 0, times 0 [ 1241.965552] CPU: 1 PID: 28883 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1241.973448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1241.982803] Call Trace: [ 1241.985406] dump_stack+0x1b2/0x281 [ 1241.989039] should_fail.cold+0x10a/0x149 [ 1241.993193] should_failslab+0xd6/0x130 [ 1241.997170] __kmalloc_track_caller+0x2bc/0x400 [ 1242.001835] ? strndup_user+0x5b/0xf0 [ 1242.005636] memdup_user+0x22/0xa0 [ 1242.009178] strndup_user+0x5b/0xf0 [ 1242.012815] ? copy_mnt_ns+0xa30/0xa30 [ 1242.016705] SyS_mount+0x68/0x120 [ 1242.020161] ? copy_mnt_ns+0xa30/0xa30 [ 1242.024049] do_syscall_64+0x1d5/0x640 [ 1242.027947] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1242.033139] RIP: 0033:0x7fe33b68e63a [ 1242.036843] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1242.044565] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1242.051834] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1242.059100] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1242.066377] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1242.073640] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1242.085929] FAULT_INJECTION: forcing a failure. [ 1242.085929] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.122894] CPU: 0 PID: 28885 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1242.130801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.140158] Call Trace: [ 1242.142751] dump_stack+0x1b2/0x281 [ 1242.146384] should_fail.cold+0x10a/0x149 [ 1242.150549] should_failslab+0xd6/0x130 [ 1242.154535] __kmalloc+0x2c1/0x400 [ 1242.158083] ? match_strdup+0x58/0xa0 [ 1242.161887] match_strdup+0x58/0xa0 [ 1242.165518] suffix_kstrtoint.constprop.0+0x61/0x1d0 [ 1242.170624] ? xfs_fs_inode_init_once+0xc0/0xc0 [ 1242.175297] ? memcpy+0x35/0x50 [ 1242.178582] xfs_parseargs+0x828/0x1130 [ 1242.182563] ? suffix_kstrtoint.constprop.0+0x1d0/0x1d0 [ 1242.187939] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1242.192959] ? init_timer_key+0x68/0x300 [ 1242.197025] xfs_fs_fill_super+0x53a/0x1380 [ 1242.201363] mount_bdev+0x2b3/0x360 [ 1242.204990] ? xfs_parseargs+0x1130/0x1130 [ 1242.209225] mount_fs+0x92/0x2a0 [ 1242.212604] vfs_kern_mount.part.0+0x5b/0x470 [ 1242.217100] do_mount+0xe65/0x2a30 [ 1242.220644] ? __do_page_fault+0x159/0xad0 [ 1242.224881] ? retint_kernel+0x2d/0x2d [ 1242.228766] ? copy_mount_string+0x40/0x40 [ 1242.232998] ? memset+0x20/0x40 [ 1242.236273] ? copy_mount_options+0x1fa/0x2f0 [ 1242.240763] ? copy_mnt_ns+0xa30/0xa30 [ 1242.244650] SyS_mount+0xa8/0x120 [ 1242.248100] ? copy_mnt_ns+0xa30/0xa30 [ 1242.251984] do_syscall_64+0x1d5/0x640 [ 1242.255880] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1242.261066] RIP: 0033:0x7f10c039563a [ 1242.264769] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:54:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 50) 06:54:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af045258db42e4d0b951d4de5729ad434b3e99ca1a2d34a8ea39cbf97e7fed96269bb5a36c3c7c9b571c47eacddb4b0bf84da2739530bef1dd7a784be732e3dfb99c4cfd578da9c75b24eafd91647bc1f74dce9fd3dc62e795aadd9e361b9c", 0xbb, r1) 06:54:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$clear(0x7, r0) keyctl$search(0xa, r0, &(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, r0) (async) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, r2) (async) r3 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r3) (async) r4 = add_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="88f413158dc209708fb5475dcff14fe63400e796a652cfd549e4cac62bd7915e345cc39a47298270cb5e310dfcaa81f37c432db151ca324f208af7ff3ff5b31ce9e9d8be41e9306954fe1838300c6f4e3e20a0683e95795574e7dbe8c67f83bf968f1b9b6a88f1c4251176ab7c8e42cb8762c537f42b4f0e6438ee026047d209b9b288df87327a84803fc0f216e84eda18ac1ac2b9317dd94277c7c54e8184adee6835c1e208247bfdec798488f3ec5e5962afc558d42e4196a49fde28a75f2aba838ac826", 0xc5, r2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) 06:54:39 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x200) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x200) (async) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) 06:54:39 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) [ 1242.272471] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1242.277311] FAULT_INJECTION: forcing a failure. [ 1242.277311] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.279728] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1242.279734] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1242.279738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1242.279743] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1242.325448] CPU: 1 PID: 28904 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1242.333345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.342699] Call Trace: [ 1242.345291] dump_stack+0x1b2/0x281 [ 1242.348932] should_fail.cold+0x10a/0x149 [ 1242.353086] should_failslab+0xd6/0x130 [ 1242.357064] kmem_cache_alloc+0x28e/0x3c0 [ 1242.361222] getname_flags+0xc8/0x550 [ 1242.365027] ? __do_page_fault+0x159/0xad0 [ 1242.369267] user_path_at_empty+0x2a/0x50 [ 1242.373427] do_mount+0x118/0x2a30 [ 1242.376970] ? __do_page_fault+0x159/0xad0 [ 1242.381206] ? retint_kernel+0x2d/0x2d [ 1242.385107] ? copy_mount_string+0x40/0x40 [ 1242.389348] ? memset+0x20/0x40 [ 1242.392628] ? copy_mount_options+0x1fa/0x2f0 [ 1242.397121] ? copy_mnt_ns+0xa30/0xa30 [ 1242.401009] SyS_mount+0xa8/0x120 [ 1242.404461] ? copy_mnt_ns+0xa30/0xa30 [ 1242.408349] do_syscall_64+0x1d5/0x640 [ 1242.412244] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1242.417436] RIP: 0033:0x7fe33b68e63a [ 1242.421141] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1242.428845] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1242.436116] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1242.443385] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1242.450661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1242.457936] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 06:54:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 60) 06:54:39 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:39 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x200) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) 06:54:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 51) 06:54:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r1) 06:54:39 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) keyctl$clear(0x7, r0) keyctl$search(0xa, r0, &(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, r0) (async, rerun: 64) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (rerun: 64) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, r2) (async, rerun: 32) r3 = add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) (rerun: 32) keyctl$clear(0x7, r3) r4 = add_key(&(0x7f0000000280)='cifs.idmap\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="88f413158dc209708fb5475dcff14fe63400e796a652cfd549e4cac62bd7915e345cc39a47298270cb5e310dfcaa81f37c432db151ca324f208af7ff3ff5b31ce9e9d8be41e9306954fe1838300c6f4e3e20a0683e95795574e7dbe8c67f83bf968f1b9b6a88f1c4251176ab7c8e42cb8762c537f42b4f0e6438ee026047d209b9b288df87327a84803fc0f216e84eda18ac1ac2b9317dd94277c7c54e8184adee6835c1e208247bfdec798488f3ec5e5962afc558d42e4196a49fde28a75f2aba838ac826", 0xc5, r2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r4) 06:54:39 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000000)=0x10000) 06:54:39 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r1) [ 1242.543920] FAULT_INJECTION: forcing a failure. [ 1242.543920] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.564331] FAULT_INJECTION: forcing a failure. [ 1242.564331] name failslab, interval 1, probability 0, space 0, times 0 [ 1242.591956] CPU: 0 PID: 28944 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1242.599865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.609219] Call Trace: [ 1242.611811] dump_stack+0x1b2/0x281 [ 1242.615443] should_fail.cold+0x10a/0x149 [ 1242.619596] should_failslab+0xd6/0x130 [ 1242.623581] __kmalloc_track_caller+0x2bc/0x400 [ 1242.628252] ? kstrdup_const+0x35/0x60 [ 1242.632138] ? lock_downgrade+0x740/0x740 [ 1242.636286] kstrdup+0x36/0x70 [ 1242.639483] kstrdup_const+0x35/0x60 [ 1242.643199] alloc_vfsmnt+0xe0/0x7f0 [ 1242.646911] ? _raw_read_unlock+0x3b/0x40 [ 1242.651060] vfs_kern_mount.part.0+0x27/0x470 [ 1242.655558] do_mount+0xe65/0x2a30 [ 1242.659101] ? __do_page_fault+0x159/0xad0 [ 1242.663333] ? retint_kernel+0x2d/0x2d [ 1242.667393] ? copy_mount_string+0x40/0x40 [ 1242.671629] ? memset+0x20/0x40 [ 1242.674925] ? copy_mount_options+0x1fa/0x2f0 [ 1242.679422] ? copy_mnt_ns+0xa30/0xa30 [ 1242.683312] SyS_mount+0xa8/0x120 [ 1242.686769] ? copy_mnt_ns+0xa30/0xa30 [ 1242.690738] do_syscall_64+0x1d5/0x640 [ 1242.694642] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1242.699984] RIP: 0033:0x7fe33b68e63a [ 1242.703691] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1242.711397] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1242.718671] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1242.725942] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1242.733211] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 06:54:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) keyctl$search(0xa, r2, &(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x2}, r3) 06:54:40 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, 0x0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, r1) [ 1242.740480] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1242.753628] CPU: 0 PID: 28945 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1242.761529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1242.770878] Call Trace: [ 1242.773467] dump_stack+0x1b2/0x281 [ 1242.777273] should_fail.cold+0x10a/0x149 [ 1242.781429] should_failslab+0xd6/0x130 [ 1242.785406] __kmalloc+0x2c1/0x400 [ 1242.788948] ? match_strdup+0x58/0xa0 [ 1242.792751] match_strdup+0x58/0xa0 [ 1242.796380] suffix_kstrtoint.constprop.0+0x61/0x1d0 [ 1242.801486] ? xfs_fs_inode_init_once+0xc0/0xc0 [ 1242.806164] ? memcpy+0x35/0x50 [ 1242.809451] xfs_parseargs+0x828/0x1130 [ 1242.813428] ? suffix_kstrtoint.constprop.0+0x1d0/0x1d0 [ 1242.818800] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1242.823816] ? init_timer_key+0x68/0x300 [ 1242.827879] xfs_fs_fill_super+0x53a/0x1380 [ 1242.832203] mount_bdev+0x2b3/0x360 [ 1242.835828] ? xfs_parseargs+0x1130/0x1130 [ 1242.840067] mount_fs+0x92/0x2a0 06:54:40 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) (async) read$snddsp(r0, 0x0, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000000)=0x10000) [ 1242.843465] vfs_kern_mount.part.0+0x5b/0x470 [ 1242.848050] do_mount+0xe65/0x2a30 [ 1242.851592] ? __do_page_fault+0x159/0xad0 [ 1242.855828] ? retint_kernel+0x2d/0x2d [ 1242.859735] ? copy_mount_string+0x40/0x40 [ 1242.863974] ? memset+0x20/0x40 [ 1242.867254] ? copy_mount_options+0x1fa/0x2f0 [ 1242.871746] ? copy_mnt_ns+0xa30/0xa30 [ 1242.875639] SyS_mount+0xa8/0x120 [ 1242.879106] ? copy_mnt_ns+0xa30/0xa30 [ 1242.882999] do_syscall_64+0x1d5/0x640 [ 1242.886891] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1242.892158] RIP: 0033:0x7f10c039563a [ 1242.895870] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1242.903580] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1242.910846] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1242.918111] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1242.925378] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1242.932644] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 61) 06:54:40 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300), 0x0, r1) 06:54:40 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000000)=0x10000) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000000)=0x10000) (async) 06:54:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) (async) keyctl$search(0xa, r2, &(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x2}, r3) 06:54:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 52) [ 1243.030385] FAULT_INJECTION: forcing a failure. [ 1243.030385] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1243.042207] CPU: 1 PID: 29008 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1243.050085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.059436] Call Trace: [ 1243.062032] dump_stack+0x1b2/0x281 [ 1243.065664] should_fail.cold+0x10a/0x149 [ 1243.069815] __alloc_pages_nodemask+0x22c/0x2720 [ 1243.074571] ? __save_stack_trace+0x63/0x160 06:54:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r3) (async, rerun: 64) keyctl$search(0xa, r2, &(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x2}, r3) (rerun: 64) 06:54:40 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300), 0x0, r1) [ 1243.078981] ? is_bpf_text_address+0x91/0x150 [ 1243.083479] ? __lock_acquire+0x5fc/0x3f20 [ 1243.087717] ? cmp_ex_sort+0xb0/0xb0 [ 1243.091434] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1243.096279] ? search_extable+0x6f/0x80 [ 1243.100251] ? trim_init_extable+0x280/0x280 [ 1243.104653] ? __kernel_text_address+0x9/0x30 [ 1243.109147] ? copy_mount_options+0x194/0x2f0 [ 1243.113641] ? fixup_exception+0x93/0xd0 [ 1243.117701] ? no_context+0x9c/0x7c0 [ 1243.121416] ? force_sig_info_fault.constprop.0+0x260/0x260 06:54:40 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r0, 0x81204101, &(0x7f00000000c0)) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f0000000200)="ff75a4550af14defc0d1f88c776660e42dfed2837f11f360a76bae7329574713af936b70e737b067dd826ec4824f52cb1807a956053f298b2286bd9775e25edd8fd054db7bf3b936480765b54f8b246369239d5833aa01d9b2fb4fb2fb9608a8db69f394a306540f4a3182fd1b2f05ab35920c9cfeb23d0eff02722a22daa0ae1933c5fe491c0ba2c7690bc85bb62ff0e5db82bbcb9b7d54c505390c2127261125ffd50279ceb7f863f2951018e251adb294756c4ae8529ef4efc71008311d33e648d3d1e31a0f7532d303371743c4a502d871914c4a0c0eccabaa26c7ede2f42bf2a5b110848570c7c2c09acf546667fa4efb4ec297be160d0de2ac11a637925d46aaf0881f9cb019de454905bd31bed5ee7bb747096955f7c64f483b5e4eaa67a5601e837ad95f71638b5072962c706f7b41a8160b601fce57d4698ea23649ad8ceab5d3161c2af8cb9644e04cd79ad8df859bff9f98b593ae03f036274b1ab71eef68db0320b7577e59ae5a8f3a9254b0fe5838f323fcfbb41a98fcde55d6719c9dde08a7bbb2703fc63eeca9e8974a9a89e69d4e79224edc406624a706163b0a1c1fc4c17b24b8c308b7bab91fd741a036a7528592fbe26d67de299744ae407a24f5250a0e3441f003589650790386781a1b02d48c1d6040d4d0a91fb12f6edb72947dc93907fdd9b8fda32c2759c0b045a1c2b906aa309423eaf9bba0aac7a5a0ecbde7fdde29d80f12968e4502fca4e06ad4bf962478ff368d949b3d2cad032ded3fe7a0c202c22a0094416edcf390df8338f3a27af6b75df753b786121664a227adf4029e2c37b015134f7aa3298dfe9c5c7ce57bcdefc4353fb76ed70f7d35908d4d8e59878c3a7a56970c78198aa26f79ce64c72305f18206a2a3e926bf21e58fe95b017e69789ce74eaa6dde1bf2a31d3233dd392ed63b214a8777689e7604d95684c22ab4918ff1480b7039d8624fc9c59b2e200776044ec361fa403535daaea695dd2d656a830e2e4279404c1722a863180d36b31b253236ff92364c7663370d7654876b083086d810960bf1963e30fb1dff0c36e5d924c93e4d5995b3bf6f79b16a9cc6a53bcc4b68533f3d12ebd50f85f1cef1e81743b3c22c4ad076c385e334c8f77c374dd0584140051f9479384cf56d6dace8f2ed773599ce9941ef07bd64693cb7522c4bba1e816111b364bf6c0b0fab0ee4c2bb4be1d7ead37e86bbf82dff5a1339caf3707544c58b347c99f7a28520d6d476d9a441741e79a825ea532ed52bae56631932131265676837f0ef08295952d3073f1e9857fac9d0c6b93a5c2ca9d072b787f8e45f57ee3a76a3720c18702da4c8b73d63c28e29413e53ea7df2ac79b6d0938856b6aa3e8d6dced2a3909147fd66616305b416dd2b20ca6315894cfdf207ce1bce492dbf3214b1b030c531c8d22dd78def4ba127105affab20d5c315eea09243a07fee903d0545017594d804a4cfd311f9a9cd633237f6e343c6e2d1497e67bcb648a465eb789812019408cc4de16d8288af1b77b312437154f24625a98b1f15d1f54a143a04a80e6894fe5fa14be8ec64e62702fe704cbc4b35e7ba207a50014dde7bca3e5246511ca5ff90a0ce65309d2347f37974633ab9a4484bd769b747803504fefce0188ccd258d88a5a91aa0452977078f162cf38e34610968e756bac2c1e4f8662c439fb52a1c6e06b26ef6cff4dd8c7ec7c331cc93a4aba8fb5fc4b67c4d3199bb0db7b2a0f89dfcbc7236727c75cb241d5729d322fa0ae4e5b50cd0e4cf09814952fe414fb723381351559236e7a3c40c6b36735b79c258c476e3fd29240476da209ad940dd39193c64f33ee1b5236aebacdadfa2f94287b2fe168b3af6e586da9a0ff17a7afdf67cb5664fed941bc822860f66880011fcd3b97e1893a0b1b5e30d607160292cffce555d622a8bfdd4a97d5a79055ba49b6e97503fa32339eed37fd2ae1926cfd1642e122d98aef28ec3367b1a142136de7126a671a242dc6db1c059a82651303dc4e0ece14fce46ed049e7df609dcdfb5f1643921a63b2a6c4f833803394346cc23323791ac94627f2224709e103d5638f922e43b957f110818be65b7ec6a782182a0a038d4f6f556830e3b8ddd4e4e0015ee8649d7e4de03150d5f532c75cd1123034d63cbae9fcf3a83af2aea1f2adbc00c36b5e9252119677f774ee4891e8b1001d9a68c526542c9c59d8d86ba9309adc5baa9e91f429139be506b70eaf6a8e91604caa1172105503eb0983e776d05c49784b07dadc7307ad3b7d49750d33ed461a9c9babbb10cb58f2d36347617cd9112f6dd50bac80219abf3ee5109ff736f7f90fa0d065671e4b7c39990eb6f4e3920e55bd2fe9a6a26d6371022e06e174cf3af568c1af6eeb023144cee4cfbbc5cd9b1e22b63084a96120612f4697d2a9ddec82048a93a9ab80ccf6deaf363c01c2580160d77d3b4c57441169da1de249d2ac0078289f9866c52780a003741e2d8ca20d63dd2f3d66f10db601a66f4f81bb533afc0de74f530099b94b536ddb568ddc60e48c314cc13d939d9475825dc49b7dc2b9276a3e9dd994c0af28f3119ead4b756f3beec204f81783e8523b74f7ce338371fb5445fe8639272657bcedb5ef6e7e89aab986a584e7f005061b081571a29bb972071d49bb046124e5aa997b5b75fd2edbe318c2c4f696e136d8f54318550d7927425b4aff48a96e79391b272850acaf0f28c300bf3a83e148ee1ec04a070d2f0edc7bcf0353cbf1133dc42d1ca0c43f73ed0dafc119475751b4cca12ba3cdc6e2837b2c8f08c0b6d9905ecc2ee1d6c4382970d1a8bbae993bac5c7ef2f5219c4ff0597ea408e5538d480504b449b634a5ef7aa47c6fa9f5c307505c2c5ab70a484c0f774ec06e53cf91be65d54d7daebea4ac378680cd4d7fb0200e7a06f72a3ab4336f1837849179d901eff2ef272aaa47fbba8425138746bb1b4b98b0d8c4ce8156f2f8a0f558dd423cd3e022d101bfeb95a6d48b7bfe7338cf1dfab5ab2963a7ad3ed07796a1f7a3d708d8dd013e0b93ad85413fe2a9b6de6b9988e5deb255301fb52caddf029a7773d19ec2f3af7d5055e73ff60fb80dd3c7bc87650ace211f8dd6ebc8ce6b68193a6838950ed80b81e4190a80ad410e472b0a47a94c6fea94a856a2a48c8eb8de8dedc09978c96362b515dbbdedd156c0d746b52e82b7399f37cc4dd244bd40309ffe8d48b24175e6a2c6d2251b035a7ebcc43fa9a277d414da7cd5b12e9eb57edd2df74a8d7d3accf560a7afffb4eba24b8c426752083258403cf47d6f7c83bbc1f2668b67cea776008ab329a16eaf5c12e49bf3674fba32aeb0e204d5170b54d8a7eda614a5e40be84800beb29bb81cd3f8272b2eeee8ff3e96308dd6cf5c4e8f4cfa5baa276ab068dad26e1c1c2455786286ab9638984a31772a01ef1bacd86d18d50e550aa1174517cca086313e0f7f42152234fef3c35eec20572c5764fb99a71af5eea577b7c502ceebcdc486603eac1ad45e70ef18cb9f2d7ba592fb97b2768034d8285303577d5d4985c367be11a632de12900bcebdb46e851c571a61e7ffa761dd81e00caff6f6d1c38d9b6ef0e9f59a77b12de1b5b62aae262e412eabc97503e92654e1b49b961d188053821008c1b5016000a5e974697866c9553a6e6a7e292b8a21b339e8e8a316ab28e02ab4f78817b7cf00e4b493988d2ea6b450c73e42380d3f34e71b209bfa982e5bb1050294a06cf1f37327187f02723d7672a945a4c9ed839536b526fdcb567f8c5d0943e185d4db9e1f8112670f85e536456b51adc6307093f4b5ac3d9925c6c81405c9bdc3139bf81a3dc8b1f953737ad35f74e623f4ea896a23779c45af903419946cb61f525d24f6958a658dc5785d7917891c025a149cae0cdf10155c6157214b6c6ef72d5862b8742b2c4c103aeb8fb069367d9fe061b5edba6e4d2a3ae21e7f54a2300ea16dd39bbfc54d2ba6c5c7397ef4727333020ac036d7ef24657c38e372b173c3bb0d48674012abd15ed16fe0a23a8e74d2b5cbc5324749bd8a2c712398f0d05529697f87cb3d5056ebb8deb80db9c99dae71c7b6d9aeabd79d63789070e0ba1c1219b1bcdc4f3ab0170b79b84f8011db29e7542ad70833ee248902c50097ad0c45d3d22b32966a5f02418eb384abb02d4adc28d2aab3c5bee2082ad16eb8fd80732f54e6ca8154948aaf6ff1abee63b72f74401aec7b5db17057630a7a93c51ce4192f9aa14e5ba1ee1f8103e006dd8a02b60fc9039671b22ae0cfffb31f44aaa44603c81ebe3bc234de600659b16998349d8a8514a16d7a2fba2d94d2ae3571533f5dd634e6b5b215d49929654357a7c6667092778d89d38bd571e20ddd75519c0ea1383bec6adacc27f2b9184ad9c6c7128a95a0c5d6139f708792ceb4da8a33807a2a5a5eae642f722c18857682b051d95076598ebaebc5dc92c442757af78f5427e264ffdcfd06393cfd945a071efdd6b547d9f4cf8e3237044b6d50e01281135bcd934dc1892882f370ee3c21debf7fcccade5931833f3cf6864bac638f2e3f80bc6b37e27c6342df5913a6b62cb56a4a7572c52972f04ba462965c4b55aa92ab6899eeed9b37f2f0a8af448158a22ade56986ca4db2e4b18c4f575dbb91822371220131c66f8605c119d895fc53ea90bb005a7e3f28a48d439c41cd4f5804edb43471e04d0e4f309928af693100acd62c5628a8655e62f68f5ef8495a4dcbd0c0b0805530220f4fd0b0e002799ee3a1b70485138dc31fd735f180f6832398f86a5c1ece610ff1f20e0d93c44cafbe97e24889778e9563de170cab575342e3565103ba6aa61b19d0611c8b4f8bdf98a146eba442432693f2cafaf082db22c363df56a85c62e6f9227a675ebc5b2c84cd89e14ecfb5bb5a9a68c71ce814b382ef797f82ea01d4c0df4f430154a01f0f5f66a6b171f7fdfebd35049ddb2d846671716b4ad75407e79f3f3f2a837753cfecd7260cddd12243ab801305c40c73c844610fd02cbb71cad0ead70a593269530f4e1d5f5c20e7f1341caca8b09d2e4838fd6315a3c7ea1fa3a702827c3f479c069c7bea4df7538580d8436500387293a680413ce2c7465673358fccd0e986adc861f9179b77de2f0f4a02a42badbeff2022a3e74136daa9203cd108197acdfb404ab572f6715cb1cb3f38f0ebda80a49bfb30b4e499ebdef6756c4226d3b9aaed7ec9db57a3647337f13ef4e1684bc9ac2504b252ef06a5be834fa88def4c4a6dbeecb4099559ee734e66b40760943426722ecb3511addd1c23c02f47ee31498a55126a30a75f9eed24779ab0cc95628d85b5a380415b90cd977aa40fcb0befbaef11b842bb77782b56144e2bab88898bc60c03257059517bba63d523af036f94f146a3e95fae413234a49d434c16625fd6029b87225414e7c656180b7bf3d2f08f29b5add2cca466cd0cc638d6e971528f3b6ac30076838f0bcc8b7a8b5a1f7910070b8a94abf8e3c28ced87626baa1eeb622bde0afee4f1282297a17f974eba207c21276adb68edbc7e9f57727fbaaf74bc95c005c18d4bf4efa221ec8756d1f223d91943fce16e556eb59c739f8a6a9dfe1e0b79b3b343e7d1416d804bed80b1aa1840150ededbb004462cb18745b4caddbb1518874bfc81e22b01b71e2c166ffca659ca758cf528ce17838ad2889a8d0f7c114cc0300009afc6258f6537a9792af8e7a7d44d5bc888fd80318e6fcf11986d1a28b59af392b5d1aa583056126c15dbb9e1caf4ba42d64cead632", 0x1000}) [ 1243.127126] ? bad_area_access_error+0x1f8/0x3e0 [ 1243.131892] cache_grow_begin+0x91/0x700 [ 1243.135948] ? fs_reclaim_release+0xd0/0x110 [ 1243.140356] ? check_preemption_disabled+0x35/0x240 [ 1243.145366] cache_alloc_refill+0x273/0x350 [ 1243.147159] FAULT_INJECTION: forcing a failure. [ 1243.147159] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1243.149686] kmem_cache_alloc+0x333/0x3c0 [ 1243.165609] getname_flags+0xc8/0x550 [ 1243.169396] ? __do_page_fault+0x159/0xad0 [ 1243.173618] user_path_at_empty+0x2a/0x50 [ 1243.177751] do_mount+0x118/0x2a30 [ 1243.181276] ? __do_page_fault+0x159/0xad0 [ 1243.185492] ? retint_kernel+0x2d/0x2d [ 1243.189363] ? copy_mount_string+0x40/0x40 [ 1243.193580] ? memset+0x20/0x40 [ 1243.196847] ? copy_mount_options+0x1fa/0x2f0 [ 1243.201324] ? copy_mnt_ns+0xa30/0xa30 [ 1243.205193] SyS_mount+0xa8/0x120 [ 1243.208722] ? copy_mnt_ns+0xa30/0xa30 [ 1243.212600] do_syscall_64+0x1d5/0x640 [ 1243.216477] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1243.221648] RIP: 0033:0x7fe33b68e63a [ 1243.225339] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1243.233027] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1243.240274] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1243.247523] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1243.254772] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1243.262021] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1243.269285] CPU: 0 PID: 29017 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1243.277166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.286512] Call Trace: [ 1243.289104] dump_stack+0x1b2/0x281 [ 1243.292734] should_fail.cold+0x10a/0x149 [ 1243.296895] __alloc_pages_nodemask+0x22c/0x2720 [ 1243.301660] ? string+0x17e/0x1d0 [ 1243.305121] ? __lock_acquire+0x5fc/0x3f20 [ 1243.309356] ? bdev_name.constprop.0+0x1cd/0x240 [ 1243.314114] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1243.318959] ? pointer+0x31f/0x9e0 [ 1243.322497] ? lock_downgrade+0x740/0x740 [ 1243.326639] ? format_decode+0x1cb/0x890 [ 1243.330700] ? set_precision+0x150/0x150 [ 1243.334762] ? reacquire_held_locks+0xb5/0x3f0 [ 1243.339345] cache_grow_begin+0x91/0x700 [ 1243.343406] ? fs_reclaim_release+0xd0/0x110 [ 1243.347816] ? check_preemption_disabled+0x35/0x240 [ 1243.352840] cache_alloc_refill+0x273/0x350 [ 1243.357168] kmem_cache_alloc_trace+0x340/0x3d0 [ 1243.361840] xfs_fs_fill_super+0x50/0x1380 [ 1243.366166] mount_bdev+0x2b3/0x360 [ 1243.369797] ? xfs_parseargs+0x1130/0x1130 [ 1243.374031] mount_fs+0x92/0x2a0 [ 1243.377411] vfs_kern_mount.part.0+0x5b/0x470 06:54:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300), 0x0, r1) 06:54:40 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) [ 1243.381904] do_mount+0xe65/0x2a30 [ 1243.385443] ? __do_page_fault+0x159/0xad0 [ 1243.389676] ? retint_kernel+0x2d/0x2d [ 1243.391375] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1243.393557] ? copy_mount_string+0x40/0x40 [ 1243.393571] ? memset+0x20/0x40 [ 1243.393580] ? copy_mount_options+0x1fa/0x2f0 [ 1243.393590] ? copy_mnt_ns+0xa30/0xa30 [ 1243.415042] SyS_mount+0xa8/0x120 [ 1243.418494] ? copy_mnt_ns+0xa30/0xa30 [ 1243.422377] do_syscall_64+0x1d5/0x640 [ 1243.426271] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1243.431451] RIP: 0033:0x7f10c039563a [ 1243.435160] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1243.443298] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1243.450650] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1243.457916] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1243.465187] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1243.472455] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 62) 06:54:40 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r0, 0x81204101, &(0x7f00000000c0)) (async) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f0000000200)="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", 0x1000}) 06:54:40 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="298e2d7fc8ce3ba434e9555db1cce0ceba5bb122f0971f00e7a1fcf7e2e67a28e77092dbea4f0cd0c1502407fa33eeac4d23745ae6be82437b14ea6599eb0bf4ab41eab652", 0x45, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) 06:54:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300)="28fc3440f44f7f5c85e00aa7cff78a951ef186c5625e10da5cb349c450422f60b2818b99cc49d8cd060d15d5fe3ff2064fb8522e1cf1e29c517951c438544a7226fcc73a78eaa64883cf78a0e50aaaccfd320390998b5620fdd24070af04", 0x5e, r1) 06:54:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 53) [ 1243.492531] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300)='(', 0x1, r1) 06:54:41 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async, rerun: 64) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (rerun: 64) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="298e2d7fc8ce3ba434e9555db1cce0ceba5bb122f0971f00e7a1fcf7e2e67a28e77092dbea4f0cd0c1502407fa33eeac4d23745ae6be82437b14ea6599eb0bf4ab41eab652", 0x45, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) [ 1243.566818] encrypted_key: insufficient parameters specified [ 1243.585684] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] [ 1243.597942] FAULT_INJECTION: forcing a failure. [ 1243.597942] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:54:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300), 0x0, r1) 06:54:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="298e2d7fc8ce3ba434e9555db1cce0ceba5bb122f0971f00e7a1fcf7e2e67a28e77092dbea4f0cd0c1502407fa33eeac4d23745ae6be82437b14ea6599eb0bf4ab41eab652", 0x45, r2) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$search(0xa, r2, &(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) (async) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="298e2d7fc8ce3ba434e9555db1cce0ceba5bb122f0971f00e7a1fcf7e2e67a28e77092dbea4f0cd0c1502407fa33eeac4d23745ae6be82437b14ea6599eb0bf4ab41eab652", 0x45, r2) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) 06:54:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300), 0x0, r1) [ 1243.609757] CPU: 0 PID: 29065 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1243.617638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.626989] Call Trace: [ 1243.629579] dump_stack+0x1b2/0x281 [ 1243.633214] should_fail.cold+0x10a/0x149 [ 1243.637362] ? get_page_from_freelist+0xaf6/0x25a0 [ 1243.642293] __alloc_pages_nodemask+0x22c/0x2720 [ 1243.647056] ? lock_downgrade+0x740/0x740 [ 1243.651203] ? page_outside_zone_boundaries+0x1db/0x310 [ 1243.656575] ? __lock_acquire+0x5fc/0x3f20 [ 1243.660817] ? preempt_count_add+0xaf/0x170 [ 1243.661957] encrypted_key: insufficient parameters specified [ 1243.665136] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1243.665159] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1243.665169] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1243.665179] ? __alloc_pages_nodemask+0x1a6e/0x2720 [ 1243.692379] cache_grow_begin+0x91/0x700 [ 1243.696440] ? fs_reclaim_release+0xd0/0x110 [ 1243.700851] ? check_preemption_disabled+0x35/0x240 [ 1243.705877] cache_alloc_refill+0x273/0x350 [ 1243.710216] kmem_cache_alloc+0x333/0x3c0 [ 1243.714363] getname_kernel+0x4e/0x340 [ 1243.718244] kern_path+0x1b/0x40 [ 1243.721607] lookup_bdev+0xc6/0x1c0 [ 1243.725234] ? bd_acquire+0x440/0x440 [ 1243.729028] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1243.734512] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1243.739529] blkdev_get_by_path+0x1b/0xa0 [ 1243.743673] mount_bdev+0x4c/0x360 [ 1243.747209] ? xfs_parseargs+0x1130/0x1130 [ 1243.751472] mount_fs+0x92/0x2a0 [ 1243.754837] vfs_kern_mount.part.0+0x5b/0x470 [ 1243.759329] do_mount+0xe65/0x2a30 [ 1243.762867] ? __do_page_fault+0x159/0xad0 [ 1243.767094] ? retint_kernel+0x2d/0x2d [ 1243.770983] ? copy_mount_string+0x40/0x40 [ 1243.775225] ? memset+0x20/0x40 [ 1243.778501] ? copy_mount_options+0x1fa/0x2f0 [ 1243.782988] ? copy_mnt_ns+0xa30/0xa30 [ 1243.786872] SyS_mount+0xa8/0x120 [ 1243.790324] ? copy_mnt_ns+0xa30/0xa30 [ 1243.794207] do_syscall_64+0x1d5/0x640 [ 1243.798095] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1243.803282] RIP: 0033:0x7fe33b68e63a [ 1243.806982] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1243.814684] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1243.821950] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1243.829213] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1243.836475] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1243.843898] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1243.852164] XFS (loop5): invalid log iosize: 1 [not 12-30] [ 1243.881923] FAULT_INJECTION: forcing a failure. [ 1243.881923] name failslab, interval 1, probability 0, space 0, times 0 [ 1243.894570] CPU: 1 PID: 29064 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1243.902470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1243.911820] Call Trace: [ 1243.914411] dump_stack+0x1b2/0x281 [ 1243.918048] should_fail.cold+0x10a/0x149 [ 1243.922227] should_failslab+0xd6/0x130 [ 1243.926186] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1243.930834] ? dev_uevent_filter+0xd0/0xd0 [ 1243.935044] kobject_uevent_env+0x20c/0xf30 [ 1243.939345] loop_clr_fd+0x59f/0xc20 [ 1243.943040] lo_ioctl+0x895/0x1cd0 [ 1243.946560] ? kasan_slab_free+0x12d/0x1a0 [ 1243.950770] ? loop_set_status64+0xe0/0xe0 [ 1243.954981] blkdev_ioctl+0x540/0x1830 [ 1243.958844] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1243.964182] ? blkpg_ioctl+0x8d0/0x8d0 [ 1243.968045] ? trace_hardirqs_on+0x10/0x10 [ 1243.972255] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1243.977252] ? lock_acquire+0x170/0x3f0 [ 1243.981218] block_ioctl+0xd9/0x120 [ 1243.984824] ? blkdev_fallocate+0x3a0/0x3a0 [ 1243.989120] do_vfs_ioctl+0x75a/0xff0 [ 1243.992899] ? lock_acquire+0x170/0x3f0 [ 1243.996854] ? ioctl_preallocate+0x1a0/0x1a0 [ 1244.001239] ? __fget+0x265/0x3e0 [ 1244.004667] ? do_vfs_ioctl+0xff0/0xff0 [ 1244.008636] ? security_file_ioctl+0x83/0xb0 [ 1244.013020] SyS_ioctl+0x7f/0xb0 [ 1244.016362] ? do_vfs_ioctl+0xff0/0xff0 [ 1244.020336] do_syscall_64+0x1d5/0x640 [ 1244.024204] entry_SYSCALL_64_after_hwframe+0x46/0xbb 06:54:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 63) 06:54:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300), 0x0, r1) 06:54:41 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r0, 0x81204101, &(0x7f00000000c0)) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f0000000200)="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", 0x1000}) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_INFO(r0, 0x81204101, &(0x7f00000000c0)) (async) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, &(0x7f0000000000)={0x0, &(0x7f0000000200)="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", 0x1000}) (async) 06:54:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e508305494301a3c8ead1e40ee2969b79410ff4f27ee6cb197555e2a972856950953958e99f40c1d1bd47a2006cfa9354b549de149c4d6f6d518f93e13b0cccf17297611a30ee9058ba899ead145b66d91b5b1c0308ed4dad25b4629bf987ef4cec06a44efb42eca2253d65811ce77030d3d02f7e48d10fbac0bca8259bb91017af3bcaf099b7ffde8315e86652454ba2d2ffa40de218f618ce1453d1984f4d096ef80a1a19faa175269066202300ef11eb6927d70cbf25a38e60739dc1db2b5cede0b609c9e05753a08c3f312", 0xcd, r0) r2 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, &(0x7f00000004c0)=ANY=[@ANYBLOB="0300000000000000283626171a37969d42c9e8f8d5b9d6414e5e8e7f9862c2acc075e22c73010001000000000024aabe3688b02d7a96ac9fd174d0e7c2731222b94bc41b156433779ca5c199a5c10b0e73a66b1cb89a5e8614d7a949bdae3e34ac1d424e3a40fa0a90a903c2b8732b6eac68a3f741a7640918ef84845f389daea9a61b160018331429378bb3c39ee4e08ff78964516f4d2fc50f753db23c9ef469401daa7009cf92a31e57bafdb59d1c3e01ca00d0123ac285669fa073252b6402bf7eb936e6f68bf3f77c113709ce4a27bda9ff63c80f"], 0xd, r2) add_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)="398b8ff80d1e283842d04e1cb00aaf441b35f9745afff09fd8ede131b860e7e434e2bd28b76f7271b6b0f59f9ea14e76baeeac9dff1a3f48dfe113d8d0cae712ed749bf17bad2135bbac0fdea320434df9d2de7584c87c829b8b7f59350418e48504542ee8be288154f6888b98afe4cfdd7b8caa3a7769bbb8166ba963", 0x7d, r1) 06:54:41 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 54) [ 1244.029368] RIP: 0033:0x7f10c0393ec7 [ 1244.033053] RSP: 002b:00007f10bed08f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1244.040735] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393ec7 [ 1244.047994] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1244.055239] RBP: 00007f10bed096b8 R08: 00007f10bed09020 R09: 0000000020000200 [ 1244.062483] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 1244.069728] R13: 0000000000000016 R14: 00007f10bed08fe0 R15: 0000000020000500 06:54:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300)='(', 0x1, 0x0) 06:54:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r1 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e508305494301a3c8ead1e40ee2969b79410ff4f27ee6cb197555e2a972856950953958e99f40c1d1bd47a2006cfa9354b549de149c4d6f6d518f93e13b0cccf17297611a30ee9058ba899ead145b66d91b5b1c0308ed4dad25b4629bf987ef4cec06a44efb42eca2253d65811ce77030d3d02f7e48d10fbac0bca8259bb91017af3bcaf099b7ffde8315e86652454ba2d2ffa40de218f618ce1453d1984f4d096ef80a1a19faa175269066202300ef11eb6927d70cbf25a38e60739dc1db2b5cede0b609c9e05753a08c3f312", 0xcd, r0) r2 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, &(0x7f00000004c0)=ANY=[@ANYBLOB="0300000000000000283626171a37969d42c9e8f8d5b9d6414e5e8e7f9862c2acc075e22c73010001000000000024aabe3688b02d7a96ac9fd174d0e7c2731222b94bc41b156433779ca5c199a5c10b0e73a66b1cb89a5e8614d7a949bdae3e34ac1d424e3a40fa0a90a903c2b8732b6eac68a3f741a7640918ef84845f389daea9a61b160018331429378bb3c39ee4e08ff78964516f4d2fc50f753db23c9ef469401daa7009cf92a31e57bafdb59d1c3e01ca00d0123ac285669fa073252b6402bf7eb936e6f68bf3f77c113709ce4a27bda9ff63c80f"], 0xd, r2) (async, rerun: 32) add_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)="398b8ff80d1e283842d04e1cb00aaf441b35f9745afff09fd8ede131b860e7e434e2bd28b76f7271b6b0f59f9ea14e76baeeac9dff1a3f48dfe113d8d0cae712ed749bf17bad2135bbac0fdea320434df9d2de7584c87c829b8b7f59350418e48504542ee8be288154f6888b98afe4cfdd7b8caa3a7769bbb8166ba963", 0x7d, r1) (rerun: 32) 06:54:41 executing program 4: r0 = add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:41 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x7fffffff, @local, 0x101}]}, &(0x7f00000000c0)=0x10) syz_open_dev$sndpcmp(&(0x7f0000000200), 0x2, 0x10200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x7c, "2793f178d2a9b8b995394c013a15bbb3bfcada9d291adbbac9f21ced0067a5a4953cad17e09566b850809e2373aa832761d16ee976b136908189b61f6a5baca556d68383528db3e86b5473dc12bb9f73790db9a29d20dd3ea5e5eb5a47a78295d6f282a15794bb3f0166adf96e111bfab9a94fa765a1c325b62a8502"}, &(0x7f00000001c0)=0x84) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) [ 1244.155486] FAULT_INJECTION: forcing a failure. [ 1244.155486] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.192376] FAULT_INJECTION: forcing a failure. [ 1244.192376] name failslab, interval 1, probability 0, space 0, times 0 06:54:41 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x7fffffff, @local, 0x101}]}, &(0x7f00000000c0)=0x10) syz_open_dev$sndpcmp(&(0x7f0000000200), 0x2, 0x10200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x7c, "2793f178d2a9b8b995394c013a15bbb3bfcada9d291adbbac9f21ced0067a5a4953cad17e09566b850809e2373aa832761d16ee976b136908189b61f6a5baca556d68383528db3e86b5473dc12bb9f73790db9a29d20dd3ea5e5eb5a47a78295d6f282a15794bb3f0166adf96e111bfab9a94fa765a1c325b62a8502"}, &(0x7f00000001c0)=0x84) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 06:54:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) [ 1244.214289] CPU: 0 PID: 29120 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1244.222279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.231627] Call Trace: [ 1244.234211] dump_stack+0x1b2/0x281 [ 1244.237833] should_fail.cold+0x10a/0x149 [ 1244.242071] should_failslab+0xd6/0x130 [ 1244.246045] __kmalloc+0x2c1/0x400 [ 1244.249574] ? __list_lru_init+0x67/0x710 [ 1244.253709] __list_lru_init+0x67/0x710 [ 1244.257678] sget_userns+0x504/0xc10 [ 1244.261383] ? set_bdev_super+0x110/0x110 [ 1244.265522] ? ns_test_super+0x50/0x50 [ 1244.269393] ? set_bdev_super+0x110/0x110 [ 1244.273519] ? ns_test_super+0x50/0x50 [ 1244.277392] sget+0xd1/0x110 [ 1244.280399] mount_bdev+0xcd/0x360 [ 1244.283917] ? xfs_parseargs+0x1130/0x1130 [ 1244.288131] mount_fs+0x92/0x2a0 [ 1244.291480] vfs_kern_mount.part.0+0x5b/0x470 [ 1244.295956] do_mount+0xe65/0x2a30 [ 1244.299480] ? __do_page_fault+0x159/0xad0 [ 1244.303697] ? retint_kernel+0x2d/0x2d [ 1244.307564] ? copy_mount_string+0x40/0x40 [ 1244.311782] ? memset+0x20/0x40 [ 1244.315054] ? copy_mount_options+0x1fa/0x2f0 [ 1244.319534] ? copy_mnt_ns+0xa30/0xa30 [ 1244.323402] SyS_mount+0xa8/0x120 [ 1244.326839] ? copy_mnt_ns+0xa30/0xa30 [ 1244.330707] do_syscall_64+0x1d5/0x640 [ 1244.334579] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1244.339749] RIP: 0033:0x7f10c039563a [ 1244.343438] RSP: 002b:00007f10bed08f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1244.351129] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c039563a [ 1244.358377] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007f10bed08fe0 [ 1244.365624] RBP: 00007f10bed09020 R08: 00007f10bed09020 R09: 0000000020000200 [ 1244.372909] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1244.380165] R13: 0000000020000240 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1244.387428] CPU: 1 PID: 29122 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1244.395308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.404657] Call Trace: [ 1244.407281] dump_stack+0x1b2/0x281 [ 1244.410925] should_fail.cold+0x10a/0x149 [ 1244.415079] should_failslab+0xd6/0x130 [ 1244.419106] kmem_cache_alloc+0x28e/0x3c0 [ 1244.423260] getname_kernel+0x4e/0x340 [ 1244.427147] kern_path+0x1b/0x40 [ 1244.430513] lookup_bdev+0xc6/0x1c0 [ 1244.434156] ? bd_acquire+0x440/0x440 [ 1244.437954] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1244.443399] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1244.448415] blkdev_get_by_path+0x1b/0xa0 [ 1244.452569] mount_bdev+0x4c/0x360 [ 1244.456108] ? xfs_parseargs+0x1130/0x1130 [ 1244.460344] mount_fs+0x92/0x2a0 [ 1244.463711] vfs_kern_mount.part.0+0x5b/0x470 [ 1244.468203] do_mount+0xe65/0x2a30 [ 1244.471750] ? __do_page_fault+0x159/0xad0 [ 1244.475984] ? retint_kernel+0x2d/0x2d [ 1244.479879] ? copy_mount_string+0x40/0x40 [ 1244.484116] ? memset+0x20/0x40 [ 1244.487389] ? copy_mount_options+0x1fa/0x2f0 [ 1244.491882] ? copy_mnt_ns+0xa30/0xa30 [ 1244.495774] SyS_mount+0xa8/0x120 [ 1244.499222] ? copy_mnt_ns+0xa30/0xa30 [ 1244.503117] do_syscall_64+0x1d5/0x640 [ 1244.507008] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1244.512194] RIP: 0033:0x7fe33b68e63a [ 1244.515907] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1244.523612] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1244.530883] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1244.538236] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1244.545505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1244.552771] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 06:54:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@logbsize={'logbsize', 0x3d, [0x38]}}, {@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 64) 06:54:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:42 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) (async) r1 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="e508305494301a3c8ead1e40ee2969b79410ff4f27ee6cb197555e2a972856950953958e99f40c1d1bd47a2006cfa9354b549de149c4d6f6d518f93e13b0cccf17297611a30ee9058ba899ead145b66d91b5b1c0308ed4dad25b4629bf987ef4cec06a44efb42eca2253d65811ce77030d3d02f7e48d10fbac0bca8259bb91017af3bcaf099b7ffde8315e86652454ba2d2ffa40de218f618ce1453d1984f4d096ef80a1a19faa175269066202300ef11eb6927d70cbf25a38e60739dc1db2b5cede0b609c9e05753a08c3f312", 0xcd, r0) r2 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_provisioning(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, &(0x7f00000004c0)=ANY=[@ANYBLOB="0300000000000000283626171a37969d42c9e8f8d5b9d6414e5e8e7f9862c2acc075e22c73010001000000000024aabe3688b02d7a96ac9fd174d0e7c2731222b94bc41b156433779ca5c199a5c10b0e73a66b1cb89a5e8614d7a949bdae3e34ac1d424e3a40fa0a90a903c2b8732b6eac68a3f741a7640918ef84845f389daea9a61b160018331429378bb3c39ee4e08ff78964516f4d2fc50f753db23c9ef469401daa7009cf92a31e57bafdb59d1c3e01ca00d0123ac285669fa073252b6402bf7eb936e6f68bf3f77c113709ce4a27bda9ff63c80f"], 0xd, r2) (async) add_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)="398b8ff80d1e283842d04e1cb00aaf441b35f9745afff09fd8ede131b860e7e434e2bd28b76f7271b6b0f59f9ea14e76baeeac9dff1a3f48dfe113d8d0cae712ed749bf17bad2135bbac0fdea320434df9d2de7584c87c829b8b7f59350418e48504542ee8be288154f6888b98afe4cfdd7b8caa3a7769bbb8166ba963", 0x7d, r1) 06:54:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300)='(', 0x1, 0x0) 06:54:42 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) read$snddsp(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x7fffffff, @local, 0x101}]}, &(0x7f00000000c0)=0x10) syz_open_dev$sndpcmp(&(0x7f0000000200), 0x2, 0x10200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x7c, "2793f178d2a9b8b995394c013a15bbb3bfcada9d291adbbac9f21ced0067a5a4953cad17e09566b850809e2373aa832761d16ee976b136908189b61f6a5baca556d68383528db3e86b5473dc12bb9f73790db9a29d20dd3ea5e5eb5a47a78295d6f282a15794bb3f0166adf96e111bfab9a94fa765a1c325b62a8502"}, &(0x7f00000001c0)=0x84) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) syz_open_dev$sndpcmc(&(0x7f0000000080), 0x0, 0x0) (async) read$snddsp(r0, 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x7fffffff, @local, 0x101}]}, &(0x7f00000000c0)=0x10) (async) syz_open_dev$sndpcmp(&(0x7f0000000200), 0x2, 0x10200) (async) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x7c, "2793f178d2a9b8b995394c013a15bbb3bfcada9d291adbbac9f21ced0067a5a4953cad17e09566b850809e2373aa832761d16ee976b136908189b61f6a5baca556d68383528db3e86b5473dc12bb9f73790db9a29d20dd3ea5e5eb5a47a78295d6f282a15794bb3f0166adf96e111bfab9a94fa765a1c325b62a8502"}, &(0x7f00000001c0)=0x84) (async) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) (async) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000940)=0x9) (async) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) (async) 06:54:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)={[{@allocsize={'allocsize', 0x3d, [0x36, 0x0]}}]}) (fail_nth: 55) 06:54:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000300)='(', 0x1, 0x0) 06:54:42 executing program 1: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0xa8b}) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = geteuid() keyctl$get_persistent(0x16, r1, r0) 06:54:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) 06:54:42 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080), 0xd4, 0x0) read$snddsp(r0, 0x0, 0x0) [ 1244.683338] XFS (loop3): invalid logbufsize: 8 [not 16k,32k,64k,128k or 256k] 06:54:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0) [ 1244.726317] FAULT_INJECTION: forcing a failure. [ 1244.726317] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.750221] FAULT_INJECTION: forcing a failure. [ 1244.750221] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.755140] CPU: 0 PID: 29187 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1244.769311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.778662] Call Trace: [ 1244.781239] dump_stack+0x1b2/0x281 [ 1244.784867] should_fail.cold+0x10a/0x149 [ 1244.789016] should_failslab+0xd6/0x130 [ 1244.792991] __kmalloc+0x2c1/0x400 [ 1244.796526] ? register_shrinker+0x1ab/0x220 [ 1244.800933] register_shrinker+0x1ab/0x220 [ 1244.805168] sget_userns+0x9aa/0xc10 [ 1244.808879] ? set_bdev_super+0x110/0x110 [ 1244.813025] ? ns_test_super+0x50/0x50 [ 1244.816912] ? set_bdev_super+0x110/0x110 [ 1244.821065] ? ns_test_super+0x50/0x50 [ 1244.825032] sget+0xd1/0x110 [ 1244.828045] mount_bdev+0xcd/0x360 [ 1244.831579] ? xfs_parseargs+0x1130/0x1130 [ 1244.835809] mount_fs+0x92/0x2a0 [ 1244.839266] vfs_kern_mount.part.0+0x5b/0x470 [ 1244.843759] do_mount+0xe65/0x2a30 [ 1244.847298] ? __do_page_fault+0x159/0xad0 [ 1244.851529] ? retint_kernel+0x2d/0x2d [ 1244.855415] ? copy_mount_string+0x40/0x40 [ 1244.859643] ? memset+0x20/0x40 [ 1244.862911] ? copy_mount_options+0x1fa/0x2f0 [ 1244.867393] ? copy_mnt_ns+0xa30/0xa30 [ 1244.871270] SyS_mount+0xa8/0x120 [ 1244.874705] ? copy_mnt_ns+0xa30/0xa30 [ 1244.878579] do_syscall_64+0x1d5/0x640 [ 1244.882453] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1244.887624] RIP: 0033:0x7fe33b68e63a [ 1244.891313] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1244.898999] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1244.906265] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1244.913524] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1244.920776] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1244.928022] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1244.935295] CPU: 1 PID: 29168 Comm: syz-executor.3 Not tainted 4.14.284-syzkaller #0 [ 1244.943176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1244.952521] Call Trace: [ 1244.955108] dump_stack+0x1b2/0x281 [ 1244.958736] should_fail.cold+0x10a/0x149 [ 1244.960095] ------------[ cut here ]------------ [ 1244.962879] should_failslab+0xd6/0x130 [ 1244.962892] __kmalloc+0x2c1/0x400 [ 1244.967770] WARNING: CPU: 0 PID: 29187 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 1244.971715] ? kobject_get_path+0xb5/0x230 [ 1244.975222] Kernel panic - not syncing: panic_on_warn set ... [ 1244.975222] [ 1244.983086] kobject_get_path+0xb5/0x230 [ 1244.998670] kobject_uevent_env+0x230/0xf30 [ 1245.002977] loop_clr_fd+0x59f/0xc20 [ 1245.006676] lo_ioctl+0x895/0x1cd0 [ 1245.010198] ? kasan_slab_free+0x12d/0x1a0 [ 1245.014412] ? loop_set_status64+0xe0/0xe0 [ 1245.018627] blkdev_ioctl+0x540/0x1830 [ 1245.022496] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1245.027855] ? blkpg_ioctl+0x8d0/0x8d0 [ 1245.031723] ? trace_hardirqs_on+0x10/0x10 [ 1245.035958] ? debug_check_no_obj_freed+0x2c0/0x680 [ 1245.040953] ? lock_acquire+0x170/0x3f0 [ 1245.044906] block_ioctl+0xd9/0x120 [ 1245.048512] ? blkdev_fallocate+0x3a0/0x3a0 [ 1245.052816] do_vfs_ioctl+0x75a/0xff0 [ 1245.056614] ? lock_acquire+0x170/0x3f0 [ 1245.060571] ? ioctl_preallocate+0x1a0/0x1a0 [ 1245.064962] ? __fget+0x265/0x3e0 [ 1245.068396] ? do_vfs_ioctl+0xff0/0xff0 [ 1245.072347] ? security_file_ioctl+0x83/0xb0 [ 1245.076735] SyS_ioctl+0x7f/0xb0 [ 1245.080082] ? do_vfs_ioctl+0xff0/0xff0 [ 1245.084038] do_syscall_64+0x1d5/0x640 [ 1245.087908] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1245.093076] RIP: 0033:0x7f10c0393ec7 [ 1245.096764] RSP: 002b:00007f10bed08f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1245.104451] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007f10c0393ec7 [ 1245.111700] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1245.118948] RBP: 00007f10bed096b8 R08: 00007f10bed09020 R09: 0000000020000200 06:54:42 executing program 1: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0xa8b}) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x3}, 0xfffffffffffffffa) r1 = geteuid() keyctl$get_persistent(0x16, r1, r0) [ 1245.126198] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 1245.133446] R13: 0000000000000016 R14: 00007f10bed08fe0 R15: 0000000020000500 [ 1245.140707] CPU: 0 PID: 29187 Comm: syz-executor.5 Not tainted 4.14.284-syzkaller #0 [ 1245.148587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1245.157931] Call Trace: [ 1245.160513] dump_stack+0x1b2/0x281 [ 1245.164139] panic+0x1f9/0x42d [ 1245.167330] ? add_taint.cold+0x16/0x16 [ 1245.171304] ? kill_block_super+0xbe/0xe0 [ 1245.175446] ? __warn.cold+0x5/0x44 [ 1245.179074] ? kill_block_super+0xbe/0xe0 [ 1245.183218] __warn.cold+0x20/0x44 [ 1245.186754] ? ist_end_non_atomic+0x10/0x10 [ 1245.191071] ? kill_block_super+0xbe/0xe0 [ 1245.195216] report_bug+0x208/0x250 [ 1245.198839] do_error_trap+0x195/0x2d0 [ 1245.202724] ? math_error+0x2d0/0x2d0 [ 1245.206518] ? retint_kernel+0x2d/0x2d [ 1245.210404] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1245.215434] invalid_op+0x1b/0x40 [ 1245.218882] RIP: 0010:kill_block_super+0xbe/0xe0 [ 1245.223629] RSP: 0018:ffff88809823fbc8 EFLAGS: 00010246 [ 1245.228998] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900061d9000 [ 1245.236263] RDX: 0000000000040000 RSI: ffffffff818760ae RDI: ffff8880a68526f0 [ 1245.243523] RBP: ffff888085b98400 R08: ffffffff8b9ab440 R09: 0000000000000001 [ 1245.250782] R10: 0000000000000000 R11: ffff8880a26a2540 R12: ffff8880a6852240 [ 1245.258045] R13: ffffffff892471f0 R14: ffffffff88f45680 R15: dffffc0000000000 [ 1245.265324] ? kill_block_super+0xbe/0xe0 [ 1245.269479] ? kill_block_super+0xbe/0xe0 [ 1245.273623] deactivate_locked_super+0x6c/0xd0 [ 1245.278213] sget_userns+0x9c4/0xc10 [ 1245.282097] ? set_bdev_super+0x110/0x110 [ 1245.286238] ? ns_test_super+0x50/0x50 [ 1245.290122] ? set_bdev_super+0x110/0x110 [ 1245.294265] ? ns_test_super+0x50/0x50 [ 1245.298148] sget+0xd1/0x110 [ 1245.301161] mount_bdev+0xcd/0x360 [ 1245.304692] ? xfs_parseargs+0x1130/0x1130 [ 1245.308923] mount_fs+0x92/0x2a0 [ 1245.312280] vfs_kern_mount.part.0+0x5b/0x470 [ 1245.316755] do_mount+0xe65/0x2a30 [ 1245.320281] ? __do_page_fault+0x159/0xad0 [ 1245.324501] ? retint_kernel+0x2d/0x2d [ 1245.328374] ? copy_mount_string+0x40/0x40 [ 1245.332587] ? memset+0x20/0x40 [ 1245.335844] ? copy_mount_options+0x1fa/0x2f0 [ 1245.340314] ? copy_mnt_ns+0xa30/0xa30 [ 1245.344204] SyS_mount+0xa8/0x120 [ 1245.347636] ? copy_mnt_ns+0xa30/0xa30 [ 1245.351503] do_syscall_64+0x1d5/0x640 [ 1245.355416] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1245.360586] RIP: 0033:0x7fe33b68e63a [ 1245.364278] RSP: 002b:00007fe33a001f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1245.371962] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 00007fe33b68e63a [ 1245.379213] RDX: 0000000020000200 RSI: 0000000020000240 RDI: 00007fe33a001fe0 [ 1245.386459] RBP: 00007fe33a002020 R08: 00007fe33a002020 R09: 0000000020000200 [ 1245.393703] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200 [ 1245.400946] R13: 0000000020000240 R14: 00007fe33a001fe0 R15: 0000000020000500 [ 1245.408571] Kernel Offset: disabled [ 1245.412536] Rebooting in 86400 seconds..