1) 08:25:45 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 08:25:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:45 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:45 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r1, 0x40085112, &(0x7f0000000340)=@t={0x85, 0x8, 0x7f, 0x3, @generic=0x41e7}) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:45 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:45 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:45 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:45 executing program 1: ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0x8004510b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:45 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:45 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:45 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:45 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:45 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:45 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:46 executing program 3: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:46 executing program 3: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:46 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 1: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 3: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/partitions\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 2: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xfffffffffffffd4c) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 2: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:46 executing program 1: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, 0x0, 0x0) 08:25:47 executing program 2: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, 0x0, 0x0) 08:25:47 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 5: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/key-users\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x80c02) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000300), 0x420242) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000001c0)={r2, r1}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000280)={0x3, 0x36, 0x12, 0xe, 0x7, 0xffffffff, 0x6, 0x109}) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="67446698000000000100000003003ab8d792f94c547e209d37e11f2eac00007aec66080e01001db334a1bf4466df39dca052db2929641b6f19e89c75f21b450a9b0de439c30e4bd175a071fa687abb3f1d254cba87ce65712256a263f8a51285cc623eee25511304602b626e554c94154a68b8b3db531caf6fcbdadf749744fb70675ecfcc2edf777ae149eca6270af793feb999bffca6a47fc84d7b679804000000d25f3cea02b4934bf96f2dce140bc2c3120411da4a84c22f8fa97532a2000000000000e1a8847c77fb6dfa426f066f7a"], 0x86) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/schedstat\x00', 0x0, 0x0) 08:25:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, 0x0, 0x0) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x7fffffffffffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="24fd0c08640a788e616448b2b100ea6791af70a4b18bd17a9d65a444f4503bd8537d5a7d685f716daa0c312c6c841e1bf286167f51b96e88fec6230b74ac4f75b3291fc48492df7913863a7cca0d1299e6c1a46c2d7a724ee8971265d3d6a61ea1273b17b6774e4c9f14b63b5501e00c7f72e34a0010828bee8d0ea0", @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf250300000005000400ff002000050013007f000000"], 0x24}, 0x1, 0x0, 0x0, 0x15361be7f9d31c6}, 0x4040001) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SYNTH_ID(r4, 0xc08c5114, &(0x7f0000001740)={"3b8f96b4ee944eb8542cd032674a3668c543fdd1f43f510340757b3ad2fa", 0xffff41ba, 0x1, 0x401, 0x0, 0x9, 0x5, 0x62, 0x0, [0x5, 0x1, 0xffff, 0x8, 0x3f, 0x8, 0x7, 0x3, 0x2, 0x9c7, 0x15, 0x4, 0x5, 0x2, 0x3, 0xaa8, 0xef2f, 0x800, 0x5]}) 08:25:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="24fd0c08640a788e616448b2b100ea6791af70a4b18bd17a9d65a444f4503bd8537d5a7d685f716daa0c312c6c841e1bf286167f51b96e88fec6230b74ac4f75b3291fc48492df7913863a7cca0d1299e6c1a46c2d7a724ee8971265d3d6a61ea1273b17b6774e4c9f14b63b5501e00c7f72e34a0010828bee8d0ea0", @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf250300000005000400ff002000050013007f000000"], 0x24}, 0x1, 0x0, 0x0, 0x15361be7f9d31c6}, 0x4040001) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SYNTH_ID(r4, 0xc08c5114, &(0x7f0000001740)={"3b8f96b4ee944eb8542cd032674a3668c543fdd1f43f510340757b3ad2fa", 0xffff41ba, 0x1, 0x401, 0x0, 0x9, 0x5, 0x62, 0x0, [0x5, 0x1, 0xffff, 0x8, 0x3f, 0x8, 0x7, 0x3, 0x2, 0x9c7, 0x15, 0x4, 0x5, 0x2, 0x3, 0xaa8, 0xef2f, 0x800, 0x5]}) 08:25:47 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) ioctl$UFFDIO_WRITEPROTECT(r1, 0xc018aa06, &(0x7f00000000c0)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x3}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r2) dup(r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) 08:25:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="cd34275aa98b4dd2ad640382b02c2cc05758ea21d10d38f3dbee1022ff76591730213d7bbf2713e10475be68f7034f4c59380aa4", 0x34, 0x2}], 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:47 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="24fd0c08640a788e616448b2b100ea6791af70a4b18bd17a9d65a444f4503bd8537d5a7d685f716daa0c312c6c841e1bf286167f51b96e88fec6230b74ac4f75b3291fc48492df7913863a7cca0d1299e6c1a46c2d7a724ee8971265d3d6a61ea1273b17b6774e4c9f14b63b5501e00c7f72e34a0010828bee8d0ea0", @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf250300000005000400ff002000050013007f000000"], 0x24}, 0x1, 0x0, 0x0, 0x15361be7f9d31c6}, 0x4040001) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SYNTH_ID(r4, 0xc08c5114, &(0x7f0000001740)={"3b8f96b4ee944eb8542cd032674a3668c543fdd1f43f510340757b3ad2fa", 0xffff41ba, 0x1, 0x401, 0x0, 0x9, 0x5, 0x62, 0x0, [0x5, 0x1, 0xffff, 0x8, 0x3f, 0x8, 0x7, 0x3, 0x2, 0x9c7, 0x15, 0x4, 0x5, 0x2, 0x3, 0xaa8, 0xef2f, 0x800, 0x5]}) 08:25:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:48 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, 0x0, 0x0) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:48 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/stat\x00', 0x0, 0x0) ioctl$UFFDIO_WRITEPROTECT(r1, 0xc018aa06, &(0x7f00000000c0)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x3}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r2) dup(r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) 08:25:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:48 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="24fd0c08640a788e616448b2b100ea6791af70a4b18bd17a9d65a444f4503bd8537d5a7d685f716daa0c312c6c841e1bf286167f51b96e88fec6230b74ac4f75b3291fc48492df7913863a7cca0d1299e6c1a46c2d7a724ee8971265d3d6a61ea1273b17b6774e4c9f14b63b5501e00c7f72e34a0010828bee8d0ea0", @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf250300000005000400ff002000050013007f000000"], 0x24}, 0x1, 0x0, 0x0, 0x15361be7f9d31c6}, 0x4040001) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) 08:25:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:48 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r1) 08:25:48 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="24fd0c08640a788e616448b2b100ea6791af70a4b18bd17a9d65a444f4503bd8537d5a7d685f716daa0c312c6c841e1bf286167f51b96e88fec6230b74ac4f75b3291fc48492df7913863a7cca0d1299e6c1a46c2d7a724ee8971265d3d6a61ea1273b17b6774e4c9f14b63b5501e00c7f72e34a0010828bee8d0ea0", @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf250300000005000400ff002000050013007f000000"], 0x24}, 0x1, 0x0, 0x0, 0x15361be7f9d31c6}, 0x4040001) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) 08:25:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4092, 0xffc) 08:25:49 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, 0x0, 0x0) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:49 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="24fd0c08640a788e616448b2b100ea6791af70a4b18bd17a9d65a444f4503bd8537d5a7d685f716daa0c312c6c841e1bf286167f51b96e88fec6230b74ac4f75b3291fc48492df7913863a7cca0d1299e6c1a46c2d7a724ee8971265d3d6a61ea1273b17b6774e4c9f14b63b5501e00c7f72e34a0010828bee8d0ea0", @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf250300000005000400ff002000050013007f000000"], 0x24}, 0x1, 0x0, 0x0, 0x15361be7f9d31c6}, 0x4040001) 08:25:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:49 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r1) 08:25:49 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x4002, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:49 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/consoles\x00', 0x0, 0x0) 08:25:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(0xffffffffffffffff, &(0x7f0000001740)=""/4092, 0xffc) 08:25:49 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) [ 920.297338] XFS (loop3): unknown mount option [euid=00000000000000000000]. 08:25:50 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) 08:25:50 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}, {@attr2}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:50 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4093, 0xffd) read$sequencer(r0, 0x0, 0x0) 08:25:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:50 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r1) 08:25:50 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) 08:25:50 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) 08:25:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:50 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) [ 921.066987] XFS (loop3): unknown mount option [euid=00000000000000000000]. 08:25:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:50 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:50 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) [ 921.238429] XFS (loop3): unknown mount option [euid=00000000000000000000]. 08:25:51 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r5, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) 08:25:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) 08:25:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:51 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) 08:25:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:51 executing program 5: socket$kcm(0x29, 0x5, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) [ 922.152740] XFS (loop3): unknown mount option [logbsize=]. 08:25:52 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:52 executing program 5: socket$kcm(0x29, 0x5, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:52 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000040)={@none, 0x7, 0x9, 0x6000, 0xdfb8, 0x100, "c7b54c590ca3cf5bdb00dc189632765a094d4ff4d036357beca968df9322841975bb87fc0c013cd6f5aacf43cedd8b7e46ba92933533f60e4c10ba2859d8897e5f756376b6ee9feffef064c40bc6d87458158098cf2e2117c979da39e6b23f6879e2a429187b6b0dae2a9eb1411b990bff4a13a85d01f6f7df8616ec7ec8dbc1"}) 08:25:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:52 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:52 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:52 executing program 5: socket$kcm(0x29, 0x5, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:52 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) 08:25:52 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:52 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) [ 922.815798] XFS (loop2): unknown mount option [euid=00000000000000000000]. [ 922.835763] XFS (loop3): unknown mount option [logbsize=]. [ 922.913458] XFS (loop3): unknown mount option [logbsize=]. 08:25:52 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:52 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:52 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) 08:25:52 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:52 executing program 1: memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:53 executing program 1: memfd_create(0x0, 0x2) 08:25:53 executing program 1: memfd_create(0x0, 0x2) 08:25:53 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="fa61f265af8394fe7b539e0342c33ac40d3ebeedaa547e91e4a5ab101126cdc1197a05f6d0156c1cd3527e515204e54c1500"/74, @ANYRES16=0x0, @ANYBLOB="000026bd7000fbdbdf250000000008000700", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800080000000000080008000100000008000400ac1414aa"], 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) [ 923.705829] XFS (loop2): unknown mount option [euid=00000000000000000000]. 08:25:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:53 executing program 1: memfd_create(0x0, 0x2) [ 923.749170] XFS (loop3): unknown mount option [logbsize=]. [ 923.800014] XFS (loop2): unknown mount option [euid=00000000000000000000]. 08:25:53 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:53 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00./file0\x00\x00\x00\x00\x00\x00']) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:53 executing program 1: memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x0) 08:25:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:53 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:53 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:53 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 924.559039] XFS (loop3): unknown mount option [logbsize=]. 08:25:53 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:53 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:53 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:53 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x452002, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:53 executing program 5: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:54 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 924.647904] XFS (loop3): unknown mount option [logbsize=]. [ 924.666422] XFS (loop2): unknown mount option [logbsize=]. 08:25:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}]}) 08:25:54 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:54 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/mdstat\x00', 0x0, 0x0) memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:54 executing program 5: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:54 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}, {@hash}]}) 08:25:54 executing program 4: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r1 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:54 executing program 5: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:54 executing program 4: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:54 executing program 0: memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x2) 08:25:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}]}) 08:25:54 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) [ 925.496596] XFS (loop2): unknown mount option [logbsize=]. 08:25:55 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) write$nbd(r4, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:55 executing program 4: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:55 executing program 0: memfd_create(0x0, 0x2) 08:25:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:55 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}]}) 08:25:55 executing program 0: memfd_create(0x0, 0x2) 08:25:55 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:55 executing program 4: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:55 executing program 0: memfd_create(0x0, 0x2) [ 926.363585] XFS (loop2): unknown mount option [logbsize=]. 08:25:55 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) [ 926.470123] XFS (loop2): unknown mount option [logbsize=]. 08:25:56 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 4: socket$kcm(0x29, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 0: memfd_create(&(0x7f00000005c0)='M\x9e\xea\xb8\xa8\n{pg\x8a\xba\xff\xee\x8a\x9c%\x9b\xd0\x96\xaa\xd6\xeb\xb3Z?A\xcf\x91\xf0\xf4v\xbb;I\x98\xdd\xd1\xe4\x87\xf4\xde\xf0\xcf\xa4\x05\f\xb5\xe0\x04\x1c\x1e\xc17\x1dQ\x04ugE\xc8p{\xdc\xf0\xaf\xbb\xed\xb6\xe44u\xe1\xfc\xa0K\x8e\xfd\\`\xef\xf6\x05\xfa\xb2\x82\xb3\xbd\xed\xb7\xe3\xfe\xdf\xcf\x81!Y\xc5hFF\x02\xcf;\'\x0f\xe4[\r\x1co\xb1]\x9b{\x19I\xcf\xe0y83.X\xcaR\xe7\xfc~\x15\xd8&\x9ab~\xbdT\x15_\x1b\f\x19\xf1\xab9\xb9\xcd\xde?\xf8\xcag\v\x06?\xc8\xec\xb04\x14\xd7\xcek\x8c\xd0\x03\xbd\xe0\x11 \x9e\xf9%\xb4\xa5o\xf9\xd4\xb4\f\xaf/\a4a\x1f[o\xe0\xd1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc1Hf\xda?\xe4\xb3`\x8b\x8fn\x05\x14D\n\xfa=\x10+ Q\x82\x91*\xa6&\xbc\xd7\xbf\x0f\x90\x14\xec\xb7\\\x8f\xa4\xed\xd8\xf1\x95,\xe6/B_\x9cGO\x03\xcb,\x80\x19F\x97\x89\x81w\x8d\x16/\xae\xdcm2\xba&\t\xd3\x9b\x92\x92', 0x0) 08:25:56 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:56 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:56 executing program 0: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, 0x0, 0x4010) [ 927.278413] XFS (loop2): unknown mount option [logbsize=]. 08:25:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:56 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:56 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, 0x0, 0x4010) 08:25:56 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 927.416173] XFS (loop2): unknown mount option [logbsize=]. [ 927.432229] XFS (loop0): unknown mount option [logbsize=]. 08:25:56 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}]}) 08:25:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:56 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, 0x0, 0x4010) 08:25:56 executing program 1: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r1 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}, {@hash}]}) 08:25:56 executing program 1: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 927.582347] XFS (loop0): unknown mount option [logbsize=]. 08:25:56 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:56 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:56 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:56 executing program 1: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}], [{@euid_eq}]}) 08:25:57 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:57 executing program 1: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 927.736488] XFS (loop0): unknown mount option [logbsize=]. 08:25:57 executing program 0: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}}, 0x4010) 08:25:57 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}]}) 08:25:57 executing program 1: socket$kcm(0x29, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x50}}, 0x0) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 0: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70]}}]}) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 5: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 0: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x4010) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:25:57 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:57 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:57 executing program 5: write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:58 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 5: write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:58 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 5: write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r2 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 2: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r1 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 928.988264] XFS (loop4): unknown mount option [logbsize=]. 08:25:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x0]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 2: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, 0x0, 0x0) [ 929.116003] XFS (loop4): unknown mount option [logbsize=]. 08:25:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 2: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:25:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:25:58 executing program 3: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0xfdef3f59db083c8d, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4008081) r1 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000080), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 2: socket$kcm(0x29, 0x5, 0x0) socketpair(0x22, 0x1, 0x260, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize={'logbsize', 0x3d, [0x70, 0x39]}}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000001c0)={r3}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r6, 0x800448d3, &(0x7f0000000240)={@none, 0xffffffff, 0xcce4, 0x85d9, 0x1, 0xe65, "a960f10a5466868a8bb4194c0f8351088c2159b7f4d620df15f7832b5979ed24d58fcdd82a205952168eff78e44f6e156dddd0ee5fd671c67b431a09fbf3f99355b8e8c73757cd9c6dd5418f6292d76af01207dff78d376aa5257c26e2b1514c9d5ddcae6ce76556e7592555482ee8fdc310ef3aea91a8e1aef0efd22b59c8e2"}) ioctl$RTC_ALM_READ(r5, 0x80247008, &(0x7f0000000200)) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000080)=0x3, 0x4) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, 0x1411, 0x8, 0x70bd29, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x10040000) 08:25:58 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) [ 929.330140] XFS (loop4): unknown mount option [logbsize=]. 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (fail_nth: 1) 08:25:58 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:58 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (fail_nth: 1) 08:25:58 executing program 2: socket$kcm(0x29, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x3, 0x0, 0x2, "b6c006d5eb671de45db0d33df7aab1d6c304567fb8e1caea1e2e4505f13d0163d1d1ee1bd7fc11a852361a9571fe340a60ded1477ad6d188d48712590b89c2968b7ec628b22819479057d2efc3b0b6f566866dc137d8744cdfc9589c2dae94076d753fb9e858fa937e20e5e4ab2633e3ea06cdb5db16df846e34a1f823bc3d811e3f168333884020a2f09baa7c547380b1fc7148e0fe18d64abc410150772d57d4279e3405595eac"}, 0xb8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) 08:25:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 929.470130] FAULT_INJECTION: forcing a failure. [ 929.470130] name failslab, interval 1, probability 0, space 0, times 0 [ 929.508131] CPU: 1 PID: 18278 Comm: syz-executor.5 Not tainted 4.14.277-syzkaller #0 [ 929.516039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.525390] Call Trace: [ 929.527972] dump_stack+0x1b2/0x281 [ 929.531584] should_fail.cold+0x10a/0x149 [ 929.535715] should_failslab+0xd6/0x130 [ 929.539781] kmem_cache_alloc_node+0x263/0x410 [ 929.544355] __alloc_skb+0x5c/0x510 [ 929.547975] alloc_skb_with_frags+0x85/0x500 [ 929.552371] sock_alloc_send_pskb+0x577/0x6d0 [ 929.556852] ? sock_kzfree_s+0x50/0x50 [ 929.560719] ? wait_for_unix_gc+0xc0/0x160 [ 929.564940] ? unix_gc+0x1040/0x1040 [ 929.568651] ? security_socket_getpeersec_dgram+0x80/0xb0 [ 929.574176] unix_stream_sendmsg+0x502/0x820 [ 929.578569] ? maybe_add_creds+0x2d0/0x2d0 [ 929.582787] ? _kstrtoull+0x1f2/0x450 [ 929.586569] ? aa_file_perm+0x2dd/0xab0 [ 929.590523] ? lock_acquire+0x170/0x3f0 [ 929.594476] ? security_socket_sendmsg+0x83/0xb0 [ 929.599212] ? maybe_add_creds+0x2d0/0x2d0 [ 929.603429] sock_sendmsg+0xb5/0x100 [ 929.607125] sock_write_iter+0x22c/0x370 [ 929.611176] ? sock_sendmsg+0x100/0x100 [ 929.615141] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 929.620049] ? iov_iter_init+0xa6/0x1c0 [ 929.624005] __vfs_write+0x44c/0x630 [ 929.627710] ? kernel_read+0x110/0x110 [ 929.631581] ? rw_verify_area+0xe1/0x2a0 [ 929.635620] vfs_write+0x17f/0x4d0 [ 929.639138] SyS_write+0xf2/0x210 [ 929.642570] ? SyS_read+0x210/0x210 [ 929.646178] ? __do_page_fault+0x159/0xad0 [ 929.650396] ? do_syscall_64+0x4c/0x640 [ 929.654347] ? SyS_read+0x210/0x210 [ 929.657955] do_syscall_64+0x1d5/0x640 [ 929.661836] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 929.667126] RIP: 0033:0x7fd74b29f0e9 08:25:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x3, 0x0, 0x2, "b6c006d5eb671de45db0d33df7aab1d6c304567fb8e1caea1e2e4505f13d0163d1d1ee1bd7fc11a852361a9571fe340a60ded1477ad6d188d48712590b89c2968b7ec628b22819479057d2efc3b0b6f566866dc137d8744cdfc9589c2dae94076d753fb9e858fa937e20e5e4ab2633e3ea06cdb5db16df846e34a1f823bc3d811e3f168333884020a2f09baa7c547380b1fc7148e0fe18d64abc410150772d57d4279e3405595eac"}, 0xb8) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) 08:25:59 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:25:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (fail_nth: 2) [ 929.670820] RSP: 002b:00007fd749c14168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 929.678511] RAX: ffffffffffffffda RBX: 00007fd74b3b1f60 RCX: 00007fd74b29f0e9 [ 929.685763] RDX: 0000000000000010 RSI: 0000000020000100 RDI: 0000000000000004 [ 929.693019] RBP: 00007fd749c141d0 R08: 0000000000000000 R09: 0000000000000000 [ 929.700269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 929.707519] R13: 00007ffed29b937f R14: 00007fd749c14300 R15: 0000000000022000 08:25:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:59 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (fail_nth: 1) 08:25:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) [ 929.869963] FAULT_INJECTION: forcing a failure. [ 929.869963] name failslab, interval 1, probability 0, space 0, times 0 [ 929.885796] CPU: 1 PID: 18300 Comm: syz-executor.5 Not tainted 4.14.277-syzkaller #0 [ 929.893695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.903045] Call Trace: [ 929.905640] dump_stack+0x1b2/0x281 [ 929.909270] should_fail.cold+0x10a/0x149 [ 929.913444] should_failslab+0xd6/0x130 [ 929.917422] kmem_cache_alloc_node_trace+0x25a/0x400 [ 929.922534] __kmalloc_node_track_caller+0x38/0x70 [ 929.927465] __alloc_skb+0x96/0x510 [ 929.931096] alloc_skb_with_frags+0x85/0x500 [ 929.935513] sock_alloc_send_pskb+0x577/0x6d0 [ 929.940027] ? sock_kzfree_s+0x50/0x50 [ 929.943913] ? wait_for_unix_gc+0xc0/0x160 [ 929.948155] ? unix_gc+0x1040/0x1040 [ 929.951870] ? security_socket_getpeersec_dgram+0x80/0xb0 [ 929.957406] unix_stream_sendmsg+0x502/0x820 [ 929.961817] ? maybe_add_creds+0x2d0/0x2d0 [ 929.966052] ? _kstrtoull+0x1f2/0x450 [ 929.969851] ? aa_file_perm+0x2dd/0xab0 [ 929.973829] ? lock_acquire+0x170/0x3f0 [ 929.977800] ? security_socket_sendmsg+0x83/0xb0 [ 929.982558] ? maybe_add_creds+0x2d0/0x2d0 [ 929.986792] sock_sendmsg+0xb5/0x100 [ 929.990509] sock_write_iter+0x22c/0x370 [ 929.994564] ? sock_sendmsg+0x100/0x100 [ 929.998540] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 930.003464] ? iov_iter_init+0xa6/0x1c0 [ 930.007442] __vfs_write+0x44c/0x630 [ 930.011159] ? kernel_read+0x110/0x110 [ 930.015059] ? rw_verify_area+0xe1/0x2a0 [ 930.019124] vfs_write+0x17f/0x4d0 [ 930.022673] SyS_write+0xf2/0x210 [ 930.026131] ? SyS_read+0x210/0x210 [ 930.029754] ? __do_page_fault+0x159/0xad0 [ 930.033990] ? do_syscall_64+0x4c/0x640 [ 930.037965] ? SyS_read+0x210/0x210 [ 930.041592] do_syscall_64+0x1d5/0x640 [ 930.045492] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 930.050674] RIP: 0033:0x7fd74b29f0e9 [ 930.054377] RSP: 002b:00007fd749c14168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 930.062081] RAX: ffffffffffffffda RBX: 00007fd74b3b1f60 RCX: 00007fd74b29f0e9 08:25:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x3, 0x0, 0x2, "b6c006d5eb671de45db0d33df7aab1d6c304567fb8e1caea1e2e4505f13d0163d1d1ee1bd7fc11a852361a9571fe340a60ded1477ad6d188d48712590b89c2968b7ec628b22819479057d2efc3b0b6f566866dc137d8744cdfc9589c2dae94076d753fb9e858fa937e20e5e4ab2633e3ea06cdb5db16df846e34a1f823bc3d811e3f168333884020a2f09baa7c547380b1fc7148e0fe18d64abc410150772d57d4279e3405595eac"}, 0xb8) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) 08:25:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (fail_nth: 3) [ 930.069346] RDX: 0000000000000010 RSI: 0000000020000100 RDI: 0000000000000004 [ 930.076609] RBP: 00007fd749c141d0 R08: 0000000000000000 R09: 0000000000000000 [ 930.083862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 930.091113] R13: 00007ffed29b937f R14: 00007fd749c14300 R15: 0000000000022000 08:25:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "d0a018a16095f6c61edafeae7f9090720028c8001000000000000043009acf3ce469214ac9ca5a7a8876a7d144e6c6aca8d4c07f93d156ffcd0275cb4327be8ebd7ffd2748fb89ffa0905c1827eed1"}, 0x5f) 08:25:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0x3, 0x1, 0xa, 0x2}, 0x1, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) [ 930.184555] FAULT_INJECTION: forcing a failure. [ 930.184555] name failslab, interval 1, probability 0, space 0, times 0 [ 930.206503] CPU: 0 PID: 18326 Comm: syz-executor.3 Not tainted 4.14.277-syzkaller #0 [ 930.214577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.223919] Call Trace: [ 930.226509] dump_stack+0x1b2/0x281 [ 930.230144] should_fail.cold+0x10a/0x149 [ 930.234294] should_failslab+0xd6/0x130 [ 930.238268] kmem_cache_alloc_node+0x263/0x410 [ 930.242846] __alloc_skb+0x5c/0x510 [ 930.246471] alloc_skb_with_frags+0x85/0x500 [ 930.250985] sock_alloc_send_pskb+0x577/0x6d0 [ 930.255484] ? sock_kzfree_s+0x50/0x50 [ 930.259369] ? wait_for_unix_gc+0xc0/0x160 [ 930.263597] ? unix_gc+0x1040/0x1040 [ 930.267362] ? security_socket_getpeersec_dgram+0x80/0xb0 [ 930.272899] unix_stream_sendmsg+0x502/0x820 [ 930.277312] ? maybe_add_creds+0x2d0/0x2d0 [ 930.281539] ? _kstrtoull+0x1f2/0x450 [ 930.285324] ? aa_file_perm+0x2dd/0xab0 [ 930.289275] ? lock_acquire+0x170/0x3f0 [ 930.293225] ? security_socket_sendmsg+0x83/0xb0 [ 930.297959] ? maybe_add_creds+0x2d0/0x2d0 [ 930.302184] sock_sendmsg+0xb5/0x100 [ 930.305890] sock_write_iter+0x22c/0x370 [ 930.309928] ? sock_sendmsg+0x100/0x100 [ 930.313883] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 930.318800] ? iov_iter_init+0xa6/0x1c0 [ 930.322760] __vfs_write+0x44c/0x630 [ 930.326455] ? kernel_read+0x110/0x110 [ 930.330324] ? rw_verify_area+0xe1/0x2a0 [ 930.334450] vfs_write+0x17f/0x4d0 [ 930.337975] SyS_write+0xf2/0x210 [ 930.341403] ? SyS_read+0x210/0x210 [ 930.345009] ? __do_page_fault+0x159/0xad0 [ 930.349226] ? do_syscall_64+0x4c/0x640 [ 930.353182] ? SyS_read+0x210/0x210 [ 930.356787] do_syscall_64+0x1d5/0x640 [ 930.360658] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 930.365825] RIP: 0033:0x7f2b687260e9 [ 930.369513] RSP: 002b:00007f2b6709b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 930.377195] RAX: ffffffffffffffda RBX: 00007f2b68838f60 RCX: 00007f2b687260e9 [ 930.384445] RDX: 0000000000000010 RSI: 0000000020000100 RDI: 0000000000000004 [ 930.391692] RBP: 00007f2b6709b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 930.398937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 930.406186] R13: 00007ffc2e4b698f R14: 00007f2b6709b300 R15: 0000000000022000 08:25:59 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0x3, 0x1, 0xa, 0x2}, 0x1, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) 08:25:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "d0a018a16095f6c61edafeae7f9090720028c8001000000000000043009acf3ce469214ac9ca5a7a8876a7d144e6c6aca8d4c07f93d156ffcd0275cb4327be8ebd7ffd2748fb89ffa0905c1827eed1"}, 0x5f) 08:25:59 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:25:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (fail_nth: 2) 08:25:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:25:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0x3, 0x1, 0xa, 0x2}, 0x1, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18}, './file0/file0\x00'}) (async) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0x3, 0x1, 0xa, 0x2}, 0x1, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r1, 0x0, 0x0) (async) 08:25:59 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socket$inet_udp(0x2, 0x2, 0x0) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "d0a018a16095f6c61edafeae7f9090720028c8001000000000000043009acf3ce469214ac9ca5a7a8876a7d144e6c6aca8d4c07f93d156ffcd0275cb4327be8ebd7ffd2748fb89ffa0905c1827eed1"}, 0x5f) [ 930.579508] FAULT_INJECTION: forcing a failure. [ 930.579508] name failslab, interval 1, probability 0, space 0, times 0 08:25:59 executing program 1: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfef}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xd0}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x800}, @SEG6_ATTR_SECRET={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r2) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r3, 0x800, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) 08:25:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:25:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) [ 930.620503] CPU: 0 PID: 18358 Comm: syz-executor.3 Not tainted 4.14.277-syzkaller #0 [ 930.628404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.637844] Call Trace: [ 930.640428] dump_stack+0x1b2/0x281 [ 930.644053] should_fail.cold+0x10a/0x149 [ 930.648202] should_failslab+0xd6/0x130 [ 930.652182] kmem_cache_alloc_node_trace+0x25a/0x400 [ 930.657293] __kmalloc_node_track_caller+0x38/0x70 [ 930.662307] __alloc_skb+0x96/0x510 [ 930.665956] alloc_skb_with_frags+0x85/0x500 [ 930.670369] sock_alloc_send_pskb+0x577/0x6d0 [ 930.674956] ? sock_kzfree_s+0x50/0x50 [ 930.679031] ? wait_for_unix_gc+0xc0/0x160 [ 930.683262] ? unix_gc+0x1040/0x1040 [ 930.686986] ? security_socket_getpeersec_dgram+0x80/0xb0 [ 930.692522] unix_stream_sendmsg+0x502/0x820 [ 930.696946] ? maybe_add_creds+0x2d0/0x2d0 [ 930.701200] ? _kstrtoull+0x1f2/0x450 [ 930.705008] ? aa_file_perm+0x2dd/0xab0 [ 930.708988] ? lock_acquire+0x170/0x3f0 [ 930.712959] ? security_socket_sendmsg+0x83/0xb0 [ 930.717742] ? maybe_add_creds+0x2d0/0x2d0 [ 930.721991] sock_sendmsg+0xb5/0x100 [ 930.725708] sock_write_iter+0x22c/0x370 [ 930.729772] ? sock_sendmsg+0x100/0x100 [ 930.733759] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 930.738691] ? iov_iter_init+0xa6/0x1c0 [ 930.742672] __vfs_write+0x44c/0x630 [ 930.746142] XFS (loop0): unknown mount option [euid=00000000000000000000]. [ 930.746469] ? kernel_read+0x110/0x110 [ 930.757444] ? rw_verify_area+0xe1/0x2a0 [ 930.761510] vfs_write+0x17f/0x4d0 [ 930.765060] SyS_write+0xf2/0x210 [ 930.768512] ? SyS_read+0x210/0x210 [ 930.772139] ? __do_page_fault+0x159/0xad0 [ 930.776380] ? do_syscall_64+0x4c/0x640 [ 930.780439] ? SyS_read+0x210/0x210 [ 930.784511] do_syscall_64+0x1d5/0x640 [ 930.788411] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 930.793603] RIP: 0033:0x7f2b687260e9 [ 930.797312] RSP: 002b:00007f2b6709b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 930.805024] RAX: ffffffffffffffda RBX: 00007f2b68838f60 RCX: 00007f2b687260e9 [ 930.812289] RDX: 0000000000000010 RSI: 0000000020000100 RDI: 0000000000000004 [ 930.819560] RBP: 00007f2b6709b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 930.826830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 930.834099] R13: 00007ffc2e4b698f R14: 00007f2b6709b300 R15: 0000000000022000 08:26:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:00 executing program 1: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfef}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xd0}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x800}, @SEG6_ATTR_SECRET={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) write$nbd(r1, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r2) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r3, 0x800, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) 08:26:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (fail_nth: 3) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:00 executing program 1: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfef}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xd0}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x800}, @SEG6_ATTR_SECRET={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r2) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x14, r3, 0x800, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) 08:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:26:00 executing program 3: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:00 executing program 1: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) write$nbd(r1, 0x0, 0x0) [ 931.017285] XFS (loop0): unknown mount option [euid=00000000000000000000]. 08:26:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 3: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) 08:26:00 executing program 1: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) write$nbd(r1, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) (async) write$nbd(r1, 0x0, 0x0) (async) 08:26:00 executing program 3: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="674466780000fb7370a4000000000000fd9b480d0300000000000000ed849f4f051bbd8616365e4c5684a3bd4267739528d0b59fbb633d7a33cdbb2f19edbb99475f2cab48de137d28889e6d82369e943ed9619ceecef48f55e2229ae4"], 0x10) 08:26:00 executing program 1: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) write$nbd(r1, 0x0, 0x0) 08:26:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) dup(r3) [ 931.157844] XFS (loop0): unknown mount option [euid=00000000000000000000]. 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x0, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:26:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="674466780000fb7370a4000000000000fd9b480d0300000000000000ed849f4f051bbd8616365e4c5684a3bd4267739528d0b59fbb633d7a33cdbb2f19edbb99475f2cab48de137d28889e6d82369e943ed9619ceecef48f55e2229ae4"], 0x10) 08:26:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) dup(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) dup(r0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) (async) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) (async) dup(r3) (async) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="674466780000fb7370a4000000000000fd9b480d0300000000000000ed849f4f051bbd8616365e4c5684a3bd4267739528d0b59fbb633d7a33cdbb2f19edbb99475f2cab48de137d28889e6d82369e943ed9619ceecef48f55e2229ae4"], 0x10) 08:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) dup(r3) [ 931.330894] XFS (loop0): unknown mount option [logbsize=]. 08:26:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) dup(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) dup(r0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) (async) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) (async) dup(r3) (async) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x10240) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000080), 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, 0x1403, 0x10, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_vlan\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004040) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x1000}) 08:26:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) (async, rerun: 32) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) 08:26:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}]}) 08:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x10240) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000080), 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, 0x1403, 0x10, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_vlan\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004040) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x1000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x10240) (async) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000080), 0x4) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, 0x1403, 0x10, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_vlan\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004040) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x1000}) (async) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) dup(r3) 08:26:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x8, &(0x7f0000000140)=[{}, {}, {@fixed}, {}, {}, {@none}, {@none}, {}]}) 08:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:26:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) (async) [ 931.478536] XFS (loop0): unknown mount option [logbsize=]. 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x10240) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000080), 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, 0x1403, 0x10, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_vlan\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004040) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x1000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x10240) (async) setsockopt$WPAN_SECURITY_LEVEL(r1, 0x0, 0x2, &(0x7f0000000080), 0x4) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, 0x1403, 0x10, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gre0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_vlan\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004040) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ip_vti0\x00', 0x1000}) (async) 08:26:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}]}) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) dup(r3) 08:26:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x8, &(0x7f0000000140)=[{}, {}, {@fixed}, {}, {}, {@none}, {@none}, {}]}) 08:26:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={@any, 0x1}) write$nbd(r0, 0x0, 0x0) 08:26:00 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) 08:26:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:26:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async, rerun: 64) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (rerun: 64) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x8, &(0x7f0000000140)=[{}, {}, {@fixed}, {}, {}, {@none}, {@none}, {}]}) 08:26:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}]}) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={@any, 0x1}) write$nbd(r0, 0x0, 0x0) [ 931.645593] XFS (loop0): unknown mount option [logbsize=]. 08:26:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) (async, rerun: 32) write$nbd(r0, &(0x7f0000000100), 0x10) (rerun: 32) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) 08:26:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan4\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x2, 0x0, 0x2, "91bbae3b62a4fb16c77d303cde3ccd02c3de4a9e2bc8d9ef85bc409c392afc3e4c546607133a7a6a57bd227803"}, 0x3d) 08:26:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={@any, 0x1}) write$nbd(r0, 0x0, 0x0) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) 08:26:01 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan4\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x2, 0x0, 0x2, "91bbae3b62a4fb16c77d303cde3ccd02c3de4a9e2bc8d9ef85bc409c392afc3e4c546607133a7a6a57bd227803"}, 0x3d) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(0xffffffffffffffff, 0x0, 0xffe4) 08:26:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) [ 931.836971] XFS (loop0): unknown mount option [logbsize=]. 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r6 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r7, 0x80045104, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x3, 0x5, 0x5, 0x1480, r1, 0x9, '\x00', r5, r6, 0x2, 0x3, 0x5}, 0x48) 08:26:01 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) clock_settime(0x1, &(0x7f0000000040)={0x0, 0x3938700}) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(0xffffffffffffffff, 0x0, 0xffe4) 08:26:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan4\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x2, 0x0, 0x2, "91bbae3b62a4fb16c77d303cde3ccd02c3de4a9e2bc8d9ef85bc409c392afc3e4c546607133a7a6a57bd227803"}, 0x3d) 08:26:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r5, 0x80045104, &(0x7f0000000380)) 08:26:01 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) clock_settime(0x1, &(0x7f0000000040)={0x0, 0x3938700}) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0]) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) write$nbd(r1, &(0x7f0000000100), 0x10) [ 931.995200] XFS (loop0): unknown mount option [logbsize=]. 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(0xffffffffffffffff, 0x0, 0xffe4) 08:26:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0xffffc, 0x3, 0xfff7, 0x4}, 0x10) 08:26:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 08:26:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0xffffc, 0x3, 0xfff7, 0x4}, 0x10) [ 932.182374] XFS (loop0): unknown mount option [logbsize=]. [ 932.199306] XFS (loop4): unknown mount option [euid=00000000000000000000]. 08:26:01 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) clock_settime(0x1, &(0x7f0000000040)={0x0, 0x3938700}) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, 0x0, 0x0) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) dup(r0) 08:26:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:26:01 executing program 5: ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(0xffffffffffffffff, 0x40096100, &(0x7f0000000540)={{&(0x7f00000004c0)={'KERNEL\x00', {&(0x7f0000000200)=@adf_str={@format={'Cy', '3', 'NumConcurrentAsymRequests\x00'}, {"1674727bad16ca677bf1252907b61c38249b7c0df2678aec077b45d9ec2b8b96239b4f2cdf456afe90f3830a5f42ef9c517025492c379db37e5caf0be03763a7"}, {&(0x7f0000000140)=@adf_dec={@bank={'Bank', '5', 'InterruptCoalescingNumResponses\x00'}, {0x9e02}}}}}, {&(0x7f0000000440)={'KERNEL\x00', {&(0x7f0000000380)=@adf_dec={@bank={'Bank', '0', 'InterruptCoalescingEnabled\x00'}, {0x1}, {&(0x7f00000002c0)=@adf_hex={@bank={'Bank', '4', 'InterruptCoalescingNumResponses\x00'}, {0x5}}}}}}}}}}) exit(0x400) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000001a80)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7a2d}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8001) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f00000005c0)) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$tun(r2, &(0x7f0000001880)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="f110000090780fae0512000000010000000600000007000007ff13129e416a8da4376fced2e00d4810e449f604020100f554485129f6e8c522b3bb1e756935dacbf4c2ebdee8d8454391b3baaae965ccd4b376af19b1b2aef289220f4220fd26db8d0f830745d2abf3e41b21ef6e74335166300f06bccd98cca9a41a834e5653d7da0fc59133ea3373751f2e"], 0x192) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000001840)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)={0x4c, 0x0, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010102}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20044080}, 0x15) write$nbd(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="67446698c10000000000f2000000000022fd6312927985f70a680cb8e4097405ffc3dca138a281361b7b5fef421743f9c0e6130a9842a2601d0845e912"], 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 08:26:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0xffffc, 0x3, 0xfff7, 0x4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0xffffc, 0x3, 0xfff7, 0x4}, 0x10) (async) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r0, 0x0, 0x0) 08:26:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x0, 0x2, 0x2, "2a3d6f1fc31bfaf5689dc6518426a95399afc634cc6f6614b95b1ee3c035df1ced24cf0e7027d9fbcd92f1afae8f767f71e42aeae5f6c59caae89670165b95aa02b93a67b7fbd07412ad0adadb21f38d99a51f2b0658230f78a6913fff8ce9fa5d614d4c8f41af"}, 0x77) write$nbd(r0, &(0x7f0000000100), 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x50, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8001, 0x8001, 0x10001]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x400000c}, 0x40000) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 932.356229] XFS (loop4): unknown mount option [euid=00000000000000000000]. 08:26:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x0, 0x2, 0x2, "2a3d6f1fc31bfaf5689dc6518426a95399afc634cc6f6614b95b1ee3c035df1ced24cf0e7027d9fbcd92f1afae8f767f71e42aeae5f6c59caae89670165b95aa02b93a67b7fbd07412ad0adadb21f38d99a51f2b0658230f78a6913fff8ce9fa5d614d4c8f41af"}, 0x77) write$nbd(r0, &(0x7f0000000100), 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x50, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8001, 0x8001, 0x10001]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x400000c}, 0x40000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x0, 0x2, 0x2, "2a3d6f1fc31bfaf5689dc6518426a95399afc634cc6f6614b95b1ee3c035df1ced24cf0e7027d9fbcd92f1afae8f767f71e42aeae5f6c59caae89670165b95aa02b93a67b7fbd07412ad0adadb21f38d99a51f2b0658230f78a6913fff8ce9fa5d614d4c8f41af"}, 0x77) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x50, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8001, 0x8001, 0x10001]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x400000c}, 0x40000) (async) 08:26:01 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, 0x0, 0x0) 08:26:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r0}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x6}) 08:26:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 932.534333] XFS (loop4): unknown mount option [euid=00000000000000000000]. 08:26:02 executing program 5: ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(0xffffffffffffffff, 0x40096100, &(0x7f0000000540)={{&(0x7f00000004c0)={'KERNEL\x00', {&(0x7f0000000200)=@adf_str={@format={'Cy', '3', 'NumConcurrentAsymRequests\x00'}, {"1674727bad16ca677bf1252907b61c38249b7c0df2678aec077b45d9ec2b8b96239b4f2cdf456afe90f3830a5f42ef9c517025492c379db37e5caf0be03763a7"}, {&(0x7f0000000140)=@adf_dec={@bank={'Bank', '5', 'InterruptCoalescingNumResponses\x00'}, {0x9e02}}}}}, {&(0x7f0000000440)={'KERNEL\x00', {&(0x7f0000000380)=@adf_dec={@bank={'Bank', '0', 'InterruptCoalescingEnabled\x00'}, {0x1}, {&(0x7f00000002c0)=@adf_hex={@bank={'Bank', '4', 'InterruptCoalescingNumResponses\x00'}, {0x5}}}}}}}}}}) (async) exit(0x400) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) (async, rerun: 64) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000001a80)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7a2d}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8001) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f00000005c0)) (async, rerun: 32) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (rerun: 32) write$tun(r2, &(0x7f0000001880)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="f110000090780fae0512000000010000000600000007000007ff13129e416a8da4376fced2e00d4810e449f604020100f554485129f6e8c522b3bb1e756935dacbf4c2ebdee8d8454391b3baaae965ccd4b376af19b1b2aef289220f4220fd26db8d0f830745d2abf3e41b21ef6e74335166300f06bccd98cca9a41a834e5653d7da0fc59133ea3373751f2e"], 0x192) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000001840)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)={0x4c, 0x0, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010102}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20044080}, 0x15) (async, rerun: 32) write$nbd(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="67446698c10000000000f2000000000022fd6312927985f70a680cb8e4097405ffc3dca138a281361b7b5fef421743f9c0e6130a9842a2601d0845e912"], 0x10) (async, rerun: 32) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 08:26:02 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x0, 0x2, 0x2, "2a3d6f1fc31bfaf5689dc6518426a95399afc634cc6f6614b95b1ee3c035df1ced24cf0e7027d9fbcd92f1afae8f767f71e42aeae5f6c59caae89670165b95aa02b93a67b7fbd07412ad0adadb21f38d99a51f2b0658230f78a6913fff8ce9fa5d614d4c8f41af"}, 0x77) write$nbd(r0, &(0x7f0000000100), 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x50, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8001, 0x8001, 0x10001]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x400000c}, 0x40000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, &(0x7f0000000200)={0x67446698, 0x0, 0x0, 0x2, 0x2, "2a3d6f1fc31bfaf5689dc6518426a95399afc634cc6f6614b95b1ee3c035df1ced24cf0e7027d9fbcd92f1afae8f767f71e42aeae5f6c59caae89670165b95aa02b93a67b7fbd07412ad0adadb21f38d99a51f2b0658230f78a6913fff8ce9fa5d614d4c8f41af"}, 0x77) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x50, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0x8001, 0x8001, 0x10001]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x400000c}, 0x40000) (async) 08:26:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}]}) 08:26:02 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r0}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x6}) 08:26:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:02 executing program 0: ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(0xffffffffffffffff, 0x40096100, &(0x7f0000000540)={{&(0x7f00000004c0)={'KERNEL\x00', {&(0x7f0000000200)=@adf_str={@format={'Cy', '3', 'NumConcurrentAsymRequests\x00'}, {"1674727bad16ca677bf1252907b61c38249b7c0df2678aec077b45d9ec2b8b96239b4f2cdf456afe90f3830a5f42ef9c517025492c379db37e5caf0be03763a7"}, {&(0x7f0000000140)=@adf_dec={@bank={'Bank', '5', 'InterruptCoalescingNumResponses\x00'}, {0x9e02}}}}}, {&(0x7f0000000440)={'KERNEL\x00', {&(0x7f0000000380)=@adf_dec={@bank={'Bank', '0', 'InterruptCoalescingEnabled\x00'}, {0x1}, {&(0x7f00000002c0)=@adf_hex={@bank={'Bank', '4', 'InterruptCoalescingNumResponses\x00'}, {0x5}}}}}}}}}}) exit(0x400) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000001a80)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7a2d}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8001) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f00000005c0)) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$tun(r2, &(0x7f0000001880)=ANY=[@ANYBLOB="00008847030136000200a800f9ff4bfb01840065000080090078ac1e0001ac1e0001940400004424bd23ac1e000100000000ffffffff000000047f000001ffffff80e000000100000007443452330a010101000002007f00000100000008ac1414aa00000006640101020000002264010100000000030a01010100000001442495e100000000000000010a01010000000001ac1e01010000dc7264010102fffffffc940401004404e87814e581ac1414bb000003ffac1e000100000002442cdbe1e000000100000000ac1414bb000006247f000001000000ffffffffff000000207f00000100000009070b6fac1414aae000000289077c4390bb4300004e204e20c12712a97b2b4e0c8b339e2d18bc5207194b63f0a7755bf6a1a920e49d4f62224e568c05716085b14e2b39becc", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="f110000090780fae0512000000010000000600000007000007ff13129e416a8da4376fced2e00d4810e449f604020100f554485129f6e8c522b3bb1e756935dacbf4c2ebdee8d8454391b3baaae965ccd4b376af19b1b2aef289220f4220fd26db8d0f830745d2abf3e41b21ef6e74335166300f06bccd98cca9a41a834e5653d7da0fc59133ea3373751f2e"], 0x192) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000001840)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)={0x4c, 0x0, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010102}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20044080}, 0x15) write$nbd(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="67446698c10000000000f2000000000022fd6312927985f70a680cb8e4097405ffc3dca138a281361b7b5fef421743f9c0e6130a9842a2601d0845e912"], 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 08:26:02 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r0}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (rerun: 64) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x6}) 08:26:02 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x1, 0x2, "c2d7015b50a31fec63ec005eca398cd8395f4e233dc92e938ac01cb76efd1f84b7895e560a3eb2c9f4d133284f79f3fcad683b2675bb7e3f12c0e67303642753a39024ab6b6481ddd66a0f54"}, 0x5c) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6744669800000000004526bfcd7347e4af55000000abb00090ab938daa5165e7c2a2cd4081da00"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000140), &(0x7f0000000000)=0x4) [ 933.310024] XFS (loop4): unknown mount option [logbsize=]. 08:26:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}]}) 08:26:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6744669800000000004526bfcd7347e4af55000000abb00090ab938daa5165e7c2a2cd4081da00"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000140), &(0x7f0000000000)=0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6744669800000000004526bfcd7347e4af55000000abb00090ab938daa5165e7c2a2cd4081da00"], 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000140), &(0x7f0000000000)=0x4) (async) [ 933.478062] XFS (loop4): unknown mount option [logbsize=]. 08:26:03 executing program 5: ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(0xffffffffffffffff, 0x40096100, &(0x7f0000000540)={{&(0x7f00000004c0)={'KERNEL\x00', {&(0x7f0000000200)=@adf_str={@format={'Cy', '3', 'NumConcurrentAsymRequests\x00'}, {"1674727bad16ca677bf1252907b61c38249b7c0df2678aec077b45d9ec2b8b96239b4f2cdf456afe90f3830a5f42ef9c517025492c379db37e5caf0be03763a7"}, {&(0x7f0000000140)=@adf_dec={@bank={'Bank', '5', 'InterruptCoalescingNumResponses\x00'}, {0x9e02}}}}}, {&(0x7f0000000440)={'KERNEL\x00', {&(0x7f0000000380)=@adf_dec={@bank={'Bank', '0', 'InterruptCoalescingEnabled\x00'}, {0x1}, {&(0x7f00000002c0)=@adf_hex={@bank={'Bank', '4', 'InterruptCoalescingNumResponses\x00'}, {0x5}}}}}}}}}}) (async, rerun: 64) exit(0x400) (async, rerun: 64) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) (async, rerun: 64) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000001a80)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffffffff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7a2d}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8001) (rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f00000005c0)) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) write$tun(r2, &(0x7f0000001880)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="f110000090780fae0512000000010000000600000007000007ff13129e416a8da4376fced2e00d4810e449f604020100f554485129f6e8c522b3bb1e756935dacbf4c2ebdee8d8454391b3baaae965ccd4b376af19b1b2aef289220f4220fd26db8d0f830745d2abf3e41b21ef6e74335166300f06bccd98cca9a41a834e5653d7da0fc59133ea3373751f2e"], 0x192) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000001840)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)={0x4c, 0x0, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010102}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x4}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20044080}, 0x15) (async, rerun: 32) write$nbd(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="67446698c10000000000f2000000000022fd6312927985f70a680cb8e4097405ffc3dca138a281361b7b5fef421743f9c0e6130a9842a2601d0845e912"], 0x10) (async, rerun: 32) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 08:26:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:03 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x429) 08:26:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6744669800000000004526bfcd7347e4af55000000abb00090ab938daa5165e7c2a2cd4081da00"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000140), &(0x7f0000000000)=0x4) 08:26:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}]}) 08:26:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}]}) 08:26:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$l2tp(0x2, 0x2, 0x73) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x0, 0x0, 0x0, 0x80000, "b7e70966ab49aa73147c6598a9c3234d0c012f95c63341bd3dfb69ab19aeac9f29a2c8b37b7678831b777f4bb9ffdf84c8e07db41fa474ee11ed1d8bf22db483063842b0dac4a5aec24c38c4098d12a2adf3208d1ca095ff34c51853ea9633fe1654618ae0c60ff3571ae0059c7550f424c6dcf63c5b8615352eaa8f223cffa3081c52fc9c72f3fcbc969fbac926f7b0cecca99c5fbc3a6a55aa260dfc9b76bc8d49b14cd1d86dd04427934f3cb7fca550bdad0cca95d59904a64a4333be9a65ca901b91b49082"}, 0xd7) 08:26:03 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x429) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) write$nbd(r0, 0x0, 0x0) (async) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x429) (async) [ 934.209085] XFS (loop4): unknown mount option [logbsize=]. 08:26:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) 08:26:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$l2tp(0x2, 0x2, 0x73) (async) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x0, 0x0, 0x0, 0x80000, "b7e70966ab49aa73147c6598a9c3234d0c012f95c63341bd3dfb69ab19aeac9f29a2c8b37b7678831b777f4bb9ffdf84c8e07db41fa474ee11ed1d8bf22db483063842b0dac4a5aec24c38c4098d12a2adf3208d1ca095ff34c51853ea9633fe1654618ae0c60ff3571ae0059c7550f424c6dcf63c5b8615352eaa8f223cffa3081c52fc9c72f3fcbc969fbac926f7b0cecca99c5fbc3a6a55aa260dfc9b76bc8d49b14cd1d86dd04427934f3cb7fca550bdad0cca95d59904a64a4333be9a65ca901b91b49082"}, 0xd7) [ 934.360725] XFS (loop0): unknown mount option [logbsize=]. [ 934.387052] XFS (loop4): unknown mount option [logbsize=]. 08:26:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$nbd(r1, &(0x7f0000000040)=ANY=[], 0x7c) 08:26:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async, rerun: 32) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x429) (rerun: 32) 08:26:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$l2tp(0x2, 0x2, 0x73) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x0, 0x0, 0x0, 0x80000, "b7e70966ab49aa73147c6598a9c3234d0c012f95c63341bd3dfb69ab19aeac9f29a2c8b37b7678831b777f4bb9ffdf84c8e07db41fa474ee11ed1d8bf22db483063842b0dac4a5aec24c38c4098d12a2adf3208d1ca095ff34c51853ea9633fe1654618ae0c60ff3571ae0059c7550f424c6dcf63c5b8615352eaa8f223cffa3081c52fc9c72f3fcbc969fbac926f7b0cecca99c5fbc3a6a55aa260dfc9b76bc8d49b14cd1d86dd04427934f3cb7fca550bdad0cca95d59904a64a4333be9a65ca901b91b49082"}, 0xd7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socket$l2tp(0x2, 0x2, 0x73) (async) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x0, 0x0, 0x0, 0x80000, "b7e70966ab49aa73147c6598a9c3234d0c012f95c63341bd3dfb69ab19aeac9f29a2c8b37b7678831b777f4bb9ffdf84c8e07db41fa474ee11ed1d8bf22db483063842b0dac4a5aec24c38c4098d12a2adf3208d1ca095ff34c51853ea9633fe1654618ae0c60ff3571ae0059c7550f424c6dcf63c5b8615352eaa8f223cffa3081c52fc9c72f3fcbc969fbac926f7b0cecca99c5fbc3a6a55aa260dfc9b76bc8d49b14cd1d86dd04427934f3cb7fca550bdad0cca95d59904a64a4333be9a65ca901b91b49082"}, 0xd7) (async) 08:26:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan4\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x2, 0x0, 0x2, "91bbae3b62a4fb16c77d303cde3ccd02c3de4a9e2bc8d9ef85bc409c392afc3e4c546607133a7a6a57bd227803"}, 0x3d) 08:26:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) dup(r0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x50004) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)) 08:26:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$nbd(r1, &(0x7f0000000040)=ANY=[], 0x7c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) write$nbd(r1, &(0x7f0000000040)=ANY=[], 0x7c) (async) 08:26:04 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="17fcfd0000a499883d8a68a3f10000000008300000"]) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x3, 0x5}, 0x10) [ 935.155127] XFS (loop0): unknown mount option [euid=00000000000000000000]. 08:26:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan4\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x2, 0x0, 0x2, "91bbae3b62a4fb16c77d303cde3ccd02c3de4a9e2bc8d9ef85bc409c392afc3e4c546607133a7a6a57bd227803"}, 0x3d) 08:26:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:26:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="17fcfd0000a499883d8a68a3f10000000008300000"]) (async) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x3, 0x5}, 0x10) 08:26:04 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$nbd(r1, &(0x7f0000000040)=ANY=[], 0x7c) 08:26:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) dup(r0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x50004) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) (async) dup(r0) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x50004) (async) socket$kcm(0x29, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)) (async) 08:26:04 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) dup(r0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x50004) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)) 08:26:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="17fcfd0000a499883d8a68a3f10000000008300000"]) (async) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x3, 0x5}, 0x10) 08:26:04 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={@any, 0x1}) write$nbd(r0, 0x0, 0x0) 08:26:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r9, &(0x7f0000000740)=""/4096, 0x1000) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r10, &(0x7f0000000740)=""/4096, 0x1000) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x10, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0xa}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2000000}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xf}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ldst={0x1, 0x0, 0x1, 0x1, 0xa, 0x80, 0xffffffffffffffff}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @ldst={0x0, 0x1, 0x1, 0x8, 0x9, 0xffffffffffffffff}], &(0x7f0000000280)='GPL\x00', 0x7, 0x38, &(0x7f00000002c0)=""/56, 0x40f00, 0x17, '\x00', 0x0, 0x4, r2, 0x8, &(0x7f0000000380)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x1, 0x1, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r3, 0x1, r4, r5, r6, r7, r8, r9, r10, 0xffffffffffffffff]}, 0x80) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r11, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000108b325524", @ANYRES16=r12, @ANYBLOB="02002dbd7000fbdbdf25030000000900010073797a31000000000500040001000000"], 0x28}, 0x1, 0x0, 0x0, 0x2001c861}, 0x10) write$nbd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698000000000000000000000600f390d41c0d038a5f3f87cc03ff14697f534a0202e06c0bb397ff000000009c42c40087df810ea69dfab634e25a8aa15cbe"], 0x41) 08:26:04 executing program 4: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}], [{@euid_eq}, {@hash}, {@subj_user={'subj_user', 0x3d, '.:^}'}}, {@appraise_type}]}) 08:26:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) 08:26:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) dup(r0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="b00000000314000429bd7000ffdbdf250900020073797a3000000000080041007278650014003300776c616e3100000000000000000000000900020073797a320000000008004100727804ada0c9be7fa4f3e6d64c6500140033006970766c616e310000000000000000000900020073797a3100000000080041007278650014003300626f6e645f736c6176835f31000000000900020073797a3200000000080041007278650014003300627269646763f751a74df4b2184f7e62543df0c02e44369ac7c12faa06336b5d432a49e16b776fa5f60f3650a562a3f7cb99e1d3baccb6de6bed8abaf9708b516d9f4b1a294b86d9e1beaed771bff32ec23a8c473aba51a28db5736a77395cace75ff0"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x50004) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) (async) dup(r0) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x50004) (async) socket$kcm(0x29, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)) (async) 08:26:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 08:26:04 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 32) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) (async) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r9, &(0x7f0000000740)=""/4096, 0x1000) (async) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r10, &(0x7f0000000740)=""/4096, 0x1000) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x10, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0xa}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2000000}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xf}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ldst={0x1, 0x0, 0x1, 0x1, 0xa, 0x80, 0xffffffffffffffff}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @ldst={0x0, 0x1, 0x1, 0x8, 0x9, 0xffffffffffffffff}], &(0x7f0000000280)='GPL\x00', 0x7, 0x38, &(0x7f00000002c0)=""/56, 0x40f00, 0x17, '\x00', 0x0, 0x4, r2, 0x8, &(0x7f0000000380)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x1, 0x1, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r3, 0x1, r4, r5, r6, r7, r8, r9, r10, 0xffffffffffffffff]}, 0x80) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r11, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000108b325524", @ANYRES16=r12, @ANYBLOB="02002dbd7000fbdbdf25030000000900010073797a31000000000500040001000000"], 0x28}, 0x1, 0x0, 0x0, 0x2001c861}, 0x10) write$nbd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698000000000000000000000600f390d41c0d038a5f3f87cc03ff14697f534a0202e06c0bb397ff000000009c42c40087df810ea69dfab634e25a8aa15cbe"], 0x41) 08:26:04 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:05 executing program 4: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0x3, 0x1, 0xa, 0x2}, 0x1, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) 08:26:05 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x4, 0x3, 0x2, "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"}, 0x10e) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 08:26:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x110a, 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r8, &(0x7f0000000740)=""/4096, 0x1000) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r9, &(0x7f0000000740)=""/4096, 0x1000) (async) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r10, &(0x7f0000000740)=""/4096, 0x1000) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x10, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0xa}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2000000}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xf}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ldst={0x1, 0x0, 0x1, 0x1, 0xa, 0x80, 0xffffffffffffffff}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xe}, @ldst={0x0, 0x1, 0x1, 0x8, 0x9, 0xffffffffffffffff}], &(0x7f0000000280)='GPL\x00', 0x7, 0x38, &(0x7f00000002c0)=""/56, 0x40f00, 0x17, '\x00', 0x0, 0x4, r2, 0x8, &(0x7f0000000380)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x1, 0x1, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000004c0)=[r3, 0x1, r4, r5, r6, r7, r8, r9, r10, 0xffffffffffffffff]}, 0x80) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r11, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000108b325524", @ANYRES16=r12, @ANYBLOB="02002dbd7000fbdbdf25030000000900010073797a31000000000500040001000000"], 0x28}, 0x1, 0x0, 0x0, 0x2001c861}, 0x10) (async) write$nbd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698000000000000000000000600f390d41c0d038a5f3f87cc03ff14697f534a0202e06c0bb397ff000000009c42c40087df810ea69dfab634e25a8aa15cbe"], 0x41) 08:26:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:05 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x1, 0x4, "b8f6272c2f2302bbad6d6837883e5c71383c09d8a0b2d836b48e772c45e87f8815"}, 0x31) 08:26:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x110a, 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:05 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x4, 0x3, 0x2, "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"}, 0x10e) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 08:26:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x5, 0x0, 0x0, "6a0270beabdf1b4346fd7725488b40aa83c4e6b3b61d082f00b467d72e97011e49e4f6d7b73d8b8d088f2b0d5c4fbd7104d45cefd8a7f884b7a0186121d8"}, 0x4e) 08:26:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 1) 08:26:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x110a, 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async, rerun: 64) write$nbd(r0, &(0x7f0000000100), 0x10) (rerun: 64) 08:26:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 1) [ 936.022708] FAULT_INJECTION: forcing a failure. [ 936.022708] name failslab, interval 1, probability 0, space 0, times 0 [ 936.065668] CPU: 1 PID: 19075 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 936.072962] FAULT_INJECTION: forcing a failure. [ 936.072962] name failslab, interval 1, probability 0, space 0, times 0 [ 936.073581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.094107] Call Trace: [ 936.096701] dump_stack+0x1b2/0x281 [ 936.100333] should_fail.cold+0x10a/0x149 [ 936.104490] should_failslab+0xd6/0x130 [ 936.108467] __kmalloc+0x2c1/0x400 [ 936.112008] ? SyS_memfd_create+0xbc/0x3c0 [ 936.116241] SyS_memfd_create+0xbc/0x3c0 [ 936.120297] ? shmem_fcntl+0x120/0x120 [ 936.124187] ? __do_page_fault+0x159/0xad0 [ 936.128426] ? do_syscall_64+0x4c/0x640 [ 936.132398] ? shmem_fcntl+0x120/0x120 [ 936.136288] do_syscall_64+0x1d5/0x640 [ 936.140179] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 936.145363] RIP: 0033:0x7f551d0460e9 [ 936.149090] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 936.156783] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0460e9 [ 936.164034] RDX: 00007f551b9bafe0 RSI: 0000000000000000 RDI: 00007f551d09f1ee [ 936.171291] RBP: 0000000000000000 R08: 00007f551b9bafd8 R09: 00007f551b9bb1d0 [ 936.178548] R10: 00007f551b9bafdc R11: 0000000000000246 R12: 0000000020000140 [ 936.185979] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 [ 936.193287] CPU: 0 PID: 19078 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 936.201171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.210521] Call Trace: 08:26:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x5, 0x0, 0x0, "6a0270beabdf1b4346fd7725488b40aa83c4e6b3b61d082f00b467d72e97011e49e4f6d7b73d8b8d088f2b0d5c4fbd7104d45cefd8a7f884b7a0186121d8"}, 0x4e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x5, 0x0, 0x0, "6a0270beabdf1b4346fd7725488b40aa83c4e6b3b61d082f00b467d72e97011e49e4f6d7b73d8b8d088f2b0d5c4fbd7104d45cefd8a7f884b7a0186121d8"}, 0x4e) (async) 08:26:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 936.213109] dump_stack+0x1b2/0x281 [ 936.216742] should_fail.cold+0x10a/0x149 [ 936.220896] should_failslab+0xd6/0x130 [ 936.224870] __kmalloc+0x2c1/0x400 [ 936.228410] ? SyS_memfd_create+0xbc/0x3c0 [ 936.232645] SyS_memfd_create+0xbc/0x3c0 [ 936.236702] ? shmem_fcntl+0x120/0x120 [ 936.240588] ? __do_page_fault+0x159/0xad0 [ 936.244818] ? do_syscall_64+0x4c/0x640 [ 936.248790] ? shmem_fcntl+0x120/0x120 [ 936.252681] do_syscall_64+0x1d5/0x640 [ 936.256574] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 936.261759] RIP: 0033:0x7f100538a0e9 08:26:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x5, 0x0, 0x0, "6a0270beabdf1b4346fd7725488b40aa83c4e6b3b61d082f00b467d72e97011e49e4f6d7b73d8b8d088f2b0d5c4fbd7104d45cefd8a7f884b7a0186121d8"}, 0x4e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x5, 0x0, 0x0, "6a0270beabdf1b4346fd7725488b40aa83c4e6b3b61d082f00b467d72e97011e49e4f6d7b73d8b8d088f2b0d5c4fbd7104d45cefd8a7f884b7a0186121d8"}, 0x4e) (async) 08:26:05 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x4, 0x3, 0x2, "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"}, 0x10e) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 08:26:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 2) 08:26:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x128, 0x1403, 0x0, 0x70bd25, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'syzkaller0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'macvlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'syzkaller1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'sit0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6erspan0\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x20008000}, 0x41) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r2}) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67005295692100"], 0x10) [ 936.265472] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 936.273178] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538a0e9 [ 936.280448] RDX: 00007f1003cfefe0 RSI: 0000000000000000 RDI: 00007f10053e31ee [ 936.287723] RBP: 0000000000000000 R08: 00007f1003cfefd8 R09: 00007f1003cff1d0 [ 936.294994] R10: 00007f1003cfefdc R11: 0000000000000246 R12: 0000000020000140 [ 936.302265] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 08:26:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 08:26:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000000030000000000000000"], 0x10) [ 936.381418] FAULT_INJECTION: forcing a failure. [ 936.381418] name failslab, interval 1, probability 0, space 0, times 0 [ 936.404948] CPU: 0 PID: 19098 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 936.412848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.422201] Call Trace: [ 936.424793] dump_stack+0x1b2/0x281 [ 936.428434] should_fail.cold+0x10a/0x149 [ 936.432590] should_failslab+0xd6/0x130 [ 936.436569] kmem_cache_alloc+0x28e/0x3c0 [ 936.440731] __d_alloc+0x2a/0xa20 [ 936.444190] ? lock_downgrade+0x740/0x740 [ 936.448346] __shmem_file_setup.part.0+0xcb/0x3c0 [ 936.453196] ? shmem_create+0x30/0x30 [ 936.456999] ? __alloc_fd+0x1be/0x490 [ 936.460812] SyS_memfd_create+0x1fc/0x3c0 [ 936.464965] ? shmem_fcntl+0x120/0x120 [ 936.468858] ? __do_page_fault+0x159/0xad0 [ 936.473096] ? do_syscall_64+0x4c/0x640 [ 936.477074] ? shmem_fcntl+0x120/0x120 [ 936.480965] do_syscall_64+0x1d5/0x640 [ 936.484861] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 936.490049] RIP: 0033:0x7f551d0460e9 [ 936.493756] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 936.501467] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0460e9 [ 936.508736] RDX: 00007f551b9bafe0 RSI: 0000000000000000 RDI: 00007f551d09f1ee [ 936.516009] RBP: 0000000000000000 R08: 00007f551b9bafd8 R09: 00007f551b9bb1d0 [ 936.523279] R10: 00007f551b9bafdc R11: 0000000000000246 R12: 0000000020000140 08:26:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x128, 0x1403, 0x0, 0x70bd25, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'syzkaller0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'macvlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'syzkaller1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'sit0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6erspan0\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x20008000}, 0x41) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r2}) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67005295692100"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x128, 0x1403, 0x0, 0x70bd25, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'syzkaller0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'macvlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'syzkaller1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'sit0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6erspan0\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x20008000}, 0x41) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r2}) (async) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) (async) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67005295692100"], 0x10) (async) [ 936.531241] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 08:26:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 3) 08:26:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 2) 08:26:05 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x128, 0x1403, 0x0, 0x70bd25, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'syzkaller0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'vcan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'macvlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'syzkaller1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'sit0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6erspan0\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x20008000}, 0x41) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r2}) (async) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) (async) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67005295692100"], 0x10) 08:26:05 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 08:26:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000000030000000000000000"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000000030000000000000000"], 0x10) (async) 08:26:05 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_CONTINUE(r2, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ff7000/0x6000)=nil, 0x6000}, 0x1}) write$nbd(r1, 0x0, 0x0) 08:26:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) [ 936.706112] FAULT_INJECTION: forcing a failure. [ 936.706112] name failslab, interval 1, probability 0, space 0, times 0 [ 936.728330] FAULT_INJECTION: forcing a failure. [ 936.728330] name failslab, interval 1, probability 0, space 0, times 0 [ 936.734522] CPU: 0 PID: 19140 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 936.747410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.756888] Call Trace: [ 936.759475] dump_stack+0x1b2/0x281 [ 936.763113] should_fail.cold+0x10a/0x149 [ 936.767302] should_failslab+0xd6/0x130 [ 936.771276] kmem_cache_alloc+0x28e/0x3c0 [ 936.775429] ? shmem_destroy_callback+0xa0/0xa0 [ 936.780100] shmem_alloc_inode+0x18/0x40 [ 936.784159] ? shmem_destroy_callback+0xa0/0xa0 [ 936.788819] alloc_inode+0x5d/0x170 [ 936.792440] new_inode+0x1d/0xf0 [ 936.795796] shmem_get_inode+0x8b/0x890 [ 936.799847] __shmem_file_setup.part.0+0x104/0x3c0 08:26:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (fail_nth: 1) [ 936.804768] ? shmem_create+0x30/0x30 [ 936.808564] ? __alloc_fd+0x1be/0x490 [ 936.812363] SyS_memfd_create+0x1fc/0x3c0 [ 936.816511] ? shmem_fcntl+0x120/0x120 [ 936.820434] ? __do_page_fault+0x159/0xad0 [ 936.824660] ? do_syscall_64+0x4c/0x640 [ 936.828632] ? shmem_fcntl+0x120/0x120 [ 936.832517] do_syscall_64+0x1d5/0x640 [ 936.836404] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 936.841586] RIP: 0033:0x7f551d0460e9 [ 936.845280] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 936.852984] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0460e9 [ 936.860243] RDX: 00007f551b9bafe0 RSI: 0000000000000000 RDI: 00007f551d09f1ee [ 936.867505] RBP: 0000000000000000 R08: 00007f551b9bafd8 R09: 00007f551b9bb1d0 [ 936.874768] R10: 00007f551b9bafdc R11: 0000000000000246 R12: 0000000020000140 [ 936.882030] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 [ 936.897159] CPU: 1 PID: 19147 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 936.905055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.914410] Call Trace: [ 936.916999] dump_stack+0x1b2/0x281 [ 936.920643] should_fail.cold+0x10a/0x149 [ 936.924793] should_failslab+0xd6/0x130 [ 936.928769] kmem_cache_alloc+0x28e/0x3c0 [ 936.932928] __d_alloc+0x2a/0xa20 [ 936.936377] ? lock_downgrade+0x740/0x740 [ 936.940529] __shmem_file_setup.part.0+0xcb/0x3c0 [ 936.945371] ? shmem_create+0x30/0x30 [ 936.949171] ? __alloc_fd+0x1be/0x490 [ 936.952984] SyS_memfd_create+0x1fc/0x3c0 [ 936.957129] ? shmem_fcntl+0x120/0x120 [ 936.961009] ? __do_page_fault+0x159/0xad0 [ 936.965241] ? do_syscall_64+0x4c/0x640 [ 936.969210] ? shmem_fcntl+0x120/0x120 [ 936.973094] do_syscall_64+0x1d5/0x640 [ 936.976984] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 936.982166] RIP: 0033:0x7f100538a0e9 [ 936.985868] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 936.993581] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538a0e9 08:26:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000000030000000000000000"], 0x10) 08:26:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0xffffffffffffff12) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) 08:26:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_CONTINUE(r2, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ff7000/0x6000)=nil, 0x6000}, 0x1}) write$nbd(r1, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_CONTINUE(r2, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ff7000/0x6000)=nil, 0x6000}, 0x1}) (async) write$nbd(r1, 0x0, 0x0) (async) 08:26:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 4) 08:26:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000726c9d5057778610e6e45d110d365e54d7a701175d7f0400be0ab8688127a78cd8380ca10466a97d64cd27f1d33162ee4a8c7c08aa3a0134f110d42ec02280c5863d169ec9e2b4f305f7b30c39", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe, 0x0, 0x0, "666d86cae11c70ebf5a55a4d9c401f8d1b39199f31cb97c389d22429ebe74d43e8aac365ec23e48f49fa45ec2de592ae6bd85d76f1a2b44f69b1322168873d230d09949ee9be2d71fe73eb0b2d4f75cb1c5ff45cf546261cfcc9fabcc02af9f8dc40c1019f341337ffc9c00063d3bf045b8240f1364411eea416"}, 0x8a) [ 937.000856] RDX: 00007f1003cfefe0 RSI: 0000000000000000 RDI: 00007f10053e31ee [ 937.008123] RBP: 0000000000000000 R08: 00007f1003cfefd8 R09: 00007f1003cff1d0 [ 937.015388] R10: 00007f1003cfefdc R11: 0000000000000246 R12: 0000000020000140 [ 937.018139] FAULT_INJECTION: forcing a failure. [ 937.018139] name failslab, interval 1, probability 0, space 0, times 0 [ 937.022649] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 [ 937.087913] CPU: 0 PID: 19167 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 937.095820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.105171] Call Trace: [ 937.107760] dump_stack+0x1b2/0x281 [ 937.111393] should_fail.cold+0x10a/0x149 [ 937.115579] should_failslab+0xd6/0x130 [ 937.119558] kmem_cache_alloc+0x28e/0x3c0 [ 937.123709] get_empty_filp+0x86/0x3f0 [ 937.127599] alloc_file+0x23/0x440 [ 937.131147] __shmem_file_setup.part.0+0x198/0x3c0 [ 937.136079] ? shmem_create+0x30/0x30 [ 937.139873] ? __alloc_fd+0x1be/0x490 [ 937.143679] SyS_memfd_create+0x1fc/0x3c0 [ 937.147825] ? shmem_fcntl+0x120/0x120 [ 937.151703] ? __do_page_fault+0x159/0xad0 [ 937.155927] ? do_syscall_64+0x4c/0x640 [ 937.159886] ? shmem_fcntl+0x120/0x120 [ 937.163767] do_syscall_64+0x1d5/0x640 [ 937.167660] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 937.172839] RIP: 0033:0x7f551d0460e9 [ 937.176675] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 08:26:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 3) 08:26:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0xffffffffffffff12) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) 08:26:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_CONTINUE(r2, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ff7000/0x6000)=nil, 0x6000}, 0x1}) write$nbd(r1, 0x0, 0x0) 08:26:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x64, 0x1407, 0x1, 0x7, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x40001}, 0x20000c01) 08:26:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000726c9d5057778610e6e45d110d365e54d7a701175d7f0400be0ab8688127a78cd8380ca10466a97d64cd27f1d33162ee4a8c7c08aa3a0134f110d42ec02280c5863d169ec9e2b4f305f7b30c39", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe, 0x0, 0x0, "666d86cae11c70ebf5a55a4d9c401f8d1b39199f31cb97c389d22429ebe74d43e8aac365ec23e48f49fa45ec2de592ae6bd85d76f1a2b44f69b1322168873d230d09949ee9be2d71fe73eb0b2d4f75cb1c5ff45cf546261cfcc9fabcc02af9f8dc40c1019f341337ffc9c00063d3bf045b8240f1364411eea416"}, 0x8a) 08:26:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 5) [ 937.184373] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0460e9 [ 937.191633] RDX: 00007f551b9bafe0 RSI: 0000000000000000 RDI: 00007f551d09f1ee [ 937.198970] RBP: 0000000000000000 R08: 00007f551b9bafd8 R09: 00007f551b9bb1d0 [ 937.206308] R10: 00007f551b9bafdc R11: 0000000000000246 R12: 0000000020000140 [ 937.213574] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 08:26:06 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000726c9d5057778610e6e45d110d365e54d7a701175d7f0400be0ab8688127a78cd8380ca10466a97d64cd27f1d33162ee4a8c7c08aa3a0134f110d42ec02280c5863d169ec9e2b4f305f7b30c39", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe, 0x0, 0x0, "666d86cae11c70ebf5a55a4d9c401f8d1b39199f31cb97c389d22429ebe74d43e8aac365ec23e48f49fa45ec2de592ae6bd85d76f1a2b44f69b1322168873d230d09949ee9be2d71fe73eb0b2d4f75cb1c5ff45cf546261cfcc9fabcc02af9f8dc40c1019f341337ffc9c00063d3bf045b8240f1364411eea416"}, 0x8a) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000726c9d5057778610e6e45d110d365e54d7a701175d7f0400be0ab8688127a78cd8380ca10466a97d64cd27f1d33162ee4a8c7c08aa3a0134f110d42ec02280c5863d169ec9e2b4f305f7b30c39", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) (async) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe, 0x0, 0x0, "666d86cae11c70ebf5a55a4d9c401f8d1b39199f31cb97c389d22429ebe74d43e8aac365ec23e48f49fa45ec2de592ae6bd85d76f1a2b44f69b1322168873d230d09949ee9be2d71fe73eb0b2d4f75cb1c5ff45cf546261cfcc9fabcc02af9f8dc40c1019f341337ffc9c00063d3bf045b8240f1364411eea416"}, 0x8a) (async) 08:26:06 executing program 1: write$nbd(0xffffffffffffffff, 0x0, 0x0) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) 08:26:06 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0xffffffffffffff12) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0xffffffffffffff12) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) (async) 08:26:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x64, 0x1407, 0x1, 0x7, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x40001}, 0x20000c01) [ 937.368677] FAULT_INJECTION: forcing a failure. [ 937.368677] name failslab, interval 1, probability 0, space 0, times 0 [ 937.373295] FAULT_INJECTION: forcing a failure. [ 937.373295] name failslab, interval 1, probability 0, space 0, times 0 [ 937.434206] CPU: 1 PID: 19204 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 937.442114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.451472] Call Trace: [ 937.454053] dump_stack+0x1b2/0x281 [ 937.457678] should_fail.cold+0x10a/0x149 [ 937.462000] should_failslab+0xd6/0x130 [ 937.465971] kmem_cache_alloc+0x28e/0x3c0 [ 937.470125] ? shmem_destroy_callback+0xa0/0xa0 [ 937.474794] shmem_alloc_inode+0x18/0x40 [ 937.478870] ? shmem_destroy_callback+0xa0/0xa0 [ 937.483536] alloc_inode+0x5d/0x170 [ 937.487169] new_inode+0x1d/0xf0 [ 937.490528] shmem_get_inode+0x8b/0x890 [ 937.494504] __shmem_file_setup.part.0+0x104/0x3c0 [ 937.499431] ? shmem_create+0x30/0x30 [ 937.503229] ? __alloc_fd+0x1be/0x490 [ 937.507033] SyS_memfd_create+0x1fc/0x3c0 [ 937.511173] ? shmem_fcntl+0x120/0x120 [ 937.515045] ? __do_page_fault+0x159/0xad0 [ 937.519269] ? do_syscall_64+0x4c/0x640 [ 937.523226] ? shmem_fcntl+0x120/0x120 [ 937.527098] do_syscall_64+0x1d5/0x640 [ 937.530974] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 937.536147] RIP: 0033:0x7f100538a0e9 [ 937.539840] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 937.547620] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538a0e9 [ 937.554871] RDX: 00007f1003cfefe0 RSI: 0000000000000000 RDI: 00007f10053e31ee [ 937.562121] RBP: 0000000000000000 R08: 00007f1003cfefd8 R09: 00007f1003cff1d0 [ 937.569371] R10: 00007f1003cfefdc R11: 0000000000000246 R12: 0000000020000140 [ 937.576623] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 [ 937.583887] CPU: 0 PID: 19205 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 937.591770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.601205] Call Trace: [ 937.603790] dump_stack+0x1b2/0x281 [ 937.607445] should_fail.cold+0x10a/0x149 [ 937.611593] should_failslab+0xd6/0x130 [ 937.615568] kmem_cache_alloc_trace+0x29a/0x3d0 [ 937.620340] apparmor_file_alloc_security+0x129/0x800 [ 937.625531] security_file_alloc+0x66/0xa0 [ 937.629761] ? selinux_is_enabled+0x5/0x50 [ 937.633995] get_empty_filp+0x16b/0x3f0 [ 937.637970] alloc_file+0x23/0x440 [ 937.641521] __shmem_file_setup.part.0+0x198/0x3c0 [ 937.646452] ? shmem_create+0x30/0x30 [ 937.650252] ? __alloc_fd+0x1be/0x490 [ 937.654055] SyS_memfd_create+0x1fc/0x3c0 [ 937.658206] ? shmem_fcntl+0x120/0x120 [ 937.662094] ? __do_page_fault+0x159/0xad0 [ 937.666328] ? do_syscall_64+0x4c/0x640 [ 937.670303] ? shmem_fcntl+0x120/0x120 [ 937.674186] do_syscall_64+0x1d5/0x640 [ 937.678076] entry_SYSCALL_64_after_hwframe+0x46/0xbb 08:26:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:06 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x64, 0x1407, 0x1, 0x7, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x40001}, 0x20000c01) 08:26:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 4) 08:26:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x0, 0x0, "3dc5c948c278372c34fbe64ffd1cf756f821a1a0bbfbd447782c084bd50500000000000000b253ca"}, 0x38) 08:26:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SYNTH_ID(r1, 0xc08c5114, &(0x7f0000000100)={"0fc2bb575fb6873f72992b792beebd3c8cc4f24a53541694a625011965d7", 0x20, 0x2, 0x0, 0x7fff, 0x7, 0x9, 0x8, 0x5, [0x4, 0x68f, 0x3, 0x8, 0x9, 0x6, 0x8, 0x61c, 0x0, 0x3, 0x5, 0x6946, 0x4, 0x8, 0x6, 0x40, 0xfffffffb, 0x80000001, 0xffffffff]}) 08:26:07 executing program 1: write$nbd(0xffffffffffffffff, 0x0, 0x0) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) write$nbd(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) (async) [ 937.683265] RIP: 0033:0x7f551d0460e9 [ 937.686969] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 937.694691] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0460e9 [ 937.701966] RDX: 00007f551b9bafe0 RSI: 0000000000000000 RDI: 00007f551d09f1ee [ 937.709231] RBP: 0000000000000000 R08: 00007f551b9bafd8 R09: 00007f551b9bb1d0 [ 937.716501] R10: 00007f551b9bafdc R11: 0000000000000246 R12: 0000000020000140 [ 937.723775] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 08:26:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 6) 08:26:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) write$nbd(r1, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) (async) write$nbd(r1, &(0x7f0000000100), 0x10) (async) 08:26:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x0, 0x0, "3dc5c948c278372c34fbe64ffd1cf756f821a1a0bbfbd447782c084bd50500000000000000b253ca"}, 0x38) 08:26:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SYNTH_ID(r1, 0xc08c5114, &(0x7f0000000100)={"0fc2bb575fb6873f72992b792beebd3c8cc4f24a53541694a625011965d7", 0x20, 0x2, 0x0, 0x7fff, 0x7, 0x9, 0x8, 0x5, [0x4, 0x68f, 0x3, 0x8, 0x9, 0x6, 0x8, 0x61c, 0x0, 0x3, 0x5, 0x6946, 0x4, 0x8, 0x6, 0x40, 0xfffffffb, 0x80000001, 0xffffffff]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDCTL_SYNTH_ID(r1, 0xc08c5114, &(0x7f0000000100)={"0fc2bb575fb6873f72992b792beebd3c8cc4f24a53541694a625011965d7", 0x20, 0x2, 0x0, 0x7fff, 0x7, 0x9, 0x8, 0x5, [0x4, 0x68f, 0x3, 0x8, 0x9, 0x6, 0x8, 0x61c, 0x0, 0x3, 0x5, 0x6946, 0x4, 0x8, 0x6, 0x40, 0xfffffffb, 0x80000001, 0xffffffff]}) (async) 08:26:07 executing program 1: write$nbd(0xffffffffffffffff, 0x0, 0x0) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) write$nbd(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x1, 0x4) (async) [ 937.866021] FAULT_INJECTION: forcing a failure. [ 937.866021] name failslab, interval 1, probability 0, space 0, times 0 [ 937.880156] FAULT_INJECTION: forcing a failure. [ 937.880156] name failslab, interval 1, probability 0, space 0, times 0 08:26:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x0, 0x0, "3dc5c948c278372c34fbe64ffd1cf756f821a1a0bbfbd447782c084bd50500000000000000b253ca"}, 0x38) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x1, 0x0, 0x0, 0x0, "3dc5c948c278372c34fbe64ffd1cf756f821a1a0bbfbd447782c084bd50500000000000000b253ca"}, 0x38) (async) [ 937.927532] CPU: 1 PID: 19252 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 937.935524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.944878] Call Trace: [ 937.947464] dump_stack+0x1b2/0x281 [ 937.951099] should_fail.cold+0x10a/0x149 [ 937.955248] should_failslab+0xd6/0x130 [ 937.959225] kmem_cache_alloc+0x28e/0x3c0 [ 937.963376] get_empty_filp+0x86/0x3f0 [ 937.967262] alloc_file+0x23/0x440 [ 937.970803] __shmem_file_setup.part.0+0x198/0x3c0 08:26:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x66002, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r0, 0x8004510a, &(0x7f0000000040)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000200)=0x3) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SYNTH_ID(r2, 0xc08c5114, &(0x7f0000000140)={"80aef5d5b003a1a98a04d2fbf55d9e80ffa2751f8ee09be207d12be565aa", 0x6, 0x0, 0x1, 0x2, 0xff, 0x6, 0x2, 0x1, [0x9, 0x0, 0x6, 0x7fff, 0x367, 0x40, 0x5, 0x3d, 0x4, 0x80000001, 0x542a6a07, 0x871, 0x200, 0xd5, 0x6, 0x8, 0x8001, 0x2, 0x8]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="674466983aa300"/16], 0x10) [ 937.975745] ? shmem_create+0x30/0x30 [ 937.979541] ? __alloc_fd+0x1be/0x490 [ 937.983347] SyS_memfd_create+0x1fc/0x3c0 [ 937.987497] ? shmem_fcntl+0x120/0x120 [ 937.991381] ? __do_page_fault+0x159/0xad0 [ 937.995615] ? do_syscall_64+0x4c/0x640 [ 937.999593] ? shmem_fcntl+0x120/0x120 [ 938.003481] do_syscall_64+0x1d5/0x640 [ 938.007374] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 938.012560] RIP: 0033:0x7f100538a0e9 [ 938.016254] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 938.023948] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538a0e9 [ 938.031200] RDX: 00007f1003cfefe0 RSI: 0000000000000000 RDI: 00007f10053e31ee [ 938.038450] RBP: 0000000000000000 R08: 00007f1003cfefd8 R09: 00007f1003cff1d0 [ 938.045699] R10: 00007f1003cfefdc R11: 0000000000000246 R12: 0000000020000140 [ 938.052949] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 [ 938.060213] CPU: 0 PID: 19251 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 938.068094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.077439] Call Trace: [ 938.080024] dump_stack+0x1b2/0x281 [ 938.083653] should_fail.cold+0x10a/0x149 [ 938.087801] should_failslab+0xd6/0x130 [ 938.091777] kmem_cache_alloc+0x28e/0x3c0 [ 938.095935] getname_flags+0xc8/0x550 [ 938.099911] do_sys_open+0x1ce/0x410 [ 938.103624] ? filp_open+0x60/0x60 [ 938.107162] ? do_syscall_64+0x4c/0x640 [ 938.111136] ? SyS_open+0x30/0x30 [ 938.114588] do_syscall_64+0x1d5/0x640 [ 938.118479] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 938.123664] RIP: 0033:0x7f551cff9004 08:26:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SYNTH_ID(r1, 0xc08c5114, &(0x7f0000000100)={"0fc2bb575fb6873f72992b792beebd3c8cc4f24a53541694a625011965d7", 0x20, 0x2, 0x0, 0x7fff, 0x7, 0x9, 0x8, 0x5, [0x4, 0x68f, 0x3, 0x8, 0x9, 0x6, 0x8, 0x61c, 0x0, 0x3, 0x5, 0x6946, 0x4, 0x8, 0x6, 0x40, 0xfffffffb, 0x80000001, 0xffffffff]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$SNDCTL_SYNTH_ID(r1, 0xc08c5114, &(0x7f0000000100)={"0fc2bb575fb6873f72992b792beebd3c8cc4f24a53541694a625011965d7", 0x20, 0x2, 0x0, 0x7fff, 0x7, 0x9, 0x8, 0x5, [0x4, 0x68f, 0x3, 0x8, 0x9, 0x6, 0x8, 0x61c, 0x0, 0x3, 0x5, 0x6946, 0x4, 0x8, 0x6, 0x40, 0xfffffffb, 0x80000001, 0xffffffff]}) (async) [ 938.127372] RSP: 002b:00007f551b9baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 938.135079] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551cff9004 [ 938.142350] RDX: 0000000000000002 RSI: 00007f551b9bafe0 RDI: 00000000ffffff9c [ 938.149618] RBP: 00007f551b9bafe0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 938.156888] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 938.164156] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 5) 08:26:07 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) (async) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x66002, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r0, 0x8004510a, &(0x7f0000000040)) (async) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000200)=0x3) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SYNTH_ID(r2, 0xc08c5114, &(0x7f0000000140)={"80aef5d5b003a1a98a04d2fbf55d9e80ffa2751f8ee09be207d12be565aa", 0x6, 0x0, 0x1, 0x2, 0xff, 0x6, 0x2, 0x1, [0x9, 0x0, 0x6, 0x7fff, 0x367, 0x40, 0x5, 0x3d, 0x4, 0x80000001, 0x542a6a07, 0x871, 0x200, 0xd5, 0x6, 0x8, 0x8001, 0x2, 0x8]}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="674466983aa300"/16], 0x10) 08:26:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 7) 08:26:07 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 08:26:07 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x66002, 0x0) ioctl$SNDCTL_SEQ_NRSYNTHS(r0, 0x8004510a, &(0x7f0000000040)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000200)=0x3) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SYNTH_ID(r2, 0xc08c5114, &(0x7f0000000140)={"80aef5d5b003a1a98a04d2fbf55d9e80ffa2751f8ee09be207d12be565aa", 0x6, 0x0, 0x1, 0x2, 0xff, 0x6, 0x2, 0x1, [0x9, 0x0, 0x6, 0x7fff, 0x367, 0x40, 0x5, 0x3d, 0x4, 0x80000001, 0x542a6a07, 0x871, 0x200, 0xd5, 0x6, 0x8, 0x8001, 0x2, 0x8]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="674466983aa300"/16], 0x10) 08:26:07 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX=r3], 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x143380, 0x0) [ 938.365476] FAULT_INJECTION: forcing a failure. [ 938.365476] name failslab, interval 1, probability 0, space 0, times 0 [ 938.379577] FAULT_INJECTION: forcing a failure. [ 938.379577] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 938.391565] CPU: 1 PID: 19314 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 938.399442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.408805] Call Trace: [ 938.411398] dump_stack+0x1b2/0x281 08:26:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000180)={0x67446698, 0x0, 0x0, 0x4, 0x3, "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"/314}, 0x14a) 08:26:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000180)={0x67446698, 0x0, 0x0, 0x4, 0x3, "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"/314}, 0x14a) [ 938.415038] should_fail.cold+0x10a/0x149 [ 938.419194] __alloc_pages_nodemask+0x22c/0x2720 [ 938.423966] ? static_obj+0x50/0x50 [ 938.427594] ? trace_hardirqs_on+0x10/0x10 [ 938.431832] ? __lock_acquire+0x5fc/0x3f20 [ 938.436083] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 938.440939] ? __lock_acquire+0x5fc/0x3f20 [ 938.445175] ? simple_xattr_get+0xe5/0x160 [ 938.449417] ? fsnotify+0x974/0x11b0 [ 938.453132] ? shmem_setattr+0x241/0xbf0 [ 938.457203] ? __fsnotify_inode_delete+0x20/0x20 [ 938.461965] cache_grow_begin+0x91/0x700 08:26:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000180)={0x67446698, 0x0, 0x0, 0x4, 0x3, "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"/314}, 0x14a) [ 938.466040] ? fs_reclaim_release+0xd0/0x110 [ 938.470450] ? check_preemption_disabled+0x35/0x240 [ 938.475469] cache_alloc_refill+0x273/0x350 [ 938.479801] kmem_cache_alloc+0x333/0x3c0 [ 938.483954] getname_flags+0xc8/0x550 [ 938.487749] do_sys_open+0x1ce/0x410 [ 938.491463] ? filp_open+0x60/0x60 [ 938.495009] ? do_syscall_64+0x4c/0x640 [ 938.498976] ? SyS_open+0x30/0x30 [ 938.502426] do_syscall_64+0x1d5/0x640 [ 938.506311] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 938.511497] RIP: 0033:0x7f551cff9004 [ 938.515195] RSP: 002b:00007f551b9baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 938.522895] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551cff9004 [ 938.530263] RDX: 0000000000000002 RSI: 00007f551b9bafe0 RDI: 00000000ffffff9c [ 938.537529] RBP: 00007f551b9bafe0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 938.544791] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 938.552059] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 938.559337] CPU: 0 PID: 19311 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 938.567222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.576573] Call Trace: [ 938.579161] dump_stack+0x1b2/0x281 [ 938.582793] should_fail.cold+0x10a/0x149 [ 938.586948] should_failslab+0xd6/0x130 [ 938.590925] kmem_cache_alloc_trace+0x29a/0x3d0 [ 938.595599] apparmor_file_alloc_security+0x129/0x800 [ 938.600792] security_file_alloc+0x66/0xa0 [ 938.605029] ? selinux_is_enabled+0x5/0x50 [ 938.609264] get_empty_filp+0x16b/0x3f0 [ 938.613243] alloc_file+0x23/0x440 [ 938.616784] __shmem_file_setup.part.0+0x198/0x3c0 [ 938.621717] ? shmem_create+0x30/0x30 [ 938.625516] ? __alloc_fd+0x1be/0x490 [ 938.629328] SyS_memfd_create+0x1fc/0x3c0 [ 938.633474] ? shmem_fcntl+0x120/0x120 [ 938.637360] ? __do_page_fault+0x159/0xad0 [ 938.641594] ? do_syscall_64+0x4c/0x640 [ 938.645564] ? shmem_fcntl+0x120/0x120 [ 938.649450] do_syscall_64+0x1d5/0x640 [ 938.653348] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 938.658537] RIP: 0033:0x7f100538a0e9 08:26:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 6) 08:26:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="67cfa69800000000000000000000000097abe5b4dfeb3f4eb11e182369a50c7e6f64a97825eea72fd6e8e234dee9f75f810dfc9a9b7a20e083092a0fdcb1ff1f943c99aff2fb80eedb77c89f95a955c8196c13f69782d52eb0c4ca002a228bb9b738dbe931a44c31b02048ad75c9e301ef8994b1f3d6ac94f6a5bb0e9f2c5eba31ede03c08d9ec22778599dcb34acf98519863a1c549b35fe572d181899e34880111b3005bb1d6f1a2ad07af276fe2f782baea9fb3114e7b626edfee54cb05d049234bb5f3dc481a58eb89484de53e857c4fd913b7560945b96213f8b1662c7ef88e56c103c986246900000000000000"], 0x10) 08:26:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:08 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX=r3], 0x10) (async, rerun: 64) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x143380, 0x0) (rerun: 64) [ 938.662248] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 938.667684] XFS (loop4): unknown mount option [logbsize=]. [ 938.669961] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538a0e9 [ 938.682927] RDX: 00007f1003cfefe0 RSI: 0000000000000000 RDI: 00007f10053e31ee [ 938.690202] RBP: 0000000000000000 R08: 00007f1003cfefd8 R09: 00007f1003cff1d0 [ 938.697487] R10: 00007f1003cfefdc R11: 0000000000000246 R12: 0000000020000140 [ 938.704760] R13: 00000000200001c0 R14: 0000000000000000 R15: 0000000020000280 08:26:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 8) 08:26:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 08:26:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) (async) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="67cfa69800000000000000000000000097abe5b4dfeb3f4eb11e182369a50c7e6f64a97825eea72fd6e8e234dee9f75f810dfc9a9b7a20e083092a0fdcb1ff1f943c99aff2fb80eedb77c89f95a955c8196c13f69782d52eb0c4ca002a228bb9b738dbe931a44c31b02048ad75c9e301ef8994b1f3d6ac94f6a5bb0e9f2c5eba31ede03c08d9ec22778599dcb34acf98519863a1c549b35fe572d181899e34880111b3005bb1d6f1a2ad07af276fe2f782baea9fb3114e7b626edfee54cb05d049234bb5f3dc481a58eb89484de53e857c4fd913b7560945b96213f8b1662c7ef88e56c103c986246900000000000000"], 0x10) [ 938.819573] FAULT_INJECTION: forcing a failure. [ 938.819573] name failslab, interval 1, probability 0, space 0, times 0 08:26:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={r0}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100), r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000002800)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r3, @ANYRES32=r4, @ANYRESDEC=0x0, @ANYBLOB="fcb61bfc7b3f411906cf4378cd5e8c45723a389c2de99477882bf1d8f5eabdcd6c1a751b36c21f3b63883719b2caddf96bcb7dfbc1c9f8dd850cb2f981d6c01d5085e5d88bfc75f9eefcdaaee7da69801e004cbb1b2be0d1f88836af073457646941e74a47d4a74b1afe8f680f12a139d2c7d43f982d68f90b27e7c959a3a33d016678d57d950d8153fd85dae00858801ae134caf661e17beddd7886b4b126662eab307c46e15be93c3508f7a4337622eeb032499c48ae250a835592b29b2cfb7431d18e83a69c5f4bdc9488daa56618afbd6966adc6ceaf15658d40", @ANYRES16=r0, @ANYBLOB="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", @ANYRESOCT=r5, @ANYRES32=r4, @ANYRESDEC=r1, @ANYRESHEX=r2], 0x24}, 0x1, 0x0, 0x0, 0x891}, 0x20000004) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) [ 938.864444] CPU: 0 PID: 19348 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 938.872351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.881705] Call Trace: [ 938.884393] dump_stack+0x1b2/0x281 [ 938.888026] should_fail.cold+0x10a/0x149 [ 938.888680] FAULT_INJECTION: forcing a failure. [ 938.888680] name failslab, interval 1, probability 0, space 0, times 0 [ 938.892176] should_failslab+0xd6/0x130 [ 938.892191] kmem_cache_alloc+0x28e/0x3c0 [ 938.892203] getname_flags+0xc8/0x550 [ 938.892214] do_sys_open+0x1ce/0x410 [ 938.892224] ? filp_open+0x60/0x60 [ 938.892235] ? do_syscall_64+0x4c/0x640 [ 938.892242] ? SyS_open+0x30/0x30 [ 938.892251] do_syscall_64+0x1d5/0x640 [ 938.892265] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 938.892284] RIP: 0033:0x7f100533d004 [ 938.942706] RSP: 002b:00007f1003cfeeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 938.950413] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f100533d004 [ 938.957681] RDX: 0000000000000002 RSI: 00007f1003cfefe0 RDI: 00000000ffffff9c 08:26:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={r0}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100), r1) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000002800)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r3, @ANYRES32=r4, @ANYRESDEC=0x0, @ANYBLOB="fcb61bfc7b3f411906cf4378cd5e8c45723a389c2de99477882bf1d8f5eabdcd6c1a751b36c21f3b63883719b2caddf96bcb7dfbc1c9f8dd850cb2f981d6c01d5085e5d88bfc75f9eefcdaaee7da69801e004cbb1b2be0d1f88836af073457646941e74a47d4a74b1afe8f680f12a139d2c7d43f982d68f90b27e7c959a3a33d016678d57d950d8153fd85dae00858801ae134caf661e17beddd7886b4b126662eab307c46e15be93c3508f7a4337622eeb032499c48ae250a835592b29b2cfb7431d18e83a69c5f4bdc9488daa56618afbd6966adc6ceaf15658d40", @ANYRES16=r0, @ANYBLOB="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", @ANYRESOCT=r5, @ANYRES32=r4, @ANYRESDEC=r1, @ANYRESHEX=r2], 0x24}, 0x1, 0x0, 0x0, 0x891}, 0x20000004) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) 08:26:08 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX=r3], 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x143380, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) socket$kcm(0x29, 0x5, 0x0) (async) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r2}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r4, &(0x7f0000000040)=ANY=[@ANYRESHEX=r3], 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x143380, 0x0) (async) 08:26:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) (async) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="67cfa69800000000000000000000000097abe5b4dfeb3f4eb11e182369a50c7e6f64a97825eea72fd6e8e234dee9f75f810dfc9a9b7a20e083092a0fdcb1ff1f943c99aff2fb80eedb77c89f95a955c8196c13f69782d52eb0c4ca002a228bb9b738dbe931a44c31b02048ad75c9e301ef8994b1f3d6ac94f6a5bb0e9f2c5eba31ede03c08d9ec22778599dcb34acf98519863a1c549b35fe572d181899e34880111b3005bb1d6f1a2ad07af276fe2f782baea9fb3114e7b626edfee54cb05d049234bb5f3dc481a58eb89484de53e857c4fd913b7560945b96213f8b1662c7ef88e56c103c986246900000000000000"], 0x10) 08:26:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) (async) [ 938.965117] RBP: 00007f1003cfefe0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 938.972378] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 938.979648] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 939.014819] CPU: 1 PID: 19358 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 939.022723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.032076] Call Trace: [ 939.034669] dump_stack+0x1b2/0x281 [ 939.038298] should_fail.cold+0x10a/0x149 [ 939.042447] should_failslab+0xd6/0x130 [ 939.046421] kmem_cache_alloc+0x28e/0x3c0 [ 939.050562] get_empty_filp+0x86/0x3f0 [ 939.054447] path_openat+0x84/0x2970 [ 939.058160] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 939.063090] ? path_lookupat+0x780/0x780 [ 939.067149] ? trace_hardirqs_on+0x10/0x10 [ 939.071381] ? fsnotify+0x974/0x11b0 [ 939.075096] ? shmem_setattr+0x241/0xbf0 [ 939.079200] do_filp_open+0x179/0x3c0 [ 939.082998] ? may_open_dev+0xe0/0xe0 [ 939.086798] ? __alloc_fd+0x1be/0x490 [ 939.090619] ? lock_downgrade+0x740/0x740 [ 939.094781] ? do_raw_spin_unlock+0x164/0x220 [ 939.099280] ? _raw_spin_unlock+0x29/0x40 [ 939.103429] ? __alloc_fd+0x1be/0x490 [ 939.107239] do_sys_open+0x296/0x410 [ 939.110958] ? filp_open+0x60/0x60 [ 939.114504] ? do_syscall_64+0x4c/0x640 [ 939.118479] ? SyS_open+0x30/0x30 [ 939.121935] do_syscall_64+0x1d5/0x640 [ 939.125829] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 939.131028] RIP: 0033:0x7f551cff9004 [ 939.134731] RSP: 002b:00007f551b9baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 939.142442] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551cff9004 [ 939.149706] RDX: 0000000000000002 RSI: 00007f551b9bafe0 RDI: 00000000ffffff9c [ 939.156799] FAULT_INJECTION: forcing a failure. 08:26:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 7) 08:26:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x208040, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r2}) write$sequencer(r1, &(0x7f00000000c0)=[@l={0x92, 0x2, 0xd0, 0x11, 0x24, 0x3, 0x6}], 0x8) [ 939.156799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 939.156974] RBP: 00007f551b9bafe0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 939.176018] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 939.183273] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 939.190540] CPU: 0 PID: 19393 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 939.198416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.207771] Call Trace: [ 939.210361] dump_stack+0x1b2/0x281 [ 939.213999] should_fail.cold+0x10a/0x149 [ 939.218156] __alloc_pages_nodemask+0x22c/0x2720 [ 939.222913] ? static_obj+0x50/0x50 [ 939.226543] ? trace_hardirqs_on+0x10/0x10 [ 939.230782] ? __lock_acquire+0x5fc/0x3f20 [ 939.235027] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 939.239868] ? __lock_acquire+0x5fc/0x3f20 [ 939.244104] ? simple_xattr_get+0xe5/0x160 [ 939.248343] ? fsnotify+0x974/0x11b0 [ 939.252057] ? shmem_setattr+0x241/0xbf0 [ 939.256121] ? __fsnotify_inode_delete+0x20/0x20 [ 939.260880] cache_grow_begin+0x91/0x700 08:26:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x884) setns(0xffffffffffffffff, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) syz_open_dev$rtc(&(0x7f0000000080), 0xa, 0x20100) 08:26:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={r0}) (async, rerun: 32) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 32) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100), r1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 64) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000002800)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r3, @ANYRES32=r4, @ANYRESDEC=0x0, @ANYBLOB="fcb61bfc7b3f411906cf4378cd5e8c45723a389c2de99477882bf1d8f5eabdcd6c1a751b36c21f3b63883719b2caddf96bcb7dfbc1c9f8dd850cb2f981d6c01d5085e5d88bfc75f9eefcdaaee7da69801e004cbb1b2be0d1f88836af073457646941e74a47d4a74b1afe8f680f12a139d2c7d43f982d68f90b27e7c959a3a33d016678d57d950d8153fd85dae00858801ae134caf661e17beddd7886b4b126662eab307c46e15be93c3508f7a4337622eeb032499c48ae250a835592b29b2cfb7431d18e83a69c5f4bdc9488daa56618afbd6966adc6ceaf15658d40", @ANYRES16=r0, @ANYBLOB="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", @ANYRESOCT=r5, @ANYRES32=r4, @ANYRESDEC=r1, @ANYRESHEX=r2], 0x24}, 0x1, 0x0, 0x0, 0x891}, 0x20000004) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) [ 939.264941] ? fs_reclaim_release+0xd0/0x110 [ 939.269352] ? check_preemption_disabled+0x35/0x240 [ 939.274373] cache_alloc_refill+0x273/0x350 [ 939.278708] kmem_cache_alloc+0x333/0x3c0 [ 939.282861] getname_flags+0xc8/0x550 [ 939.286665] do_sys_open+0x1ce/0x410 [ 939.290388] ? filp_open+0x60/0x60 [ 939.293931] ? do_syscall_64+0x4c/0x640 [ 939.297940] ? SyS_open+0x30/0x30 [ 939.301390] do_syscall_64+0x1d5/0x640 [ 939.305369] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 939.310550] RIP: 0033:0x7f100533d004 08:26:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 9) 08:26:08 executing program 3: ioctl$SNDCTL_SEQ_GETOUTCOUNT(0xffffffffffffffff, 0x80045104, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) socket$netlink(0x10, 0x3, 0x12) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x1a) 08:26:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x208040, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r2}) (async) write$sequencer(r1, &(0x7f00000000c0)=[@l={0x92, 0x2, 0xd0, 0x11, 0x24, 0x3, 0x6}], 0x8) [ 939.314258] RSP: 002b:00007f1003cfeeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 939.321963] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f100533d004 [ 939.329232] RDX: 0000000000000002 RSI: 00007f1003cfefe0 RDI: 00000000ffffff9c [ 939.336501] RBP: 00007f1003cfefe0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 939.343860] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 939.351125] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x884) setns(0xffffffffffffffff, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) syz_open_dev$rtc(&(0x7f0000000080), 0xa, 0x20100) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x884) (async) setns(0xffffffffffffffff, 0x20000000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (async) syz_open_dev$rtc(&(0x7f0000000080), 0xa, 0x20100) (async) 08:26:08 executing program 3: ioctl$SNDCTL_SEQ_GETOUTCOUNT(0xffffffffffffffff, 0x80045104, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) socket$netlink(0x10, 0x3, 0x12) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x1a) [ 939.441201] FAULT_INJECTION: forcing a failure. [ 939.441201] name failslab, interval 1, probability 0, space 0, times 0 [ 939.489432] CPU: 0 PID: 19416 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 939.497339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.506701] Call Trace: [ 939.509295] dump_stack+0x1b2/0x281 [ 939.512939] should_fail.cold+0x10a/0x149 [ 939.517106] should_failslab+0xd6/0x130 [ 939.521084] kmem_cache_alloc_trace+0x29a/0x3d0 [ 939.525765] apparmor_file_alloc_security+0x129/0x800 [ 939.530960] security_file_alloc+0x66/0xa0 [ 939.535205] ? selinux_is_enabled+0x5/0x50 08:26:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'veth0\x00', 0x600}) [ 939.539442] get_empty_filp+0x16b/0x3f0 [ 939.543414] path_openat+0x84/0x2970 [ 939.547134] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 939.551984] ? path_lookupat+0x780/0x780 [ 939.556044] ? trace_hardirqs_on+0x10/0x10 [ 939.560275] ? fsnotify+0x974/0x11b0 [ 939.563990] ? shmem_setattr+0x241/0xbf0 [ 939.568058] do_filp_open+0x179/0x3c0 [ 939.571862] ? may_open_dev+0xe0/0xe0 [ 939.575664] ? __alloc_fd+0x1be/0x490 [ 939.579471] ? lock_downgrade+0x740/0x740 [ 939.583623] ? do_raw_spin_unlock+0x164/0x220 08:26:08 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'veth0\x00', 0x600}) [ 939.588116] ? _raw_spin_unlock+0x29/0x40 [ 939.592264] ? __alloc_fd+0x1be/0x490 [ 939.596073] do_sys_open+0x296/0x410 [ 939.599966] ? filp_open+0x60/0x60 [ 939.603512] ? do_syscall_64+0x4c/0x640 [ 939.607495] ? SyS_open+0x30/0x30 [ 939.610953] do_syscall_64+0x1d5/0x640 [ 939.614845] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 939.620038] RIP: 0033:0x7f551cff9004 [ 939.623745] RSP: 002b:00007f551b9baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 939.631452] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551cff9004 08:26:08 executing program 3: ioctl$SNDCTL_SEQ_GETOUTCOUNT(0xffffffffffffffff, 0x80045104, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) socket$netlink(0x10, 0x3, 0x12) (async) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x1a) [ 939.638720] RDX: 0000000000000002 RSI: 00007f551b9bafe0 RDI: 00000000ffffff9c [ 939.645991] RBP: 00007f551b9bafe0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 939.653266] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 939.660534] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 8) 08:26:09 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x208040, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r2}) (async) write$sequencer(r1, &(0x7f00000000c0)=[@l={0x92, 0x2, 0xd0, 0x11, 0x24, 0x3, 0x6}], 0x8) 08:26:09 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x884) (async) setns(0xffffffffffffffff, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (async, rerun: 64) syz_open_dev$rtc(&(0x7f0000000080), 0xa, 0x20100) 08:26:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 10) 08:26:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'veth0\x00', 0x600}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) write$nbd(r0, 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'veth0\x00', 0x600}) (async) [ 939.702291] XFS (loop0): unknown mount option [logbsize=]. 08:26:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "52407b0ed34b536ad06198505b61ff21f80a578da592a397fd"}, 0x29) 08:26:09 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) [ 939.828755] FAULT_INJECTION: forcing a failure. [ 939.828755] name failslab, interval 1, probability 0, space 0, times 0 [ 939.844374] FAULT_INJECTION: forcing a failure. [ 939.844374] name failslab, interval 1, probability 0, space 0, times 0 [ 939.869333] CPU: 1 PID: 19460 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 939.877241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.886600] Call Trace: [ 939.889187] dump_stack+0x1b2/0x281 [ 939.892816] should_fail.cold+0x10a/0x149 [ 939.896968] should_failslab+0xd6/0x130 [ 939.900950] kmem_cache_alloc_trace+0x29a/0x3d0 [ 939.905623] ? loop_get_status64+0x100/0x100 [ 939.910030] __kthread_create_on_node+0xbe/0x3a0 [ 939.914786] ? kthread_park+0x130/0x130 [ 939.918770] ? loop_get_status64+0x100/0x100 [ 939.923180] kthread_create_on_node+0xa8/0xd0 [ 939.927681] ? __kthread_create_on_node+0x3a0/0x3a0 [ 939.932701] ? __lockdep_init_map+0x100/0x560 [ 939.937202] ? __lockdep_init_map+0x100/0x560 [ 939.941706] lo_ioctl+0xcd9/0x1cd0 [ 939.945255] ? loop_set_status64+0xe0/0xe0 [ 939.949487] blkdev_ioctl+0x540/0x1830 [ 939.953370] ? blkpg_ioctl+0x8d0/0x8d0 [ 939.957255] ? trace_hardirqs_on+0x10/0x10 [ 939.961503] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 939.966613] ? debug_check_no_obj_freed+0x2c0/0x680 [ 939.971637] block_ioctl+0xd9/0x120 [ 939.975270] ? blkdev_fallocate+0x3a0/0x3a0 [ 939.979684] do_vfs_ioctl+0x75a/0xff0 [ 939.983485] ? lock_acquire+0x170/0x3f0 [ 939.987459] ? ioctl_preallocate+0x1a0/0x1a0 [ 939.991866] ? __fget+0x265/0x3e0 [ 939.995323] ? do_vfs_ioctl+0xff0/0xff0 [ 939.999303] ? security_file_ioctl+0x83/0xb0 [ 940.003710] SyS_ioctl+0x7f/0xb0 [ 940.007074] ? do_vfs_ioctl+0xff0/0xff0 [ 940.011052] do_syscall_64+0x1d5/0x640 [ 940.014943] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 940.020125] RIP: 0033:0x7f551d045ea7 08:26:09 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) 08:26:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "52407b0ed34b536ad06198505b61ff21f80a578da592a397fd"}, 0x29) [ 940.023829] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.031534] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 940.038799] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 940.046072] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 940.053341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 940.060792] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 940.080366] CPU: 1 PID: 19463 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 940.088274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.097625] Call Trace: [ 940.100224] dump_stack+0x1b2/0x281 [ 940.103860] should_fail.cold+0x10a/0x149 [ 940.108017] should_failslab+0xd6/0x130 [ 940.111996] kmem_cache_alloc+0x28e/0x3c0 [ 940.116157] get_empty_filp+0x86/0x3f0 [ 940.120048] path_openat+0x84/0x2970 [ 940.123772] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 940.128658] ? path_lookupat+0x780/0x780 [ 940.132724] ? trace_hardirqs_on+0x10/0x10 [ 940.136965] ? fsnotify+0x974/0x11b0 [ 940.140685] ? shmem_setattr+0x241/0xbf0 [ 940.144752] do_filp_open+0x179/0x3c0 [ 940.148552] ? may_open_dev+0xe0/0xe0 [ 940.152356] ? __alloc_fd+0x1be/0x490 [ 940.156164] ? lock_downgrade+0x740/0x740 [ 940.160310] ? do_raw_spin_unlock+0x164/0x220 [ 940.164806] ? _raw_spin_unlock+0x29/0x40 [ 940.168973] ? __alloc_fd+0x1be/0x490 [ 940.172782] do_sys_open+0x296/0x410 [ 940.176582] ? filp_open+0x60/0x60 [ 940.180122] ? do_syscall_64+0x4c/0x640 [ 940.184108] ? SyS_open+0x30/0x30 [ 940.187569] do_syscall_64+0x1d5/0x640 [ 940.191469] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 940.196658] RIP: 0033:0x7f100533d004 [ 940.200364] RSP: 002b:00007f1003cfeeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 940.208079] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f100533d004 [ 940.215350] RDX: 0000000000000002 RSI: 00007f1003cfefe0 RDI: 00000000ffffff9c [ 940.222619] RBP: 00007f1003cfefe0 R08: 0000000000000000 R09: 00007f1003cff1d0 08:26:09 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000040)={"23641f18195c0fbe71366d17369fdb8ee1b3d94e6927465009576681ef7a", 0x5, 0x7, 0x4, [0x7ff, 0x7fff, 0xffffffff, 0x3, 0x2, 0x8, 0x10000, 0x2, 0xad3b, 0x800, 0x6, 0x3, 0x4, 0x1, 0x2, 0x4, 0x10000, 0x4]}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNDCTL_SEQ_RESET(r1, 0x5100) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x0, 0x9]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008004}, 0x0) 08:26:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x30040, 0x0) write$nbd(r1, 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) 08:26:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "52407b0ed34b536ad06198505b61ff21f80a578da592a397fd"}, 0x29) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "52407b0ed34b536ad06198505b61ff21f80a578da592a397fd"}, 0x29) (async) [ 940.229900] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 940.237175] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 9) 08:26:09 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:09 executing program 3: connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@unspec, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x30040, 0x0) write$nbd(r1, 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) 08:26:09 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000040)={"23641f18195c0fbe71366d17369fdb8ee1b3d94e6927465009576681ef7a", 0x5, 0x7, 0x4, [0x7ff, 0x7fff, 0xffffffff, 0x3, 0x2, 0x8, 0x10000, 0x2, 0xad3b, 0x800, 0x6, 0x3, 0x4, 0x1, 0x2, 0x4, 0x10000, 0x4]}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNDCTL_SEQ_RESET(r1, 0x5100) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x0, 0x9]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008004}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000040)={"23641f18195c0fbe71366d17369fdb8ee1b3d94e6927465009576681ef7a", 0x5, 0x7, 0x4, [0x7ff, 0x7fff, 0xffffffff, 0x3, 0x2, 0x8, 0x10000, 0x2, 0xad3b, 0x800, 0x6, 0x3, 0x4, 0x1, 0x2, 0x4, 0x10000, 0x4]}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$SNDCTL_SEQ_RESET(r1, 0x5100) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x0, 0x9]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008004}, 0x0) (async) 08:26:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 11) 08:26:09 executing program 3: connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@unspec, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@unspec, 0xc) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 940.366446] FAULT_INJECTION: forcing a failure. [ 940.366446] name failslab, interval 1, probability 0, space 0, times 0 [ 940.412450] CPU: 1 PID: 19517 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 940.420356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.429712] Call Trace: [ 940.432306] dump_stack+0x1b2/0x281 [ 940.435942] should_fail.cold+0x10a/0x149 [ 940.440097] should_failslab+0xd6/0x130 [ 940.444077] kmem_cache_alloc_trace+0x29a/0x3d0 [ 940.448753] ? loop_get_status64+0x100/0x100 [ 940.453162] __kthread_create_on_node+0xbe/0x3a0 [ 940.457915] ? kthread_park+0x130/0x130 [ 940.461900] ? loop_get_status64+0x100/0x100 [ 940.466299] kthread_create_on_node+0xa8/0xd0 [ 940.470777] ? __kthread_create_on_node+0x3a0/0x3a0 [ 940.475785] ? __lockdep_init_map+0x100/0x560 [ 940.480269] ? __lockdep_init_map+0x100/0x560 [ 940.484756] lo_ioctl+0xcd9/0x1cd0 [ 940.488283] ? loop_set_status64+0xe0/0xe0 [ 940.492500] blkdev_ioctl+0x540/0x1830 [ 940.496454] ? blkpg_ioctl+0x8d0/0x8d0 [ 940.500414] ? trace_hardirqs_on+0x10/0x10 [ 940.504631] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 940.509715] ? debug_check_no_obj_freed+0x2c0/0x680 [ 940.514720] block_ioctl+0xd9/0x120 [ 940.518328] ? blkdev_fallocate+0x3a0/0x3a0 [ 940.522633] do_vfs_ioctl+0x75a/0xff0 [ 940.526412] ? lock_acquire+0x170/0x3f0 [ 940.530362] ? ioctl_preallocate+0x1a0/0x1a0 [ 940.534748] ? __fget+0x265/0x3e0 [ 940.538178] ? do_vfs_ioctl+0xff0/0xff0 [ 940.542138] ? security_file_ioctl+0x83/0xb0 [ 940.546530] SyS_ioctl+0x7f/0xb0 [ 940.549875] ? do_vfs_ioctl+0xff0/0xff0 [ 940.553829] do_syscall_64+0x1d5/0x640 [ 940.557727] entry_SYSCALL_64_after_hwframe+0x46/0xbb 08:26:09 executing program 5: ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:09 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000040)={"23641f18195c0fbe71366d17369fdb8ee1b3d94e6927465009576681ef7a", 0x5, 0x7, 0x4, [0x7ff, 0x7fff, 0xffffffff, 0x3, 0x2, 0x8, 0x10000, 0x2, 0xad3b, 0x800, 0x6, 0x3, 0x4, 0x1, 0x2, 0x4, 0x10000, 0x4]}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNDCTL_SEQ_RESET(r1, 0x5100) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x0, 0x9]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_SECRETLEN={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20008004}, 0x0) 08:26:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x30040, 0x0) write$nbd(r1, 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) 08:26:09 executing program 3: connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@unspec, 0xc) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) [ 940.562896] RIP: 0033:0x7f1005389ea7 [ 940.566582] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.574384] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 940.581632] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 940.588880] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 940.596128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 940.603379] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:10 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) syz_mount_image$befs(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x22, 0x1, &(0x7f0000000300)=[{&(0x7f00000000c0)='\x00', 0x1, 0x100000000000}], 0x441, &(0x7f0000000080)={[], [{@appraise_type}]}) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x1, 0x4) [ 940.676822] FAULT_INJECTION: forcing a failure. [ 940.676822] name failslab, interval 1, probability 0, space 0, times 0 08:26:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 10) 08:26:10 executing program 5: ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5cf}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @broadcast}}]}, 0x30}}, 0x4000010) [ 940.734198] befs: Unrecognized mount option "appraise_type=imasig" or missing value [ 940.735934] CPU: 0 PID: 19541 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 940.746346] befs: (loop2): cannot parse mount options [ 940.749977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.749982] Call Trace: [ 940.749999] dump_stack+0x1b2/0x281 [ 940.750014] should_fail.cold+0x10a/0x149 [ 940.774939] should_failslab+0xd6/0x130 [ 940.778914] kmem_cache_alloc+0x28e/0x3c0 08:26:10 executing program 5: ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) [ 940.783074] __kernfs_new_node+0x6f/0x470 [ 940.787245] kernfs_create_dir_ns+0x8c/0x200 [ 940.791654] internal_create_group+0xe9/0x710 [ 940.796150] lo_ioctl+0x1137/0x1cd0 [ 940.799785] ? loop_set_status64+0xe0/0xe0 [ 940.802569] FAULT_INJECTION: forcing a failure. [ 940.802569] name failslab, interval 1, probability 0, space 0, times 0 [ 940.804017] blkdev_ioctl+0x540/0x1830 [ 940.804028] ? blkpg_ioctl+0x8d0/0x8d0 [ 940.804039] ? trace_hardirqs_on+0x10/0x10 [ 940.804055] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 940.832307] ? debug_check_no_obj_freed+0x2c0/0x680 [ 940.837326] block_ioctl+0xd9/0x120 [ 940.840952] ? blkdev_fallocate+0x3a0/0x3a0 [ 940.845270] do_vfs_ioctl+0x75a/0xff0 [ 940.849063] ? lock_acquire+0x170/0x3f0 [ 940.853022] ? ioctl_preallocate+0x1a0/0x1a0 [ 940.857417] ? __fget+0x265/0x3e0 [ 940.860889] ? do_vfs_ioctl+0xff0/0xff0 [ 940.864864] ? security_file_ioctl+0x83/0xb0 [ 940.869277] SyS_ioctl+0x7f/0xb0 [ 940.872640] ? do_vfs_ioctl+0xff0/0xff0 [ 940.876601] do_syscall_64+0x1d5/0x640 [ 940.880478] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 940.885650] RIP: 0033:0x7f551d045ea7 [ 940.889440] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.897136] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 940.904408] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 940.911660] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 940.918913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 940.926175] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 940.933441] CPU: 1 PID: 19558 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 940.941325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.950677] Call Trace: [ 940.953263] dump_stack+0x1b2/0x281 [ 940.956918] should_fail.cold+0x10a/0x149 [ 940.961070] should_failslab+0xd6/0x130 [ 940.965050] kmem_cache_alloc_trace+0x29a/0x3d0 [ 940.969723] ? loop_get_status64+0x100/0x100 [ 940.974130] __kthread_create_on_node+0xbe/0x3a0 [ 940.978925] ? kthread_park+0x130/0x130 [ 940.982913] ? loop_get_status64+0x100/0x100 [ 940.987320] kthread_create_on_node+0xa8/0xd0 [ 940.991816] ? __kthread_create_on_node+0x3a0/0x3a0 [ 940.996837] ? __lockdep_init_map+0x100/0x560 [ 941.001336] ? __lockdep_init_map+0x100/0x560 [ 941.005853] lo_ioctl+0xcd9/0x1cd0 [ 941.009396] ? loop_set_status64+0xe0/0xe0 [ 941.013632] blkdev_ioctl+0x540/0x1830 [ 941.017521] ? blkpg_ioctl+0x8d0/0x8d0 [ 941.021405] ? trace_hardirqs_on+0x10/0x10 [ 941.025641] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 941.030747] ? debug_check_no_obj_freed+0x2c0/0x680 [ 941.035769] block_ioctl+0xd9/0x120 [ 941.039394] ? blkdev_fallocate+0x3a0/0x3a0 [ 941.039428] XFS (loop4): unknown mount option [logbsize=]. [ 941.043709] do_vfs_ioctl+0x75a/0xff0 [ 941.043722] ? lock_acquire+0x170/0x3f0 [ 941.043733] ? ioctl_preallocate+0x1a0/0x1a0 [ 941.043744] ? __fget+0x265/0x3e0 [ 941.043753] ? do_vfs_ioctl+0xff0/0xff0 [ 941.043764] ? security_file_ioctl+0x83/0xb0 [ 941.043774] SyS_ioctl+0x7f/0xb0 [ 941.076859] ? do_vfs_ioctl+0xff0/0xff0 [ 941.080830] do_syscall_64+0x1d5/0x640 08:26:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5cf}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @broadcast}}]}, 0x30}}, 0x4000010) [ 941.085504] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 941.090696] RIP: 0033:0x7f1005389ea7 [ 941.094398] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 941.102103] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 941.109364] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 941.116625] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 941.123890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 941.131154] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 12) 08:26:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5cf}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @broadcast}}]}, 0x30}}, 0x4000010) 08:26:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6744669800001b000029a1ec59000000"], 0x10) 08:26:10 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = dup(r0) write$nbd(r1, 0x0, 0xffffffffffffffb8) 08:26:10 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) syz_mount_image$befs(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x22, 0x1, &(0x7f0000000300)=[{&(0x7f00000000c0)='\x00', 0x1, 0x100000000000}], 0x441, &(0x7f0000000080)={[], [{@appraise_type}]}) (async, rerun: 64) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x1, 0x4) (rerun: 64) 08:26:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 11) 08:26:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6744669800001b000029a1ec59000000"], 0x10) 08:26:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) 08:26:10 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 64) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = dup(r0) write$nbd(r1, 0x0, 0xffffffffffffffb8) [ 941.288968] FAULT_INJECTION: forcing a failure. [ 941.288968] name failslab, interval 1, probability 0, space 0, times 0 [ 941.312655] FAULT_INJECTION: forcing a failure. [ 941.312655] name failslab, interval 1, probability 0, space 0, times 0 [ 941.348533] CPU: 0 PID: 19605 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 941.356431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.365820] Call Trace: [ 941.368406] dump_stack+0x1b2/0x281 [ 941.372027] should_fail.cold+0x10a/0x149 [ 941.376186] should_failslab+0xd6/0x130 [ 941.380154] kmem_cache_alloc+0x28e/0x3c0 [ 941.384284] __kernfs_new_node+0x6f/0x470 [ 941.388413] kernfs_new_node+0x7b/0xe0 [ 941.392290] __kernfs_create_file+0x3d/0x320 [ 941.396678] sysfs_add_file_mode_ns+0x1e1/0x450 [ 941.401326] ? kernfs_create_dir_ns+0x171/0x200 [ 941.405976] internal_create_group+0x22b/0x710 [ 941.410545] lo_ioctl+0x1137/0x1cd0 [ 941.414158] ? loop_set_status64+0xe0/0xe0 [ 941.418375] blkdev_ioctl+0x540/0x1830 [ 941.422243] ? blkpg_ioctl+0x8d0/0x8d0 [ 941.426111] ? trace_hardirqs_on+0x10/0x10 [ 941.430331] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 941.435412] ? debug_check_no_obj_freed+0x2c0/0x680 [ 941.440412] block_ioctl+0xd9/0x120 [ 941.444020] ? blkdev_fallocate+0x3a0/0x3a0 [ 941.448323] do_vfs_ioctl+0x75a/0xff0 [ 941.452108] ? lock_acquire+0x170/0x3f0 [ 941.456065] ? ioctl_preallocate+0x1a0/0x1a0 [ 941.460456] ? __fget+0x265/0x3e0 [ 941.463889] ? do_vfs_ioctl+0xff0/0xff0 [ 941.467844] ? security_file_ioctl+0x83/0xb0 [ 941.472233] SyS_ioctl+0x7f/0xb0 [ 941.475579] ? do_vfs_ioctl+0xff0/0xff0 [ 941.479532] do_syscall_64+0x1d5/0x640 [ 941.483401] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 941.488571] RIP: 0033:0x7f551d045ea7 [ 941.492261] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 941.499960] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 941.507226] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 941.514483] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 941.521736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 941.528987] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 941.541849] CPU: 1 PID: 19600 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 941.549758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.559114] Call Trace: [ 941.561701] dump_stack+0x1b2/0x281 [ 941.565328] should_fail.cold+0x10a/0x149 [ 941.569480] should_failslab+0xd6/0x130 [ 941.573456] kmem_cache_alloc+0x28e/0x3c0 [ 941.577601] __kernfs_new_node+0x6f/0x470 [ 941.581746] kernfs_create_dir_ns+0x8c/0x200 [ 941.586152] internal_create_group+0xe9/0x710 [ 941.590650] lo_ioctl+0x1137/0x1cd0 [ 941.594277] ? loop_set_status64+0xe0/0xe0 08:26:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) 08:26:10 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6744669800001b000029a1ec59000000"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6744669800001b000029a1ec59000000"], 0x10) (async) [ 941.598508] blkdev_ioctl+0x540/0x1830 [ 941.602391] ? blkpg_ioctl+0x8d0/0x8d0 [ 941.606276] ? trace_hardirqs_on+0x10/0x10 [ 941.610512] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 941.615611] ? debug_check_no_obj_freed+0x2c0/0x680 [ 941.620629] block_ioctl+0xd9/0x120 [ 941.624252] ? blkdev_fallocate+0x3a0/0x3a0 [ 941.628563] do_vfs_ioctl+0x75a/0xff0 [ 941.632344] ? lock_acquire+0x170/0x3f0 [ 941.636298] ? ioctl_preallocate+0x1a0/0x1a0 [ 941.640685] ? __fget+0x265/0x3e0 [ 941.644116] ? do_vfs_ioctl+0xff0/0xff0 [ 941.648067] ? security_file_ioctl+0x83/0xb0 [ 941.652455] SyS_ioctl+0x7f/0xb0 [ 941.655799] ? do_vfs_ioctl+0xff0/0xff0 [ 941.659755] do_syscall_64+0x1d5/0x640 [ 941.663624] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 941.668789] RIP: 0033:0x7f1005389ea7 [ 941.672474] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 941.680199] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 941.687444] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:26:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = dup(r0) write$nbd(r1, 0x0, 0xffffffffffffffb8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) dup(r0) (async) write$nbd(r1, 0x0, 0xffffffffffffffb8) (async) [ 941.694810] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 941.702060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 941.709328] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 13) 08:26:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 12) [ 941.753530] XFS (loop4): unknown mount option [logbsize=]. [ 941.770721] XFS (loop0): unknown mount option [logbsize=]. 08:26:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) (async) 08:26:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 941.898819] FAULT_INJECTION: forcing a failure. [ 941.898819] name failslab, interval 1, probability 0, space 0, times 0 [ 941.910369] FAULT_INJECTION: forcing a failure. [ 941.910369] name failslab, interval 1, probability 0, space 0, times 0 [ 941.935829] CPU: 0 PID: 19644 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 941.943730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.953165] Call Trace: [ 941.955756] dump_stack+0x1b2/0x281 [ 941.959390] should_fail.cold+0x10a/0x149 [ 941.963894] should_failslab+0xd6/0x130 [ 941.967869] kmem_cache_alloc+0x28e/0x3c0 [ 941.972017] __kernfs_new_node+0x6f/0x470 [ 941.976165] kernfs_new_node+0x7b/0xe0 [ 941.980058] __kernfs_create_file+0x3d/0x320 [ 941.984465] sysfs_add_file_mode_ns+0x1e1/0x450 [ 941.989134] ? kernfs_create_dir_ns+0x171/0x200 [ 941.993802] internal_create_group+0x22b/0x710 [ 941.998392] lo_ioctl+0x1137/0x1cd0 [ 942.002021] ? loop_set_status64+0xe0/0xe0 [ 942.006256] blkdev_ioctl+0x540/0x1830 [ 942.010138] ? blkpg_ioctl+0x8d0/0x8d0 [ 942.014022] ? trace_hardirqs_on+0x10/0x10 [ 942.018260] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 942.023537] ? debug_check_no_obj_freed+0x2c0/0x680 [ 942.028553] block_ioctl+0xd9/0x120 [ 942.032179] ? blkdev_fallocate+0x3a0/0x3a0 [ 942.036501] do_vfs_ioctl+0x75a/0xff0 [ 942.040303] ? lock_acquire+0x170/0x3f0 [ 942.044276] ? ioctl_preallocate+0x1a0/0x1a0 [ 942.048686] ? __fget+0x265/0x3e0 [ 942.052137] ? do_vfs_ioctl+0xff0/0xff0 [ 942.056105] ? security_file_ioctl+0x83/0xb0 [ 942.060510] SyS_ioctl+0x7f/0xb0 [ 942.063872] ? do_vfs_ioctl+0xff0/0xff0 [ 942.067844] do_syscall_64+0x1d5/0x640 [ 942.071731] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 942.076916] RIP: 0033:0x7f1005389ea7 [ 942.080618] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 942.088327] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 942.095592] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 942.102861] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 942.110130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 942.117388] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 942.124662] CPU: 1 PID: 19651 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 942.132547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.139562] XFS (loop0): unknown mount option [logbsize=]. [ 942.141890] Call Trace: [ 942.141907] dump_stack+0x1b2/0x281 [ 942.141922] should_fail.cold+0x10a/0x149 [ 942.141934] should_failslab+0xd6/0x130 [ 942.141944] kmem_cache_alloc+0x28e/0x3c0 [ 942.141957] __kernfs_new_node+0x6f/0x470 [ 942.141969] kernfs_new_node+0x7b/0xe0 [ 942.141979] __kernfs_create_file+0x3d/0x320 [ 942.141989] sysfs_add_file_mode_ns+0x1e1/0x450 [ 942.142000] ? kernfs_create_dir_ns+0x171/0x200 [ 942.187692] internal_create_group+0x22b/0x710 [ 942.192367] lo_ioctl+0x1137/0x1cd0 [ 942.196000] ? loop_set_status64+0xe0/0xe0 [ 942.200239] blkdev_ioctl+0x540/0x1830 [ 942.204126] ? blkpg_ioctl+0x8d0/0x8d0 [ 942.208009] ? trace_hardirqs_on+0x10/0x10 [ 942.212230] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 942.217310] ? debug_check_no_obj_freed+0x2c0/0x680 [ 942.222323] block_ioctl+0xd9/0x120 [ 942.225943] ? blkdev_fallocate+0x3a0/0x3a0 [ 942.230248] do_vfs_ioctl+0x75a/0xff0 [ 942.234025] ? lock_acquire+0x170/0x3f0 [ 942.237976] ? ioctl_preallocate+0x1a0/0x1a0 [ 942.242363] ? __fget+0x265/0x3e0 [ 942.245796] ? do_vfs_ioctl+0xff0/0xff0 [ 942.249754] ? security_file_ioctl+0x83/0xb0 [ 942.254156] SyS_ioctl+0x7f/0xb0 [ 942.257505] ? do_vfs_ioctl+0xff0/0xff0 [ 942.261456] do_syscall_64+0x1d5/0x640 [ 942.265325] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 942.270493] RIP: 0033:0x7f551d045ea7 [ 942.274188] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 942.281875] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 942.289122] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:26:11 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) syz_mount_image$befs(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x22, 0x1, &(0x7f0000000300)=[{&(0x7f00000000c0)='\x00', 0x1, 0x100000000000}], 0x441, &(0x7f0000000080)={[], [{@appraise_type}]}) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x1, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) syz_mount_image$befs(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x22, 0x1, &(0x7f0000000300)=[{&(0x7f00000000c0)='\x00', 0x1, 0x100000000000}], 0x441, &(0x7f0000000080)={[], [{@appraise_type}]}) (async) setsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)=0x1, 0x4) (async) 08:26:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) select(0x40, &(0x7f00000003c0), &(0x7f0000000400)={0x4}, &(0x7f0000000440), 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 13) [ 942.296377] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 942.303625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 942.310873] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 942.322214] XFS (loop4): unknown mount option [logbsize=]. 08:26:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 14) 08:26:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:11 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) select(0x40, &(0x7f00000003c0), &(0x7f0000000400)={0x4}, &(0x7f0000000440), 0x0) (async, rerun: 32) write$nbd(r0, &(0x7f0000000100), 0x10) (rerun: 32) [ 942.455831] FAULT_INJECTION: forcing a failure. [ 942.455831] name failslab, interval 1, probability 0, space 0, times 0 [ 942.475328] CPU: 1 PID: 19685 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 942.483231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.492586] Call Trace: [ 942.495178] dump_stack+0x1b2/0x281 [ 942.498830] should_fail.cold+0x10a/0x149 08:26:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 942.502985] should_failslab+0xd6/0x130 [ 942.506967] kmem_cache_alloc+0x28e/0x3c0 [ 942.511126] __kernfs_new_node+0x6f/0x470 [ 942.515282] kernfs_new_node+0x7b/0xe0 [ 942.519169] __kernfs_create_file+0x3d/0x320 [ 942.523582] sysfs_add_file_mode_ns+0x1e1/0x450 [ 942.528259] ? kernfs_create_dir_ns+0x171/0x200 [ 942.533018] internal_create_group+0x22b/0x710 [ 942.537612] lo_ioctl+0x1137/0x1cd0 [ 942.541245] ? loop_set_status64+0xe0/0xe0 [ 942.545489] blkdev_ioctl+0x540/0x1830 [ 942.549379] ? blkpg_ioctl+0x8d0/0x8d0 [ 942.553271] ? trace_hardirqs_on+0x10/0x10 [ 942.557593] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 942.562693] ? debug_check_no_obj_freed+0x2c0/0x680 [ 942.567724] block_ioctl+0xd9/0x120 [ 942.571350] ? blkdev_fallocate+0x3a0/0x3a0 [ 942.575667] do_vfs_ioctl+0x75a/0xff0 [ 942.579467] ? lock_acquire+0x170/0x3f0 [ 942.583439] ? ioctl_preallocate+0x1a0/0x1a0 [ 942.587938] ? __fget+0x265/0x3e0 [ 942.591403] ? do_vfs_ioctl+0xff0/0xff0 [ 942.595377] ? security_file_ioctl+0x83/0xb0 [ 942.599782] SyS_ioctl+0x7f/0xb0 08:26:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 942.603142] ? do_vfs_ioctl+0xff0/0xff0 [ 942.607130] do_syscall_64+0x1d5/0x640 [ 942.611023] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 942.616208] RIP: 0033:0x7f551d045ea7 [ 942.619915] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 942.627620] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 942.634886] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 942.642155] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 942.649425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:26:12 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) [ 942.656694] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 942.685992] FAULT_INJECTION: forcing a failure. [ 942.685992] name failslab, interval 1, probability 0, space 0, times 0 08:26:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8, 0x1, r1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x801}, 0x10) [ 942.710599] CPU: 1 PID: 19692 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 942.718507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.727861] Call Trace: [ 942.730453] dump_stack+0x1b2/0x281 [ 942.734087] should_fail.cold+0x10a/0x149 [ 942.738245] should_failslab+0xd6/0x130 [ 942.742222] kmem_cache_alloc+0x28e/0x3c0 [ 942.746374] __kernfs_new_node+0x6f/0x470 [ 942.750530] kernfs_new_node+0x7b/0xe0 [ 942.754423] __kernfs_create_file+0x3d/0x320 [ 942.758838] sysfs_add_file_mode_ns+0x1e1/0x450 [ 942.763507] ? kernfs_create_dir_ns+0x171/0x200 [ 942.768177] internal_create_group+0x22b/0x710 [ 942.772758] lo_ioctl+0x1137/0x1cd0 [ 942.776371] ? loop_set_status64+0xe0/0xe0 [ 942.780593] blkdev_ioctl+0x540/0x1830 [ 942.784466] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 942.789234] ? blkpg_ioctl+0x8d0/0x8d0 [ 942.793109] ? check_preemption_disabled+0x35/0x240 [ 942.798109] ? retint_kernel+0x2d/0x2d [ 942.801981] block_ioctl+0xd9/0x120 [ 942.805588] ? blkdev_fallocate+0x3a0/0x3a0 [ 942.809890] do_vfs_ioctl+0x75a/0xff0 [ 942.813673] ? lock_acquire+0x170/0x3f0 [ 942.817629] ? ioctl_preallocate+0x1a0/0x1a0 [ 942.822021] ? __fget+0x265/0x3e0 [ 942.825466] ? do_vfs_ioctl+0xff0/0xff0 [ 942.829437] ? security_file_ioctl+0x83/0xb0 [ 942.833829] SyS_ioctl+0x7f/0xb0 [ 942.837176] ? do_vfs_ioctl+0xff0/0xff0 [ 942.841155] do_syscall_64+0x1d5/0x640 [ 942.845030] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 942.850201] RIP: 0033:0x7f1005389ea7 [ 942.853891] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:26:12 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) select(0x40, &(0x7f00000003c0), &(0x7f0000000400)={0x4}, &(0x7f0000000440), 0x0) (async) write$nbd(r0, &(0x7f0000000100), 0x10) [ 942.861581] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 942.868920] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 942.876172] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 942.883421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 942.890674] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) [ 942.962694] XFS (loop4): unknown mount option [logbsize=]. [ 942.972474] XFS (loop0): unknown mount option [logbsize=]. 08:26:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 14) 08:26:12 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x40800) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3968c66da892d37033bef0c1742ca98a348bd6dc10a3dd0d7f2deb8f65be5b0ad089e604927727345f642502ef3e9f74eba68bc04661eca7ef2703a7d4d6a007d206b1c2059385c9746bfc0e3d39be127adb881f4f923e11f450e47be3bb8cdaffba17f47f91a233a15e554b55847056a1318d1b22fc0ecd209b60767de3fdfc964dfea0130626eecde00f14f39ba2fe6db25660756242727dc4b810b581d3093058e0e79e18334ab290beab4696109d2584ec3963670cd99d7bb22282dacd0fd078b97790d4a96e47f14f4b8962191338449c", @ANYRES16=r1, @ANYBLOB="00032dbd7000fcdbdf250200000006001c00000100000c000f00070000000000000006001c0002000000050021000000000008001900ac1414aa05001200080000000c00160004000000000000000500070002000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x884d) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000100), 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) 08:26:12 executing program 1: ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) (async) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8, 0x1, r1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x801}, 0x10) 08:26:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 15) 08:26:12 executing program 1: ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:12 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x40800) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3968c66da892d37033bef0c1742ca98a348bd6dc10a3dd0d7f2deb8f65be5b0ad089e604927727345f642502ef3e9f74eba68bc04661eca7ef2703a7d4d6a007d206b1c2059385c9746bfc0e3d39be127adb881f4f923e11f450e47be3bb8cdaffba17f47f91a233a15e554b55847056a1318d1b22fc0ecd209b60767de3fdfc964dfea0130626eecde00f14f39ba2fe6db25660756242727dc4b810b581d3093058e0e79e18334ab290beab4696109d2584ec3963670cd99d7bb22282dacd0fd078b97790d4a96e47f14f4b8962191338449c", @ANYRES16=r1, @ANYBLOB="00032dbd7000fcdbdf250200000006001c00000100000c000f00070000000000000006001c0002000000050021000000000008001900ac1414aa05001200080000000c00160004000000000000000500070002000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x884d) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000100), 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x40800) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3968c66da892d37033bef0c1742ca98a348bd6dc10a3dd0d7f2deb8f65be5b0ad089e604927727345f642502ef3e9f74eba68bc04661eca7ef2703a7d4d6a007d206b1c2059385c9746bfc0e3d39be127adb881f4f923e11f450e47be3bb8cdaffba17f47f91a233a15e554b55847056a1318d1b22fc0ecd209b60767de3fdfc964dfea0130626eecde00f14f39ba2fe6db25660756242727dc4b810b581d3093058e0e79e18334ab290beab4696109d2584ec3963670cd99d7bb22282dacd0fd078b97790d4a96e47f14f4b8962191338449c", @ANYRES16=r1, @ANYBLOB="00032dbd7000fcdbdf250200000006001c00000100000c000f00070000000000000006001c0002000000050021000000000008001900ac1414aa05001200080000000c00160004000000000000000500070002000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x884d) (async) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x1) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) (async) write$nbd(r2, &(0x7f0000000100), 0x10) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) 08:26:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8, 0x1, r1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x801}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8, 0x1, r1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x801}, 0x10) (async) 08:26:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 943.161298] FAULT_INJECTION: forcing a failure. [ 943.161298] name failslab, interval 1, probability 0, space 0, times 0 [ 943.198177] CPU: 1 PID: 19756 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 943.202608] FAULT_INJECTION: forcing a failure. [ 943.202608] name failslab, interval 1, probability 0, space 0, times 0 [ 943.206088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.206093] Call Trace: [ 943.206110] dump_stack+0x1b2/0x281 [ 943.206126] should_fail.cold+0x10a/0x149 [ 943.206143] should_failslab+0xd6/0x130 [ 943.240946] kmem_cache_alloc+0x28e/0x3c0 [ 943.245100] __kernfs_new_node+0x6f/0x470 [ 943.249255] kernfs_new_node+0x7b/0xe0 [ 943.253143] __kernfs_create_file+0x3d/0x320 [ 943.257548] sysfs_add_file_mode_ns+0x1e1/0x450 [ 943.262209] ? kernfs_create_dir_ns+0x171/0x200 [ 943.266872] internal_create_group+0x22b/0x710 [ 943.271458] lo_ioctl+0x1137/0x1cd0 [ 943.275084] ? loop_set_status64+0xe0/0xe0 [ 943.279309] blkdev_ioctl+0x540/0x1830 [ 943.283192] ? blkpg_ioctl+0x8d0/0x8d0 [ 943.287076] ? trace_hardirqs_on+0x10/0x10 [ 943.291311] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 943.296415] ? debug_check_no_obj_freed+0x2c0/0x680 [ 943.301438] block_ioctl+0xd9/0x120 [ 943.305065] ? blkdev_fallocate+0x3a0/0x3a0 [ 943.309380] do_vfs_ioctl+0x75a/0xff0 [ 943.313165] ? lock_acquire+0x170/0x3f0 [ 943.317128] ? ioctl_preallocate+0x1a0/0x1a0 [ 943.321530] ? __fget+0x265/0x3e0 [ 943.324972] ? do_vfs_ioctl+0xff0/0xff0 [ 943.328933] ? security_file_ioctl+0x83/0xb0 [ 943.333326] SyS_ioctl+0x7f/0xb0 [ 943.336680] ? do_vfs_ioctl+0xff0/0xff0 [ 943.340637] do_syscall_64+0x1d5/0x640 [ 943.344513] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 943.349686] RIP: 0033:0x7f551d045ea7 [ 943.353379] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 943.361081] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 943.368337] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 943.375591] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 943.382847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 943.390102] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 943.397370] CPU: 0 PID: 19757 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 943.405255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.414609] Call Trace: [ 943.417197] dump_stack+0x1b2/0x281 [ 943.420827] should_fail.cold+0x10a/0x149 [ 943.425064] should_failslab+0xd6/0x130 [ 943.429048] kmem_cache_alloc+0x28e/0x3c0 [ 943.433202] __kernfs_new_node+0x6f/0x470 [ 943.437354] kernfs_new_node+0x7b/0xe0 [ 943.441241] __kernfs_create_file+0x3d/0x320 [ 943.446084] sysfs_add_file_mode_ns+0x1e1/0x450 [ 943.450755] ? kernfs_create_dir_ns+0x171/0x200 [ 943.455425] internal_create_group+0x22b/0x710 [ 943.457635] XFS (loop4): unknown mount option [logbsize=]. [ 943.460012] lo_ioctl+0x1137/0x1cd0 [ 943.460027] ? loop_set_status64+0xe0/0xe0 [ 943.460039] blkdev_ioctl+0x540/0x1830 [ 943.460050] ? blkpg_ioctl+0x8d0/0x8d0 [ 943.481241] ? trace_hardirqs_on+0x10/0x10 [ 943.485497] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 943.490603] ? debug_check_no_obj_freed+0x2c0/0x680 [ 943.495626] block_ioctl+0xd9/0x120 [ 943.499260] ? blkdev_fallocate+0x3a0/0x3a0 [ 943.503585] do_vfs_ioctl+0x75a/0xff0 [ 943.507386] ? lock_acquire+0x170/0x3f0 08:26:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 943.511359] ? ioctl_preallocate+0x1a0/0x1a0 [ 943.515768] ? __fget+0x265/0x3e0 [ 943.519223] ? do_vfs_ioctl+0xff0/0xff0 [ 943.523199] ? security_file_ioctl+0x83/0xb0 [ 943.527604] SyS_ioctl+0x7f/0xb0 [ 943.530968] ? do_vfs_ioctl+0xff0/0xff0 [ 943.534941] do_syscall_64+0x1d5/0x640 [ 943.538834] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 943.544017] RIP: 0033:0x7f1005389ea7 [ 943.547719] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 943.555431] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 08:26:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 943.562696] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 943.569961] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 943.577228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 943.584581] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 15) 08:26:12 executing program 1: ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:12 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x40800) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3968c66da892d37033bef0c1742ca98a348bd6dc10a3dd0d7f2deb8f65be5b0ad089e604927727345f642502ef3e9f74eba68bc04661eca7ef2703a7d4d6a007d206b1c2059385c9746bfc0e3d39be127adb881f4f923e11f450e47be3bb8cdaffba17f47f91a233a15e554b55847056a1318d1b22fc0ecd209b60767de3fdfc964dfea0130626eecde00f14f39ba2fe6db25660756242727dc4b810b581d3093058e0e79e18334ab290beab4696109d2584ec3963670cd99d7bb22282dacd0fd078b97790d4a96e47f14f4b8962191338449c", @ANYRES16=r1, @ANYBLOB="00032dbd7000fcdbdf250200000006001c00000100000c000f00070000000000000006001c0002000000050021000000000008001900ac1414aa05001200080000000c00160004000000000000000500070002000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x884d) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r2, &(0x7f0000000100), 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x40800) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3968c66da892d37033bef0c1742ca98a348bd6dc10a3dd0d7f2deb8f65be5b0ad089e604927727345f642502ef3e9f74eba68bc04661eca7ef2703a7d4d6a007d206b1c2059385c9746bfc0e3d39be127adb881f4f923e11f450e47be3bb8cdaffba17f47f91a233a15e554b55847056a1318d1b22fc0ecd209b60767de3fdfc964dfea0130626eecde00f14f39ba2fe6db25660756242727dc4b810b581d3093058e0e79e18334ab290beab4696109d2584ec3963670cd99d7bb22282dacd0fd078b97790d4a96e47f14f4b8962191338449c", @ANYRES16=r1, @ANYBLOB="00032dbd7000fcdbdf250200000006001c00000100000c000f00070000000000000006001c0002000000050021000000000008001900ac1414aa05001200080000000c00160004000000000000000500070002000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x884d) (async) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x1) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) (async) write$nbd(r2, &(0x7f0000000100), 0x10) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) 08:26:12 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x1407, 0x24b, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_NRMIDIS(r2, 0x8004510b, &(0x7f0000000100)) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6744669800000000000000000000000086e740d146b15047b43d543ca6600e06558a"], 0x10) 08:26:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 16) 08:26:12 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 943.626925] XFS (loop0): unknown mount option [logbsize=]. 08:26:13 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:13 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x1407, 0x24b, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_NRMIDIS(r2, 0x8004510b, &(0x7f0000000100)) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6744669800000000000000000000000086e740d146b15047b43d543ca6600e06558a"], 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x1407, 0x24b, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_NRMIDIS(r2, 0x8004510b, &(0x7f0000000100)) (async) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6744669800000000000000000000000086e740d146b15047b43d543ca6600e06558a"], 0x10) (async) 08:26:13 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) 08:26:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x4b, 0x4) write$nbd(r0, &(0x7f0000000100), 0x10) [ 943.790968] FAULT_INJECTION: forcing a failure. [ 943.790968] name failslab, interval 1, probability 0, space 0, times 0 [ 943.815298] CPU: 0 PID: 19832 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 943.818293] FAULT_INJECTION: forcing a failure. [ 943.818293] name failslab, interval 1, probability 0, space 0, times 0 [ 943.823193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.823211] Call Trace: [ 943.823230] dump_stack+0x1b2/0x281 [ 943.823246] should_fail.cold+0x10a/0x149 [ 943.823261] should_failslab+0xd6/0x130 [ 943.823273] kmem_cache_alloc+0x28e/0x3c0 [ 943.823286] __kernfs_new_node+0x6f/0x470 [ 943.823298] kernfs_new_node+0x7b/0xe0 [ 943.823308] __kernfs_create_file+0x3d/0x320 [ 943.823319] sysfs_add_file_mode_ns+0x1e1/0x450 [ 943.823328] ? kernfs_create_dir_ns+0x171/0x200 [ 943.823338] internal_create_group+0x22b/0x710 08:26:13 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) [ 943.823354] lo_ioctl+0x1137/0x1cd0 [ 943.892262] ? loop_set_status64+0xe0/0xe0 [ 943.896501] blkdev_ioctl+0x540/0x1830 [ 943.900400] ? blkpg_ioctl+0x8d0/0x8d0 [ 943.904282] ? trace_hardirqs_on+0x10/0x10 [ 943.908518] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 943.913624] ? debug_check_no_obj_freed+0x2c0/0x680 [ 943.918652] block_ioctl+0xd9/0x120 [ 943.922277] ? blkdev_fallocate+0x3a0/0x3a0 [ 943.926602] do_vfs_ioctl+0x75a/0xff0 [ 943.930400] ? lock_acquire+0x170/0x3f0 [ 943.934370] ? ioctl_preallocate+0x1a0/0x1a0 [ 943.938778] ? __fget+0x265/0x3e0 [ 943.942232] ? do_vfs_ioctl+0xff0/0xff0 [ 943.946200] ? security_file_ioctl+0x83/0xb0 [ 943.950611] SyS_ioctl+0x7f/0xb0 [ 943.953971] ? do_vfs_ioctl+0xff0/0xff0 [ 943.957942] do_syscall_64+0x1d5/0x640 [ 943.961831] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 943.967012] RIP: 0033:0x7f551d045ea7 [ 943.970732] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 943.978437] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 943.985701] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 943.992965] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 944.000315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 944.007585] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 944.028576] CPU: 1 PID: 19836 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 944.036473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.045824] Call Trace: [ 944.048420] dump_stack+0x1b2/0x281 [ 944.052064] should_fail.cold+0x10a/0x149 [ 944.056215] should_failslab+0xd6/0x130 [ 944.060194] kmem_cache_alloc+0x28e/0x3c0 [ 944.064436] __kernfs_new_node+0x6f/0x470 [ 944.068588] kernfs_new_node+0x7b/0xe0 [ 944.072476] __kernfs_create_file+0x3d/0x320 [ 944.076883] sysfs_add_file_mode_ns+0x1e1/0x450 [ 944.078852] XFS (loop4): unknown mount option [logbsize=]. [ 944.081547] ? kernfs_create_dir_ns+0x171/0x200 [ 944.081559] internal_create_group+0x22b/0x710 [ 944.081573] lo_ioctl+0x1137/0x1cd0 [ 944.081585] ? loop_set_status64+0xe0/0xe0 [ 944.081598] blkdev_ioctl+0x540/0x1830 [ 944.108583] ? blkpg_ioctl+0x8d0/0x8d0 [ 944.112473] ? trace_hardirqs_on+0x10/0x10 [ 944.116715] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 944.121823] ? debug_check_no_obj_freed+0x2c0/0x680 [ 944.126842] block_ioctl+0xd9/0x120 [ 944.130476] ? blkdev_fallocate+0x3a0/0x3a0 [ 944.134796] do_vfs_ioctl+0x75a/0xff0 [ 944.138598] ? lock_acquire+0x170/0x3f0 08:26:13 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x1407, 0x24b, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_NRMIDIS(r2, 0x8004510b, &(0x7f0000000100)) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6744669800000000000000000000000086e740d146b15047b43d543ca6600e06558a"], 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x1407, 0x24b, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_NRMIDIS(r2, 0x8004510b, &(0x7f0000000100)) (async) write$nbd(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="6744669800000000000000000000000086e740d146b15047b43d543ca6600e06558a"], 0x10) (async) [ 944.142569] ? ioctl_preallocate+0x1a0/0x1a0 [ 944.146982] ? __fget+0x265/0x3e0 [ 944.150432] ? do_vfs_ioctl+0xff0/0xff0 [ 944.154402] ? security_file_ioctl+0x83/0xb0 [ 944.158809] SyS_ioctl+0x7f/0xb0 [ 944.162171] ? do_vfs_ioctl+0xff0/0xff0 [ 944.166135] do_syscall_64+0x1d5/0x640 [ 944.170005] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 944.175173] RIP: 0033:0x7f1005389ea7 [ 944.178860] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.186550] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 944.193802] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 944.201054] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 944.208300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 944.215553] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 944.237773] XFS (loop0): unknown mount option [logbsize=]. 08:26:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 16) 08:26:13 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="67446698d78800000000000000000000025e1589e789bbec6de93d1f0b2c40383a571d3ac6e997ea3b9707b037839521ecd1908a2d9bc345e0485d97c4c69015e27b42fe109d8f11b656d67c435e3e0dc6306ec693253bc6ac887c99f49c7452e7f8c03000b944cd066cdef467d336513263b0fc97c615d1f96822551b8ae1e36beebed8c048f06e64a39c8fc5c2b970af2abfcf4615612a7d09bf078f00f85e3ccc597b7b6a4fa8ed7bd6771326180031713e0e639ec0bec47b68f8c739e8ea82bd8eaae140d2bab902f2d95b1f04f9556fa478d792b1c240a8fcd4b11159c19a01a64aa84104"], 0x10) 08:26:13 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:13 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) (async) 08:26:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 17) 08:26:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x4b, 0x4) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x4b, 0x4) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) 08:26:13 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000)=0x4b, 0x4) (async) write$nbd(r0, &(0x7f0000000100), 0x10) [ 944.378648] FAULT_INJECTION: forcing a failure. [ 944.378648] name failslab, interval 1, probability 0, space 0, times 0 [ 944.405985] CPU: 0 PID: 19894 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 944.413893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.423244] Call Trace: 08:26:13 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) [ 944.425838] dump_stack+0x1b2/0x281 [ 944.429483] should_fail.cold+0x10a/0x149 [ 944.433638] should_failslab+0xd6/0x130 [ 944.437619] kmem_cache_alloc+0x28e/0x3c0 [ 944.441773] __kernfs_new_node+0x6f/0x470 [ 944.445931] kernfs_new_node+0x7b/0xe0 [ 944.449829] __kernfs_create_file+0x3d/0x320 [ 944.454244] sysfs_add_file_mode_ns+0x1e1/0x450 [ 944.458918] ? kernfs_create_dir_ns+0x171/0x200 [ 944.463597] internal_create_group+0x22b/0x710 [ 944.468192] lo_ioctl+0x1137/0x1cd0 [ 944.471826] ? loop_set_status64+0xe0/0xe0 [ 944.476067] blkdev_ioctl+0x540/0x1830 [ 944.479958] ? blkpg_ioctl+0x8d0/0x8d0 [ 944.483853] ? trace_hardirqs_on+0x10/0x10 [ 944.486719] FAULT_INJECTION: forcing a failure. [ 944.486719] name failslab, interval 1, probability 0, space 0, times 0 [ 944.488092] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 944.488104] ? debug_check_no_obj_freed+0x2c0/0x680 [ 944.488119] block_ioctl+0xd9/0x120 [ 944.488128] ? blkdev_fallocate+0x3a0/0x3a0 [ 944.488138] do_vfs_ioctl+0x75a/0xff0 [ 944.488153] ? lock_acquire+0x170/0x3f0 [ 944.525197] ? ioctl_preallocate+0x1a0/0x1a0 08:26:13 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x60, 0x1403, 0x2, 0x70bd25, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'wlan1\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'wg2\x00'}}]}, 0x60}}, 0x20004805) [ 944.529595] ? __fget+0x265/0x3e0 [ 944.533049] ? do_vfs_ioctl+0xff0/0xff0 [ 944.537016] ? security_file_ioctl+0x83/0xb0 [ 944.541409] SyS_ioctl+0x7f/0xb0 [ 944.544767] ? do_vfs_ioctl+0xff0/0xff0 [ 944.548746] do_syscall_64+0x1d5/0x640 [ 944.552646] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 944.557842] RIP: 0033:0x7f1005389ea7 [ 944.561552] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.569260] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 944.576542] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 944.583817] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 944.591078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 944.598348] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 944.612788] CPU: 1 PID: 19907 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 944.620697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.630055] Call Trace: [ 944.632649] dump_stack+0x1b2/0x281 [ 944.636295] should_fail.cold+0x10a/0x149 [ 944.640448] should_failslab+0xd6/0x130 [ 944.644428] kmem_cache_alloc+0x28e/0x3c0 [ 944.648589] __kernfs_new_node+0x6f/0x470 [ 944.652756] kernfs_new_node+0x7b/0xe0 [ 944.656646] __kernfs_create_file+0x3d/0x320 [ 944.661055] sysfs_add_file_mode_ns+0x1e1/0x450 [ 944.665727] ? kernfs_create_dir_ns+0x171/0x200 [ 944.670399] internal_create_group+0x22b/0x710 [ 944.674995] lo_ioctl+0x1137/0x1cd0 08:26:13 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="67446698d78800000000000000000000025e1589e789bbec6de93d1f0b2c40383a571d3ac6e997ea3b9707b037839521ecd1908a2d9bc345e0485d97c4c69015e27b42fe109d8f11b656d67c435e3e0dc6306ec693253bc6ac887c99f49c7452e7f8c03000b944cd066cdef467d336513263b0fc97c615d1f96822551b8ae1e36beebed8c048f06e64a39c8fc5c2b970af2abfcf4615612a7d09bf078f00f85e3ccc597b7b6a4fa8ed7bd6771326180031713e0e639ec0bec47b68f8c739e8ea82bd8eaae140d2bab902f2d95b1f04f9556fa478d792b1c240a8fcd4b11159c19a01a64aa84104"], 0x10) 08:26:13 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="67446698d78800000000000000000000025e1589e789bbec6de93d1f0b2c40383a571d3ac6e997ea3b9707b037839521ecd1908a2d9bc345e0485d97c4c69015e27b42fe109d8f11b656d67c435e3e0dc6306ec693253bc6ac887c99f49c7452e7f8c03000b944cd066cdef467d336513263b0fc97c615d1f96822551b8ae1e36beebed8c048f06e64a39c8fc5c2b970af2abfcf4615612a7d09bf078f00f85e3ccc597b7b6a4fa8ed7bd6771326180031713e0e639ec0bec47b68f8c739e8ea82bd8eaae140d2bab902f2d95b1f04f9556fa478d792b1c240a8fcd4b11159c19a01a64aa84104"], 0x10) 08:26:14 executing program 3: setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000)=0x8000, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) [ 944.678630] ? loop_set_status64+0xe0/0xe0 [ 944.682880] blkdev_ioctl+0x540/0x1830 [ 944.683960] XFS (loop0): unknown mount option [logbsize=]. [ 944.686766] ? blkpg_ioctl+0x8d0/0x8d0 [ 944.686777] ? trace_hardirqs_on+0x10/0x10 [ 944.686790] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 944.686802] ? debug_check_no_obj_freed+0x2c0/0x680 [ 944.710615] block_ioctl+0xd9/0x120 [ 944.714243] ? blkdev_fallocate+0x3a0/0x3a0 [ 944.718577] do_vfs_ioctl+0x75a/0xff0 [ 944.722377] ? lock_acquire+0x170/0x3f0 [ 944.726353] ? ioctl_preallocate+0x1a0/0x1a0 [ 944.730766] ? __fget+0x265/0x3e0 [ 944.734219] ? do_vfs_ioctl+0xff0/0xff0 [ 944.738190] ? security_file_ioctl+0x83/0xb0 [ 944.742595] SyS_ioctl+0x7f/0xb0 [ 944.745958] ? do_vfs_ioctl+0xff0/0xff0 [ 944.749930] do_syscall_64+0x1d5/0x640 [ 944.753824] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 944.759007] RIP: 0033:0x7f551d045ea7 [ 944.762720] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.770434] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 944.777818] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 944.785089] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 944.792362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 944.799640] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 944.825721] XFS (loop4): unknown mount option [logbsize=]. 08:26:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 17) 08:26:14 executing program 3: setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000)=0x8000, 0x4) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x141c82) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x1d, 0x22, 0x9, 0x1c, 0x9, 0x4, 0x6, 0x101, 0xffffffffffffffff}) ioctl$RTC_AIE_ON(r1, 0x7001) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) 08:26:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 18) 08:26:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x60, 0x1403, 0x2, 0x70bd25, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'wlan1\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'wg2\x00'}}]}, 0x60}}, 0x20004805) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x60, 0x1403, 0x2, 0x70bd25, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'wlan1\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'wg2\x00'}}]}, 0x60}}, 0x20004805) (async) 08:26:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) 08:26:14 executing program 3: setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000)=0x8000, 0x4) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x60, 0x1403, 0x2, 0x70bd25, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'wlan1\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'wg2\x00'}}]}, 0x60}}, 0x20004805) [ 944.948228] FAULT_INJECTION: forcing a failure. [ 944.948228] name failslab, interval 1, probability 0, space 0, times 0 [ 944.975690] CPU: 1 PID: 19959 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 944.983618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.992985] Call Trace: 08:26:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 944.995582] dump_stack+0x1b2/0x281 [ 944.999218] should_fail.cold+0x10a/0x149 [ 945.003371] should_failslab+0xd6/0x130 [ 945.007348] kmem_cache_alloc+0x28e/0x3c0 [ 945.011506] __kernfs_new_node+0x6f/0x470 [ 945.015659] kernfs_new_node+0x7b/0xe0 [ 945.019552] __kernfs_create_file+0x3d/0x320 [ 945.023964] sysfs_add_file_mode_ns+0x1e1/0x450 [ 945.028636] ? kernfs_create_dir_ns+0x171/0x200 [ 945.033316] internal_create_group+0x22b/0x710 [ 945.037912] lo_ioctl+0x1137/0x1cd0 [ 945.041548] ? loop_set_status64+0xe0/0xe0 08:26:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 945.045790] blkdev_ioctl+0x540/0x1830 [ 945.049685] ? blkpg_ioctl+0x8d0/0x8d0 [ 945.053573] ? trace_hardirqs_on+0x10/0x10 [ 945.057822] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 945.063037] ? debug_check_no_obj_freed+0x2c0/0x680 [ 945.068070] block_ioctl+0xd9/0x120 [ 945.071704] ? blkdev_fallocate+0x3a0/0x3a0 [ 945.076032] do_vfs_ioctl+0x75a/0xff0 [ 945.079834] ? lock_acquire+0x170/0x3f0 [ 945.083812] ? ioctl_preallocate+0x1a0/0x1a0 [ 945.088221] ? __fget+0x265/0x3e0 [ 945.091680] ? do_vfs_ioctl+0xff0/0xff0 08:26:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, 0x0, 0x0) (async) [ 945.095655] ? security_file_ioctl+0x83/0xb0 [ 945.100064] SyS_ioctl+0x7f/0xb0 [ 945.103428] ? do_vfs_ioctl+0xff0/0xff0 [ 945.107415] do_syscall_64+0x1d5/0x640 [ 945.111402] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 945.116589] RIP: 0033:0x7f551d045ea7 [ 945.120296] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 945.128004] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 945.135281] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 945.142667] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 945.149937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 945.157207] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 945.199204] FAULT_INJECTION: forcing a failure. [ 945.199204] name failslab, interval 1, probability 0, space 0, times 0 [ 945.228772] XFS (loop4): unknown mount option [logbsize=]. [ 945.232287] CPU: 0 PID: 19966 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 945.242290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.251639] Call Trace: [ 945.254227] dump_stack+0x1b2/0x281 [ 945.257867] should_fail.cold+0x10a/0x149 [ 945.262020] should_failslab+0xd6/0x130 [ 945.266003] kmem_cache_alloc+0x28e/0x3c0 [ 945.270153] __kernfs_new_node+0x6f/0x470 [ 945.274306] kernfs_new_node+0x7b/0xe0 [ 945.278196] __kernfs_create_file+0x3d/0x320 [ 945.282608] sysfs_add_file_mode_ns+0x1e1/0x450 [ 945.287276] ? kernfs_create_dir_ns+0x171/0x200 [ 945.291945] internal_create_group+0x22b/0x710 [ 945.296534] lo_ioctl+0x1137/0x1cd0 [ 945.300165] ? loop_set_status64+0xe0/0xe0 [ 945.304399] blkdev_ioctl+0x540/0x1830 [ 945.308285] ? blkpg_ioctl+0x8d0/0x8d0 [ 945.312162] ? trace_hardirqs_on+0x10/0x10 [ 945.316380] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 945.321583] ? debug_check_no_obj_freed+0x2c0/0x680 [ 945.326583] block_ioctl+0xd9/0x120 [ 945.330187] ? blkdev_fallocate+0x3a0/0x3a0 [ 945.334489] do_vfs_ioctl+0x75a/0xff0 [ 945.338268] ? lock_acquire+0x170/0x3f0 [ 945.342224] ? ioctl_preallocate+0x1a0/0x1a0 [ 945.346610] ? __fget+0x265/0x3e0 [ 945.350048] ? do_vfs_ioctl+0xff0/0xff0 [ 945.354007] ? security_file_ioctl+0x83/0xb0 [ 945.358391] SyS_ioctl+0x7f/0xb0 [ 945.361751] ? do_vfs_ioctl+0xff0/0xff0 [ 945.365706] do_syscall_64+0x1d5/0x640 [ 945.369574] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 945.374741] RIP: 0033:0x7f1005389ea7 [ 945.378429] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 945.386112] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 08:26:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 18) 08:26:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x141c82) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x1d, 0x22, 0x9, 0x1c, 0x9, 0x4, 0x6, 0x101, 0xffffffffffffffff}) ioctl$RTC_AIE_ON(r1, 0x7001) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x141c82) (async) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x1d, 0x22, 0x9, 0x1c, 0x9, 0x4, 0x6, 0x101, 0xffffffffffffffff}) (async) ioctl$RTC_AIE_ON(r1, 0x7001) (async) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) (async) 08:26:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8481}, 0x10) write$nbd(r0, &(0x7f0000000100), 0x10) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x3e9) 08:26:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000000)) write$nbd(r0, 0x0, 0x0) 08:26:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 19) [ 945.393359] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 945.400607] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 945.407854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 945.415107] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 945.424350] XFS (loop0): unknown mount option [logbsize=]. 08:26:14 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) read$sequencer(r3, &(0x7f0000000100)=""/160, 0xa0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r1, 0x40085112, &(0x7f0000000040)=@echo=0x3ff) 08:26:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000000)) (async) write$nbd(r0, 0x0, 0x0) 08:26:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8481}, 0x10) (async) write$nbd(r0, &(0x7f0000000100), 0x10) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x3e9) 08:26:14 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x141c82) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x1d, 0x22, 0x9, 0x1c, 0x9, 0x4, 0x6, 0x101, 0xffffffffffffffff}) ioctl$RTC_AIE_ON(r1, 0x7001) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x141c82) (async) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x1d, 0x22, 0x9, 0x1c, 0x9, 0x4, 0x6, 0x101, 0xffffffffffffffff}) (async) ioctl$RTC_AIE_ON(r1, 0x7001) (async) setsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) (async) [ 945.550090] FAULT_INJECTION: forcing a failure. [ 945.550090] name failslab, interval 1, probability 0, space 0, times 0 [ 945.591503] CPU: 0 PID: 20025 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 945.599410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.608769] Call Trace: [ 945.611357] dump_stack+0x1b2/0x281 [ 945.614994] should_fail.cold+0x10a/0x149 [ 945.619144] should_failslab+0xd6/0x130 [ 945.623128] kmem_cache_alloc+0x28e/0x3c0 [ 945.627279] __kernfs_new_node+0x6f/0x470 [ 945.631428] kernfs_new_node+0x7b/0xe0 [ 945.635317] __kernfs_create_file+0x3d/0x320 [ 945.639732] sysfs_add_file_mode_ns+0x1e1/0x450 [ 945.644407] ? kernfs_create_dir_ns+0x171/0x200 [ 945.649086] internal_create_group+0x22b/0x710 [ 945.653673] lo_ioctl+0x1137/0x1cd0 [ 945.657305] ? loop_set_status64+0xe0/0xe0 [ 945.661551] blkdev_ioctl+0x540/0x1830 [ 945.665443] ? blkpg_ioctl+0x8d0/0x8d0 [ 945.669337] ? trace_hardirqs_on+0x10/0x10 [ 945.673584] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 945.678691] ? debug_check_no_obj_freed+0x2c0/0x680 [ 945.683717] block_ioctl+0xd9/0x120 [ 945.687351] ? blkdev_fallocate+0x3a0/0x3a0 [ 945.691682] do_vfs_ioctl+0x75a/0xff0 [ 945.695493] ? lock_acquire+0x170/0x3f0 [ 945.699484] ? ioctl_preallocate+0x1a0/0x1a0 [ 945.703903] ? __fget+0x265/0x3e0 [ 945.707369] ? do_vfs_ioctl+0xff0/0xff0 [ 945.711436] ? security_file_ioctl+0x83/0xb0 [ 945.715856] SyS_ioctl+0x7f/0xb0 [ 945.719220] ? do_vfs_ioctl+0xff0/0xff0 [ 945.723201] do_syscall_64+0x1d5/0x640 [ 945.727097] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 945.732284] RIP: 0033:0x7f1005389ea7 08:26:15 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) read$sequencer(r3, &(0x7f0000000100)=""/160, 0xa0) (async, rerun: 64) socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) ioctl$SNDCTL_SEQ_OUTOFBAND(r1, 0x40085112, &(0x7f0000000040)=@echo=0x3ff) [ 945.735995] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 945.743700] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 945.750969] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 945.758247] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 945.765601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 945.772866] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 945.798334] FAULT_INJECTION: forcing a failure. [ 945.798334] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 945.810155] CPU: 1 PID: 20030 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 945.813865] XFS (loop0): unknown mount option [logbsize=]. [ 945.818043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.818048] Call Trace: [ 945.818066] dump_stack+0x1b2/0x281 [ 945.818080] should_fail.cold+0x10a/0x149 [ 945.818094] __alloc_pages_nodemask+0x22c/0x2720 [ 945.848207] ? delete_node+0x1eb/0x610 [ 945.852125] ? __lock_acquire+0x5fc/0x3f20 [ 945.856364] ? kernfs_activate+0x2a/0x180 [ 945.860512] ? __mutex_lock+0x360/0x1310 [ 945.864575] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 945.869410] ? kernfs_add_one+0x4c/0x3a0 [ 945.873465] ? kernfs_add_one+0x2e5/0x3a0 [ 945.877616] ? lock_downgrade+0x740/0x740 [ 945.881762] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 945.887214] ? __mutex_unlock_slowpath+0x75/0x770 [ 945.892058] cache_grow_begin+0x91/0x700 08:26:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000000)) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000000)) (async) write$nbd(r0, 0x0, 0x0) (async) [ 945.896115] ? fs_reclaim_release+0xd0/0x110 [ 945.900521] ? check_preemption_disabled+0x35/0x240 [ 945.905536] cache_alloc_refill+0x273/0x350 [ 945.909863] kmem_cache_alloc_trace+0x340/0x3d0 [ 945.914544] ? dev_uevent_filter+0xd0/0xd0 [ 945.918873] kobject_uevent_env+0x20c/0xf30 [ 945.923197] ? internal_create_group+0x48f/0x710 [ 945.927963] lo_ioctl+0x11a6/0x1cd0 [ 945.931594] ? loop_set_status64+0xe0/0xe0 [ 945.935830] blkdev_ioctl+0x540/0x1830 [ 945.939719] ? blkpg_ioctl+0x8d0/0x8d0 [ 945.943608] ? trace_hardirqs_on+0x10/0x10 [ 945.947846] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 945.952950] ? debug_check_no_obj_freed+0x2c0/0x680 [ 945.957974] block_ioctl+0xd9/0x120 [ 945.961604] ? blkdev_fallocate+0x3a0/0x3a0 [ 945.966016] do_vfs_ioctl+0x75a/0xff0 [ 945.969827] ? lock_acquire+0x170/0x3f0 [ 945.973803] ? ioctl_preallocate+0x1a0/0x1a0 [ 945.978217] ? __fget+0x265/0x3e0 [ 945.981675] ? do_vfs_ioctl+0xff0/0xff0 [ 945.985651] ? security_file_ioctl+0x83/0xb0 [ 945.990058] SyS_ioctl+0x7f/0xb0 [ 945.993508] ? do_vfs_ioctl+0xff0/0xff0 [ 945.997481] do_syscall_64+0x1d5/0x640 [ 946.001375] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 946.006565] RIP: 0033:0x7f551d045ea7 [ 946.010271] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 946.017979] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 946.025242] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 946.032492] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 946.039745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:26:15 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 19) 08:26:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8481}, 0x10) write$nbd(r0, &(0x7f0000000100), 0x10) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x3e9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000000)={0x7, 0x7, 0x9, 0x8481}, 0x10) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x3e9) (async) 08:26:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/keys\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r1, 0x8004510b, &(0x7f0000000280)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r0}) r3 = dup(r2) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x1407, 0x20, 0x70bd2b, 0x25d7dbfe}, 0x10}, 0x1, 0x0, 0x0, 0x24004041}, 0x90) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x4489c3, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) read$sequencer(r5, &(0x7f0000001740)=""/4093, 0xffd) r6 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x109442, 0x0) dup(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r6}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r4) write$nbd(r7, 0x0, 0x0) 08:26:15 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) read$sequencer(r3, &(0x7f0000000100)=""/160, 0xa0) (async) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r1, 0x40085112, &(0x7f0000000040)=@echo=0x3ff) 08:26:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "fb8f03f3107e020a91bccf0e7efe57d237fceb00ac0c32d9a0ad37e01bb83d2050f7bcceb8a43dfbd22c0a031a63ae1f20d437d358858719872bac3a0d4546f7b70fb122e810a7e06cf49065229de3dd0294e86495aadd7f63807fca2eb710ad001895f91dd156672d25fc5da794d905047880ea"}, 0x84) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) [ 946.047004] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 946.059122] XFS (loop4): unknown mount option [logbsize=]. 08:26:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 20) 08:26:15 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/keys\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r1, 0x8004510b, &(0x7f0000000280)) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r0}) r3 = dup(r2) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x1407, 0x20, 0x70bd2b, 0x25d7dbfe}, 0x10}, 0x1, 0x0, 0x0, 0x24004041}, 0x90) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x4489c3, 0x0) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) read$sequencer(r5, &(0x7f0000001740)=""/4093, 0xffd) r6 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x109442, 0x0) dup(0xffffffffffffffff) (async) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r6}) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r4) write$nbd(r7, 0x0, 0x0) [ 946.198171] FAULT_INJECTION: forcing a failure. [ 946.198171] name failslab, interval 1, probability 0, space 0, times 0 [ 946.229844] CPU: 1 PID: 20096 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 946.237750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:26:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "fb8f03f3107e020a91bccf0e7efe57d237fceb00ac0c32d9a0ad37e01bb83d2050f7bcceb8a43dfbd22c0a031a63ae1f20d437d358858719872bac3a0d4546f7b70fb122e810a7e06cf49065229de3dd0294e86495aadd7f63807fca2eb710ad001895f91dd156672d25fc5da794d905047880ea"}, 0x84) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 08:26:15 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 946.247101] Call Trace: [ 946.249689] dump_stack+0x1b2/0x281 [ 946.253322] should_fail.cold+0x10a/0x149 [ 946.257471] should_failslab+0xd6/0x130 [ 946.261446] kmem_cache_alloc_trace+0x29a/0x3d0 [ 946.266115] ? dev_uevent_filter+0xd0/0xd0 [ 946.270349] kobject_uevent_env+0x20c/0xf30 [ 946.274673] ? internal_create_group+0x48f/0x710 [ 946.279524] lo_ioctl+0x11a6/0x1cd0 [ 946.283152] ? loop_set_status64+0xe0/0xe0 [ 946.287389] blkdev_ioctl+0x540/0x1830 [ 946.291274] ? blkpg_ioctl+0x8d0/0x8d0 [ 946.295158] ? trace_hardirqs_on+0x10/0x10 [ 946.299395] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 946.304498] ? debug_check_no_obj_freed+0x2c0/0x680 [ 946.309521] block_ioctl+0xd9/0x120 [ 946.313144] ? blkdev_fallocate+0x3a0/0x3a0 [ 946.317463] do_vfs_ioctl+0x75a/0xff0 [ 946.321263] ? lock_acquire+0x170/0x3f0 [ 946.325239] ? ioctl_preallocate+0x1a0/0x1a0 [ 946.329651] ? __fget+0x265/0x3e0 [ 946.333113] ? do_vfs_ioctl+0xff0/0xff0 [ 946.337173] ? security_file_ioctl+0x83/0xb0 [ 946.341588] SyS_ioctl+0x7f/0xb0 [ 946.344956] ? do_vfs_ioctl+0xff0/0xff0 [ 946.348931] do_syscall_64+0x1d5/0x640 [ 946.350521] FAULT_INJECTION: forcing a failure. [ 946.350521] name failslab, interval 1, probability 0, space 0, times 0 [ 946.352820] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 946.352830] RIP: 0033:0x7f551d045ea7 [ 946.352835] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 946.352852] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 946.387834] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 946.395096] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 946.402356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 946.409606] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 946.416874] CPU: 0 PID: 20101 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 946.424754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.434103] Call Trace: [ 946.436692] dump_stack+0x1b2/0x281 [ 946.440331] should_fail.cold+0x10a/0x149 [ 946.444484] should_failslab+0xd6/0x130 [ 946.448457] __kmalloc+0x2c1/0x400 [ 946.451996] ? kobject_get_path+0xb5/0x230 [ 946.456230] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 946.461682] kobject_get_path+0xb5/0x230 [ 946.466019] kobject_uevent_env+0x230/0xf30 [ 946.470343] ? internal_create_group+0x48f/0x710 [ 946.475099] lo_ioctl+0x11a6/0x1cd0 [ 946.478732] ? loop_set_status64+0xe0/0xe0 [ 946.482966] blkdev_ioctl+0x540/0x1830 [ 946.486848] ? blkpg_ioctl+0x8d0/0x8d0 [ 946.490741] ? trace_hardirqs_on+0x10/0x10 [ 946.495067] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 946.500179] ? debug_check_no_obj_freed+0x2c0/0x680 [ 946.504122] XFS (loop4): unknown mount option [logbsize=]. [ 946.505193] block_ioctl+0xd9/0x120 [ 946.505207] ? blkdev_fallocate+0x3a0/0x3a0 [ 946.518745] do_vfs_ioctl+0x75a/0xff0 [ 946.522545] ? lock_acquire+0x170/0x3f0 [ 946.526519] ? ioctl_preallocate+0x1a0/0x1a0 [ 946.530921] ? __fget+0x265/0x3e0 [ 946.534369] ? do_vfs_ioctl+0xff0/0xff0 [ 946.538336] ? security_file_ioctl+0x83/0xb0 [ 946.542721] SyS_ioctl+0x7f/0xb0 [ 946.546064] ? do_vfs_ioctl+0xff0/0xff0 [ 946.550016] do_syscall_64+0x1d5/0x640 [ 946.553885] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 946.559052] RIP: 0033:0x7f1005389ea7 [ 946.562736] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 946.570424] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 946.577670] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 946.584914] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 946.592164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:26:15 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 20) 08:26:15 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "fb8f03f3107e020a91bccf0e7efe57d237fceb00ac0c32d9a0ad37e01bb83d2050f7bcceb8a43dfbd22c0a031a63ae1f20d437d358858719872bac3a0d4546f7b70fb122e810a7e06cf49065229de3dd0294e86495aadd7f63807fca2eb710ad001895f91dd156672d25fc5da794d905047880ea"}, 0x84) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x0, "fb8f03f3107e020a91bccf0e7efe57d237fceb00ac0c32d9a0ad37e01bb83d2050f7bcceb8a43dfbd22c0a031a63ae1f20d437d358858719872bac3a0d4546f7b70fb122e810a7e06cf49065229de3dd0294e86495aadd7f63807fca2eb710ad001895f91dd156672d25fc5da794d905047880ea"}, 0x84) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) (async) 08:26:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) 08:26:15 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/keys\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r1, 0x8004510b, &(0x7f0000000280)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r0}) r3 = dup(r2) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x1407, 0x20, 0x70bd2b, 0x25d7dbfe}, 0x10}, 0x1, 0x0, 0x0, 0x24004041}, 0x90) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x4489c3, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) read$sequencer(r5, &(0x7f0000001740)=""/4093, 0xffd) r6 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x109442, 0x0) dup(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r6}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r4) write$nbd(r7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/keys\x00', 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_NRMIDIS(r1, 0x8004510b, &(0x7f0000000280)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r0}) (async) dup(r2) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x1407, 0x20, 0x70bd2b, 0x25d7dbfe}, 0x10}, 0x1, 0x0, 0x0, 0x24004041}, 0x90) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x4489c3, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) read$sequencer(r5, &(0x7f0000001740)=""/4093, 0xffd) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x109442, 0x0) (async) dup(0xffffffffffffffff) (async) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r6}) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r4) (async) write$nbd(r7, 0x0, 0x0) (async) 08:26:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 21) [ 946.599408] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 946.610734] XFS (loop0): unknown mount option [logbsize=]. 08:26:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) write$nbd(r1, &(0x7f0000000280)={0x67446698, 0x101, 0x1, 0x2, 0x4, "733545f580791b89a9e1684f148d53b33dc652c9dc53bb35212e7572eaaa4c196e6f4680d58da4e3fa9d70583b9e0b2b39f946f3830aaacfcd13065e1645bb86feec5ae763a89558fa2956c70bfd563cb3aecbc01e434c48e7b56fc362a2ce195fc4d13f00f448514522ae7ec4afb9f661e8926b20b826f5e62d9b110aaf17c5e3f3b469ccc3a2793ea011d9ce8cd47d6c3bce28f7765bb0c5c073801e7d184d38336fdde850f0f7b15ddcb32fe64ff3dad459fe"}, 0xc4) 08:26:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6744669800000400000000000c570fc69fc7825214a34d436e9cd974b90b533bb4a2b1f6f21bc84a932a5af44eaa00000000"], 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x1410, 0x800, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8, 0x4c, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40804) 08:26:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000140)={0x67446698, 0x1, 0x1, 0x0, 0x0, "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"}, 0x15b) [ 946.740174] FAULT_INJECTION: forcing a failure. [ 946.740174] name failslab, interval 1, probability 0, space 0, times 0 [ 946.768313] FAULT_INJECTION: forcing a failure. [ 946.768313] name failslab, interval 1, probability 0, space 0, times 0 [ 946.788234] CPU: 0 PID: 20149 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 946.796125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.805477] Call Trace: [ 946.808063] dump_stack+0x1b2/0x281 [ 946.811686] should_fail.cold+0x10a/0x149 [ 946.815833] should_failslab+0xd6/0x130 [ 946.819791] kmem_cache_alloc_node+0x263/0x410 [ 946.824358] __alloc_skb+0x5c/0x510 [ 946.827972] kobject_uevent_env+0x882/0xf30 [ 946.832284] lo_ioctl+0x11a6/0x1cd0 [ 946.835898] ? loop_set_status64+0xe0/0xe0 [ 946.840115] blkdev_ioctl+0x540/0x1830 [ 946.843989] ? blkpg_ioctl+0x8d0/0x8d0 [ 946.847865] ? trace_hardirqs_on+0x10/0x10 [ 946.852083] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 946.857255] ? debug_check_no_obj_freed+0x2c0/0x680 [ 946.862266] block_ioctl+0xd9/0x120 [ 946.865882] ? blkdev_fallocate+0x3a0/0x3a0 [ 946.870186] do_vfs_ioctl+0x75a/0xff0 [ 946.873968] ? lock_acquire+0x170/0x3f0 [ 946.877922] ? ioctl_preallocate+0x1a0/0x1a0 [ 946.882337] ? __fget+0x265/0x3e0 [ 946.885778] ? do_vfs_ioctl+0xff0/0xff0 [ 946.889736] ? security_file_ioctl+0x83/0xb0 [ 946.894126] SyS_ioctl+0x7f/0xb0 [ 946.897472] ? do_vfs_ioctl+0xff0/0xff0 [ 946.901436] do_syscall_64+0x1d5/0x640 [ 946.905314] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 946.910482] RIP: 0033:0x7f1005389ea7 [ 946.914171] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 946.921866] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 946.929119] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:26:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0xc, 0x0, 0xc, 0xfffffffffffffff8, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @alu={0x4, 0x1, 0x9, 0x7, 0xb, 0x4, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0x40, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xa6, &(0x7f0000000300)=""/166, 0x20880, 0x3, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x9, 0x2c13}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r0]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000000)=0x8b) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00F\x00', @ANYRES16=r1, @ANYBLOB="00022cbd7000fbdbdf25020000000800020000000000080002007effffff0500050003000000050005000100000008000300ff07000008000200040000001400010000000000000000000000000000000001"], 0x58}}, 0x8004) write$nbd(r2, 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000200)) ioctl$SNDCTL_MIDI_PRETIME(r3, 0xc0046d00, &(0x7f00000001c0)=0x8) 08:26:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000140)={0x67446698, 0x1, 0x1, 0x0, 0x0, "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"}, 0x15b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000140)={0x67446698, 0x1, 0x1, 0x0, 0x0, "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"}, 0x15b) (async) 08:26:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) write$nbd(r1, &(0x7f0000000280)={0x67446698, 0x101, 0x1, 0x2, 0x4, "733545f580791b89a9e1684f148d53b33dc652c9dc53bb35212e7572eaaa4c196e6f4680d58da4e3fa9d70583b9e0b2b39f946f3830aaacfcd13065e1645bb86feec5ae763a89558fa2956c70bfd563cb3aecbc01e434c48e7b56fc362a2ce195fc4d13f00f448514522ae7ec4afb9f661e8926b20b826f5e62d9b110aaf17c5e3f3b469ccc3a2793ea011d9ce8cd47d6c3bce28f7765bb0c5c073801e7d184d38336fdde850f0f7b15ddcb32fe64ff3dad459fe"}, 0xc4) [ 946.936376] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 946.943637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 946.950895] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 946.958160] CPU: 1 PID: 20145 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 946.966153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.975500] Call Trace: [ 946.978084] dump_stack+0x1b2/0x281 [ 946.981710] should_fail.cold+0x10a/0x149 [ 946.985862] should_failslab+0xd6/0x130 [ 946.989836] __kmalloc+0x2c1/0x400 [ 946.993373] ? kobject_get_path+0xb5/0x230 [ 946.997602] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 947.003053] kobject_get_path+0xb5/0x230 [ 947.007114] kobject_uevent_env+0x230/0xf30 [ 947.011433] ? internal_create_group+0x48f/0x710 [ 947.016186] lo_ioctl+0x11a6/0x1cd0 [ 947.019026] XFS (loop0): unknown mount option [logbsize=]. [ 947.019814] ? loop_set_status64+0xe0/0xe0 [ 947.019826] blkdev_ioctl+0x540/0x1830 [ 947.019837] ? blkpg_ioctl+0x8d0/0x8d0 [ 947.037401] ? trace_hardirqs_on+0x10/0x10 [ 947.041641] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 947.046743] ? debug_check_no_obj_freed+0x2c0/0x680 [ 947.051762] block_ioctl+0xd9/0x120 [ 947.055383] ? blkdev_fallocate+0x3a0/0x3a0 [ 947.059700] do_vfs_ioctl+0x75a/0xff0 [ 947.063496] ? lock_acquire+0x170/0x3f0 [ 947.067471] ? ioctl_preallocate+0x1a0/0x1a0 [ 947.071879] ? __fget+0x265/0x3e0 [ 947.075329] ? do_vfs_ioctl+0xff0/0xff0 [ 947.079296] ? security_file_ioctl+0x83/0xb0 [ 947.083701] SyS_ioctl+0x7f/0xb0 [ 947.087065] ? do_vfs_ioctl+0xff0/0xff0 [ 947.091038] do_syscall_64+0x1d5/0x640 [ 947.094930] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 947.100116] RIP: 0033:0x7f551d045ea7 [ 947.103823] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 947.111524] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 947.118788] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 947.126054] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 947.133320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:26:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 21) 08:26:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6744669800000400000000000c570fc69fc7825214a34d436e9cd974b90b533bb4a2b1f6f21bc84a932a5af44eaa00000000"], 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x1410, 0x800, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8, 0x4c, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40804) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6744669800000400000000000c570fc69fc7825214a34d436e9cd974b90b533bb4a2b1f6f21bc84a932a5af44eaa00000000"], 0x10) (async) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x1410, 0x800, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8, 0x4c, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40804) (async) 08:26:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async, rerun: 32) write$nbd(r1, &(0x7f0000000280)={0x67446698, 0x101, 0x1, 0x2, 0x4, "733545f580791b89a9e1684f148d53b33dc652c9dc53bb35212e7572eaaa4c196e6f4680d58da4e3fa9d70583b9e0b2b39f946f3830aaacfcd13065e1645bb86feec5ae763a89558fa2956c70bfd563cb3aecbc01e434c48e7b56fc362a2ce195fc4d13f00f448514522ae7ec4afb9f661e8926b20b826f5e62d9b110aaf17c5e3f3b469ccc3a2793ea011d9ce8cd47d6c3bce28f7765bb0c5c073801e7d184d38336fdde850f0f7b15ddcb32fe64ff3dad459fe"}, 0xc4) (rerun: 32) 08:26:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000140)={0x67446698, 0x1, 0x1, 0x0, 0x0, "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"}, 0x15b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000140)={0x67446698, 0x1, 0x1, 0x0, 0x0, "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"}, 0x15b) (async) 08:26:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0xc, 0x0, 0xc, 0xfffffffffffffff8, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @alu={0x4, 0x1, 0x9, 0x7, 0xb, 0x4, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0x40, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xa6, &(0x7f0000000300)=""/166, 0x20880, 0x3, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x9, 0x2c13}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r0]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000000)=0x8b) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00F\x00', @ANYRES16=r1, @ANYBLOB="00022cbd7000fbdbdf25020000000800020000000000080002007effffff0500050003000000050005000100000008000300ff07000008000200040000001400010000000000000000000000000000000001"], 0x58}}, 0x8004) write$nbd(r2, 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000200)) ioctl$SNDCTL_MIDI_PRETIME(r3, 0xc0046d00, &(0x7f00000001c0)=0x8) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0xc, 0x0, 0xc, 0xfffffffffffffff8, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @alu={0x4, 0x1, 0x9, 0x7, 0xb, 0x4, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0x40, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xa6, &(0x7f0000000300)=""/166, 0x20880, 0x3, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x9, 0x2c13}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r0]}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000000)=0x8b) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00F\x00', @ANYRES16=r1, @ANYBLOB="00022cbd7000fbdbdf25020000000800020000000000080002007effffff0500050003000000050005000100000008000300ff07000008000200040000001400010000000000000000000000000000000001"], 0x58}}, 0x8004) (async) write$nbd(r2, 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000200)) (async) ioctl$SNDCTL_MIDI_PRETIME(r3, 0xc0046d00, &(0x7f00000001c0)=0x8) (async) [ 947.140585] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 947.153290] XFS (loop4): unknown mount option [logbsize=]. 08:26:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 22) 08:26:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="9800f85c7d82a5000000000000000000"], 0x10) 08:26:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000002780)=""/4112, 0x1010) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vxcan0\x00'}) r3 = dup(r0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="007b6e48ea000000000000"]) syz_genetlink_get_family_id$gtp(&(0x7f0000000140), r3) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r4, r5}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x8}) 08:26:16 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6744669800000400000000000c570fc69fc7825214a34d436e9cd974b90b533bb4a2b1f6f21bc84a932a5af44eaa00000000"], 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x1410, 0x800, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8, 0x4c, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40804) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6744669800000400000000000c570fc69fc7825214a34d436e9cd974b90b533bb4a2b1f6f21bc84a932a5af44eaa00000000"], 0x10) (async) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x1410, 0x800, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8, 0x4c, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x40804) (async) 08:26:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000002780)=""/4112, 0x1010) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vxcan0\x00'}) r3 = dup(r0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="007b6e48ea000000000000"]) syz_genetlink_get_family_id$gtp(&(0x7f0000000140), r3) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r4, r5}) (async) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x8}) 08:26:16 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0xc, 0x0, 0xc, 0xfffffffffffffff8, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @alu={0x4, 0x1, 0x9, 0x7, 0xb, 0x4, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0x40, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xa6, &(0x7f0000000300)=""/166, 0x20880, 0x3, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x9, 0x2c13}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r0]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000000)=0x8b) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00F\x00', @ANYRES16=r1, @ANYBLOB="00022cbd7000fbdbdf25020000000800020000000000080002007effffff0500050003000000050005000100000008000300ff07000008000200040000001400010000000000000000000000000000000001"], 0x58}}, 0x8004) write$nbd(r2, 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000200)) ioctl$SNDCTL_MIDI_PRETIME(r3, 0xc0046d00, &(0x7f00000001c0)=0x8) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x5}, [@alu={0x7, 0x1, 0xc, 0x0, 0xc, 0xfffffffffffffff8, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @alu={0x4, 0x1, 0x9, 0x7, 0xb, 0x4, 0x1}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0x40, 0xfffffffffffffffc}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xa6, &(0x7f0000000300)=""/166, 0x20880, 0x3, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x9, 0x2c13}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r0]}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000000)=0x8b) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00F\x00', @ANYRES16=r1, @ANYBLOB="00022cbd7000fbdbdf25020000000800020000000000080002007effffff0500050003000000050005000100000008000300ff07000008000200040000001400010000000000000000000000000000000001"], 0x58}}, 0x8004) (async) write$nbd(r2, 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000200)) (async) ioctl$SNDCTL_MIDI_PRETIME(r3, 0xc0046d00, &(0x7f00000001c0)=0x8) (async) [ 947.276041] FAULT_INJECTION: forcing a failure. [ 947.276041] name failslab, interval 1, probability 0, space 0, times 0 [ 947.339818] CPU: 0 PID: 20208 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 947.347723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.357091] Call Trace: [ 947.359678] dump_stack+0x1b2/0x281 [ 947.363298] should_fail.cold+0x10a/0x149 [ 947.367429] should_failslab+0xd6/0x130 [ 947.371381] kmem_cache_alloc_node+0x263/0x410 [ 947.375943] __alloc_skb+0x5c/0x510 [ 947.379548] kobject_uevent_env+0x882/0xf30 [ 947.383854] lo_ioctl+0x11a6/0x1cd0 [ 947.387460] ? loop_set_status64+0xe0/0xe0 [ 947.391672] blkdev_ioctl+0x540/0x1830 [ 947.395536] ? blkpg_ioctl+0x8d0/0x8d0 [ 947.399402] ? trace_hardirqs_on+0x10/0x10 [ 947.403615] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 947.408698] ? debug_check_no_obj_freed+0x2c0/0x680 [ 947.413691] block_ioctl+0xd9/0x120 [ 947.417296] ? blkdev_fallocate+0x3a0/0x3a0 [ 947.421594] do_vfs_ioctl+0x75a/0xff0 [ 947.425370] ? lock_acquire+0x170/0x3f0 [ 947.429332] ? ioctl_preallocate+0x1a0/0x1a0 [ 947.433716] ? __fget+0x265/0x3e0 [ 947.437145] ? do_vfs_ioctl+0xff0/0xff0 [ 947.441099] ? security_file_ioctl+0x83/0xb0 [ 947.445484] SyS_ioctl+0x7f/0xb0 [ 947.448836] ? do_vfs_ioctl+0xff0/0xff0 [ 947.452792] do_syscall_64+0x1d5/0x640 [ 947.456658] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 947.461834] RIP: 0033:0x7f551d045ea7 [ 947.465524] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 947.473213] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 947.480466] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:26:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000002780)=""/4112, 0x1010) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vxcan0\x00'}) (async) r3 = dup(r0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="007b6e48ea000000000000"]) syz_genetlink_get_family_id$gtp(&(0x7f0000000140), r3) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r4, r5}) (async) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x8}) [ 947.487722] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 947.494979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 947.502240] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 947.531946] FAULT_INJECTION: forcing a failure. [ 947.531946] name failslab, interval 1, probability 0, space 0, times 0 [ 947.538394] XFS (loop4): unknown mount option [logbsize=]. [ 947.546803] CPU: 1 PID: 20211 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 947.556779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.566129] Call Trace: [ 947.568709] dump_stack+0x1b2/0x281 [ 947.572319] should_fail.cold+0x10a/0x149 [ 947.576449] should_failslab+0xd6/0x130 [ 947.580405] kmem_cache_alloc_node+0x263/0x410 [ 947.584967] __alloc_skb+0x5c/0x510 [ 947.588577] kobject_uevent_env+0x882/0xf30 [ 947.592880] lo_ioctl+0x11a6/0x1cd0 [ 947.596486] ? loop_set_status64+0xe0/0xe0 [ 947.600699] blkdev_ioctl+0x540/0x1830 [ 947.604562] ? blkpg_ioctl+0x8d0/0x8d0 [ 947.608424] ? trace_hardirqs_on+0x10/0x10 [ 947.612680] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 947.617763] ? debug_check_no_obj_freed+0x2c0/0x680 [ 947.622759] block_ioctl+0xd9/0x120 [ 947.626359] ? blkdev_fallocate+0x3a0/0x3a0 [ 947.630656] do_vfs_ioctl+0x75a/0xff0 [ 947.634435] ? lock_acquire+0x170/0x3f0 [ 947.638390] ? ioctl_preallocate+0x1a0/0x1a0 [ 947.642791] ? __fget+0x265/0x3e0 [ 947.646224] ? do_vfs_ioctl+0xff0/0xff0 [ 947.650183] ? security_file_ioctl+0x83/0xb0 [ 947.654569] SyS_ioctl+0x7f/0xb0 [ 947.657911] ? do_vfs_ioctl+0xff0/0xff0 [ 947.661863] do_syscall_64+0x1d5/0x640 [ 947.665731] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 947.670895] RIP: 0033:0x7f1005389ea7 [ 947.674581] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 947.682360] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 947.689613] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 947.697040] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 947.704304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 947.711683] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 947.734896] XFS (loop0): unknown mount option [logbsize=]. 08:26:17 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 22) 08:26:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x222480) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r1) socket$l2tp(0x2, 0x2, 0x73) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$SNDCTL_SEQ_OUTOFBAND(r3, 0x40085112, &(0x7f0000000240)=@echo=0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x300, 0x72bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x8090}, 0x40850) 08:26:17 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x440) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0), 0x25200, 0x0) read$sequencer(r3, &(0x7f0000002740)=""/4092, 0x105c) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) r5 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000180)=[@free_buffer={0x40086303, r5}, @dead_binder_done, @decrefs={0x40046307, 0x3}, @acquire_done={0x40106309, 0x2}], 0x3e, 0x0, &(0x7f00000002c0)="69a3da34d0648b1af98a164397116b4827d655938b1106da842bfd157fef56b56052fb1cb3d3008c108d456d82f18fcf7ef0227ba5cfaf401ff233c0cad6"}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000140)=0x5, 0x4) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/devices\x00', 0x0, 0x0) read$sequencer(r7, &(0x7f0000000740)=""/4096, 0x1000) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f0000000040)={'bond_slave_1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x84840, 0x0) 08:26:17 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="9800f85c7d82a5000000000000000000"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="9800f85c7d82a5000000000000000000"], 0x10) (async) 08:26:17 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x558, 0x101, 0x8b, 0x440, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0xd}, 0x48) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x101, 0x3, 0xfffffff7, 0x100, r0, 0x1000, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000faffffff0000000008000000054d0104ff7ffaff1c5a3000100000001814ffe5", @ANYRES32=r1, @ANYBLOB="0000000000000000186a00000c0000000000000004000000776030000000000018140000", @ANYRES32=r3, @ANYBLOB="0000000000000000852000000100000018290000", @ANYRES32=0x1, @ANYBLOB="00000000060000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x1ff, 0xb8, &(0x7f0000000100)=""/184, 0x41100, 0x1e, '\x00', 0x0, 0xc, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0xfffffe0a, 0x10, &(0x7f0000000280)={0x3, 0x9, 0x40, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0x1, r1]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_TIMEBASE(r5, 0xc0045401, &(0x7f0000000400)=0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 23) 08:26:17 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x558, 0x101, 0x8b, 0x440, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0xd}, 0x48) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x101, 0x3, 0xfffffff7, 0x100, r0, 0x1000, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000faffffff0000000008000000054d0104ff7ffaff1c5a3000100000001814ffe5", @ANYRES32=r1, @ANYBLOB="0000000000000000186a00000c0000000000000004000000776030000000000018140000", @ANYRES32=r3, @ANYBLOB="0000000000000000852000000100000018290000", @ANYRES32=0x1, @ANYBLOB="00000000060000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x1ff, 0xb8, &(0x7f0000000100)=""/184, 0x41100, 0x1e, '\x00', 0x0, 0xc, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0xfffffe0a, 0x10, &(0x7f0000000280)={0x3, 0x9, 0x40, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0x1, r1]}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_TMR_TIMEBASE(r5, 0xc0045401, &(0x7f0000000400)=0x4) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:17 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x440) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0), 0x25200, 0x0) read$sequencer(r3, &(0x7f0000002740)=""/4092, 0x105c) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) r5 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000180)=[@free_buffer={0x40086303, r5}, @dead_binder_done, @decrefs={0x40046307, 0x3}, @acquire_done={0x40106309, 0x2}], 0x3e, 0x0, &(0x7f00000002c0)="69a3da34d0648b1af98a164397116b4827d655938b1106da842bfd157fef56b56052fb1cb3d3008c108d456d82f18fcf7ef0227ba5cfaf401ff233c0cad6"}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000140)=0x5, 0x4) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/devices\x00', 0x0, 0x0) read$sequencer(r7, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f0000000040)={'bond_slave_1\x00'}) (async) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x84840, 0x0) 08:26:17 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="9800f85c7d82a5000000000000000000"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="9800f85c7d82a5000000000000000000"], 0x10) (async) 08:26:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x222480) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) (async) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r1) (async) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 64) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$SNDCTL_SEQ_OUTOFBAND(r3, 0x40085112, &(0x7f0000000240)=@echo=0x4) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x300, 0x72bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x8090}, 0x40850) [ 947.874342] FAULT_INJECTION: forcing a failure. [ 947.874342] name failslab, interval 1, probability 0, space 0, times 0 08:26:17 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000340)={0x5c, 0x0, &(0x7f0000000280)=[@transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f00000001c0)={@flat=@binder={0x73622a85, 0x100e}, @fda={0x66646185, 0x8, 0x1, 0x31}, @fda={0x66646185, 0x9, 0x1, 0x1}}, &(0x7f0000000240)={0x0, 0x18, 0x38}}}, @register_looper, @increfs={0x40046304, 0x3}, @register_looper], 0x8, 0x0, &(0x7f0000000300)="ef41d766bb85a5fb"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x38, 0x1404, 0x20, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x7d82b9a45994ff5b}, 0x4000810) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r2) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) 08:26:17 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000340)={0x5c, 0x0, &(0x7f0000000280)=[@transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f00000001c0)={@flat=@binder={0x73622a85, 0x100e}, @fda={0x66646185, 0x8, 0x1, 0x31}, @fda={0x66646185, 0x9, 0x1, 0x1}}, &(0x7f0000000240)={0x0, 0x18, 0x38}}}, @register_looper, @increfs={0x40046304, 0x3}, @register_looper], 0x8, 0x0, &(0x7f0000000300)="ef41d766bb85a5fb"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x38, 0x1404, 0x20, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x7d82b9a45994ff5b}, 0x4000810) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r2) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) [ 947.919274] CPU: 1 PID: 20282 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 947.927179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.936587] Call Trace: [ 947.939185] dump_stack+0x1b2/0x281 [ 947.942821] should_fail.cold+0x10a/0x149 [ 947.946975] should_failslab+0xd6/0x130 [ 947.950957] kmem_cache_alloc_node+0x263/0x410 [ 947.955666] __alloc_skb+0x5c/0x510 [ 947.959301] kobject_uevent_env+0x882/0xf30 [ 947.963628] lo_ioctl+0x11a6/0x1cd0 [ 947.967257] ? loop_set_status64+0xe0/0xe0 [ 947.971496] blkdev_ioctl+0x540/0x1830 [ 947.975382] ? blkpg_ioctl+0x8d0/0x8d0 [ 947.979263] ? trace_hardirqs_on+0x10/0x10 [ 947.983499] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 947.988599] ? debug_check_no_obj_freed+0x2c0/0x680 [ 947.993621] block_ioctl+0xd9/0x120 [ 947.997248] ? blkdev_fallocate+0x3a0/0x3a0 [ 948.001571] do_vfs_ioctl+0x75a/0xff0 [ 948.005390] ? lock_acquire+0x170/0x3f0 [ 948.009367] ? ioctl_preallocate+0x1a0/0x1a0 [ 948.013780] ? __fget+0x265/0x3e0 [ 948.017245] ? do_vfs_ioctl+0xff0/0xff0 [ 948.021220] ? security_file_ioctl+0x83/0xb0 [ 948.025626] SyS_ioctl+0x7f/0xb0 [ 948.028987] ? do_vfs_ioctl+0xff0/0xff0 [ 948.032960] do_syscall_64+0x1d5/0x640 [ 948.036852] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 948.042030] RIP: 0033:0x7f551d045ea7 [ 948.045724] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.053408] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 948.060663] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 948.067918] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 948.075164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 948.082413] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 948.094592] FAULT_INJECTION: forcing a failure. [ 948.094592] name failslab, interval 1, probability 0, space 0, times 0 [ 948.097667] XFS (loop4): unknown mount option [logbsize=]. [ 948.119640] CPU: 1 PID: 20285 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 948.127530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.136868] Call Trace: [ 948.139439] dump_stack+0x1b2/0x281 [ 948.143049] should_fail.cold+0x10a/0x149 [ 948.147180] should_failslab+0xd6/0x130 [ 948.151133] kmem_cache_alloc_node+0x263/0x410 [ 948.155696] __alloc_skb+0x5c/0x510 [ 948.159306] kobject_uevent_env+0x882/0xf30 [ 948.163610] lo_ioctl+0x11a6/0x1cd0 [ 948.167219] ? loop_set_status64+0xe0/0xe0 [ 948.171438] blkdev_ioctl+0x540/0x1830 [ 948.175303] ? blkpg_ioctl+0x8d0/0x8d0 [ 948.179165] ? trace_hardirqs_on+0x10/0x10 [ 948.183384] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 948.188468] ? debug_check_no_obj_freed+0x2c0/0x680 [ 948.193475] block_ioctl+0xd9/0x120 [ 948.197081] ? blkdev_fallocate+0x3a0/0x3a0 [ 948.201381] do_vfs_ioctl+0x75a/0xff0 [ 948.205158] ? lock_acquire+0x170/0x3f0 [ 948.209109] ? ioctl_preallocate+0x1a0/0x1a0 [ 948.213498] ? __fget+0x265/0x3e0 [ 948.216930] ? do_vfs_ioctl+0xff0/0xff0 [ 948.220882] ? security_file_ioctl+0x83/0xb0 [ 948.225267] SyS_ioctl+0x7f/0xb0 [ 948.228618] ? do_vfs_ioctl+0xff0/0xff0 [ 948.232572] do_syscall_64+0x1d5/0x640 [ 948.236441] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 948.241607] RIP: 0033:0x7f1005389ea7 [ 948.245294] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.252978] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 948.260229] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 948.267479] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 948.274818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 948.282065] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 948.292921] XFS (loop0): unknown mount option [logbsize=]. 08:26:17 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 23) 08:26:17 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000340)={0x5c, 0x0, &(0x7f0000000280)=[@transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f00000001c0)={@flat=@binder={0x73622a85, 0x100e}, @fda={0x66646185, 0x8, 0x1, 0x31}, @fda={0x66646185, 0x9, 0x1, 0x1}}, &(0x7f0000000240)={0x0, 0x18, 0x38}}}, @register_looper, @increfs={0x40046304, 0x3}, @register_looper], 0x8, 0x0, &(0x7f0000000300)="ef41d766bb85a5fb"}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x38, 0x1404, 0x20, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x7d82b9a45994ff5b}, 0x4000810) (async, rerun: 32) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 32) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r2) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) 08:26:17 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x558, 0x101, 0x8b, 0x440, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0xd}, 0x48) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x101, 0x3, 0xfffffff7, 0x100, r0, 0x1000, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000faffffff0000000008000000054d0104ff7ffaff1c5a3000100000001814ffe5", @ANYRES32=r1, @ANYBLOB="0000000000000000186a00000c0000000000000004000000776030000000000018140000", @ANYRES32=r3, @ANYBLOB="0000000000000000852000000100000018290000", @ANYRES32=0x1, @ANYBLOB="00000000060000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x1ff, 0xb8, &(0x7f0000000100)=""/184, 0x41100, 0x1e, '\x00', 0x0, 0xc, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0xfffffe0a, 0x10, &(0x7f0000000280)={0x3, 0x9, 0x40, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0x1, r1]}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_TMR_TIMEBASE(r5, 0xc0045401, &(0x7f0000000400)=0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x558, 0x101, 0x8b, 0x440, 0xffffffffffffffff, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2, 0xd}, 0x48) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x101, 0x3, 0xfffffff7, 0x100, r0, 0x1000, '\x00', 0x0, r2, 0x2, 0x0, 0x0, 0x7}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000faffffff0000000008000000054d0104ff7ffaff1c5a3000100000001814ffe5", @ANYRES32=r1, @ANYBLOB="0000000000000000186a00000c0000000000000004000000776030000000000018140000", @ANYRES32=r3, @ANYBLOB="0000000000000000852000000100000018290000", @ANYRES32=0x1, @ANYBLOB="00000000060000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x1ff, 0xb8, &(0x7f0000000100)=""/184, 0x41100, 0x1e, '\x00', 0x0, 0xc, r0, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0xfffffe0a, 0x10, &(0x7f0000000280)={0x3, 0x9, 0x40, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000340)=[0x1, r1]}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_TMR_TIMEBASE(r5, 0xc0045401, &(0x7f0000000400)=0x4) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) 08:26:17 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x440) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0), 0x25200, 0x0) read$sequencer(r3, &(0x7f0000002740)=""/4092, 0x105c) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) r5 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000180)=[@free_buffer={0x40086303, r5}, @dead_binder_done, @decrefs={0x40046307, 0x3}, @acquire_done={0x40106309, 0x2}], 0x3e, 0x0, &(0x7f00000002c0)="69a3da34d0648b1af98a164397116b4827d655938b1106da842bfd157fef56b56052fb1cb3d3008c108d456d82f18fcf7ef0227ba5cfaf401ff233c0cad6"}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000140)=0x5, 0x4) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/devices\x00', 0x0, 0x0) read$sequencer(r7, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$TUNGETIFF(r7, 0x800454d2, &(0x7f0000000040)={'bond_slave_1\x00'}) (async) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x84840, 0x0) 08:26:17 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x222480) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r1) socket$l2tp(0x2, 0x2, 0x73) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$SNDCTL_SEQ_OUTOFBAND(r3, 0x40085112, &(0x7f0000000240)=@echo=0x4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x300, 0x72bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x8090}, 0x40850) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x222480) (async) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r1) (async) socket$l2tp(0x2, 0x2, 0x73) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) ioctl$SNDCTL_SEQ_OUTOFBAND(r3, 0x40085112, &(0x7f0000000240)=@echo=0x4) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x300, 0x72bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x8090}, 0x40850) (async) 08:26:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 24) 08:26:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="a5c9fc227f09a43d2193ffb74d51b70778e1ba319650602f2b010022800b3b9523be1f7e64a03c5e9f1c2d39288f39788e57b20538260c5400c2d8e3a8253ffec187884d32fdf8916e5683ff101fe8dc2be07ac85199c87412ecc62dcd61b06ca58dc4db2b6af9bc65e5a120d25c018ccba49724ef5df254259aa1c9ff3293c753aa911dee5d888a4bce6a9b154137f5157c7fb7d2e5af8ccf94a7e832165d74cd830491a7300e270864ff1426ffd679578546e2f754a1e89a87afdcde9d186ce466b2fafedcc1fa9c99a2c3acf4fbb2114aaae41a19786f91376cf85e", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x8, 0x1, 0x8, 0x4d4, r2, 0x3, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="01fdcfa54c7b7fc900000001", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)) [ 948.405229] FAULT_INJECTION: forcing a failure. [ 948.405229] name failslab, interval 1, probability 0, space 0, times 0 [ 948.428132] CPU: 1 PID: 20347 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 948.436038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.445390] Call Trace: [ 948.447982] dump_stack+0x1b2/0x281 08:26:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="a5c9fc227f09a43d2193ffb74d51b70778e1ba319650602f2b010022800b3b9523be1f7e64a03c5e9f1c2d39288f39788e57b20538260c5400c2d8e3a8253ffec187884d32fdf8916e5683ff101fe8dc2be07ac85199c87412ecc62dcd61b06ca58dc4db2b6af9bc65e5a120d25c018ccba49724ef5df254259aa1c9ff3293c753aa911dee5d888a4bce6a9b154137f5157c7fb7d2e5af8ccf94a7e832165d74cd830491a7300e270864ff1426ffd679578546e2f754a1e89a87afdcde9d186ce466b2fafedcc1fa9c99a2c3acf4fbb2114aaae41a19786f91376cf85e", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x8, 0x1, 0x8, 0x4d4, r2, 0x3, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="01fdcfa54c7b7fc900000001", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)) [ 948.451615] should_fail.cold+0x10a/0x149 [ 948.455757] should_failslab+0xd6/0x130 [ 948.459729] kmem_cache_alloc_node+0x263/0x410 [ 948.464305] __alloc_skb+0x5c/0x510 [ 948.467921] kobject_uevent_env+0x882/0xf30 [ 948.472243] lo_ioctl+0x11a6/0x1cd0 [ 948.475858] ? loop_set_status64+0xe0/0xe0 [ 948.480077] blkdev_ioctl+0x540/0x1830 [ 948.483952] ? blkpg_ioctl+0x8d0/0x8d0 [ 948.487857] ? trace_hardirqs_on+0x10/0x10 [ 948.492081] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 948.497182] ? debug_check_no_obj_freed+0x2c0/0x680 [ 948.502186] block_ioctl+0xd9/0x120 [ 948.505808] ? blkdev_fallocate+0x3a0/0x3a0 [ 948.510120] do_vfs_ioctl+0x75a/0xff0 [ 948.513909] ? lock_acquire+0x170/0x3f0 [ 948.517876] ? ioctl_preallocate+0x1a0/0x1a0 [ 948.522265] ? __fget+0x265/0x3e0 [ 948.525704] ? do_vfs_ioctl+0xff0/0xff0 [ 948.529658] ? security_file_ioctl+0x83/0xb0 [ 948.534057] SyS_ioctl+0x7f/0xb0 [ 948.537411] ? do_vfs_ioctl+0xff0/0xff0 [ 948.541372] do_syscall_64+0x1d5/0x640 [ 948.545247] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 948.550417] RIP: 0033:0x7f551d045ea7 [ 948.554104] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.561789] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 948.569036] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 948.576368] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 948.583619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 948.590865] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:17 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000), 0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = dup(r0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x1410, 0x4, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r3, r4, 0x2}, 0x10) sendmsg$802154_dgram(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f0000000080)={&(0x7f0000000140)="657d5467117e481d05137817fb3b561e295555f5dd1c86ba2bc1b86c06e72abbb881c5ae6f57cc9ae7cfc8616d731983ca023c3556c079d0c15c9c5b669fcf28122b7c3fb0a5dc70f46f635aa987f4fbe47a5b48ae2661942a6c1559c693f026483f73d45fb7b30a781826ae383a965243da72f52b62522b437b3870ad66eb4201a2363063f44a73fd5a9482c3fa60126822f4f64a7603573c6ee1054213145850dc4466d0b5f5a968b60a666b823dbe549e0287ee27d8c24a9a081faad75b6335db5f7b32549a9c1ad47b65cf2fcf84a6a521deff5358510b97090e720f", 0xde}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000000) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000008000000000000000000"], 0x10) 08:26:17 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc000, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x13dacae0, 0x9, 0x3f, 0x1}, 0x10) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) 08:26:17 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40010) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1404, 0x200, 0x70bd29, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x40800}, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x2404c8d0}, 0x40000d0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r3}) [ 948.604171] FAULT_INJECTION: forcing a failure. [ 948.604171] name failslab, interval 1, probability 0, space 0, times 0 [ 948.617645] XFS (loop4): unknown mount option [logbsize=]. [ 948.628619] CPU: 1 PID: 20358 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 948.636520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.645876] Call Trace: [ 948.648467] dump_stack+0x1b2/0x281 [ 948.652101] should_fail.cold+0x10a/0x149 08:26:17 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc000, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x13dacae0, 0x9, 0x3f, 0x1}, 0x10) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc000, 0x0) (async) dup(r1) (async) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x13dacae0, 0x9, 0x3f, 0x1}, 0x10) (async) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) (async) [ 948.656255] should_failslab+0xd6/0x130 [ 948.660233] kmem_cache_alloc_node+0x263/0x410 [ 948.664825] __alloc_skb+0x5c/0x510 [ 948.668484] kobject_uevent_env+0x882/0xf30 [ 948.672828] lo_ioctl+0x11a6/0x1cd0 [ 948.676462] ? loop_set_status64+0xe0/0xe0 [ 948.680702] blkdev_ioctl+0x540/0x1830 [ 948.684591] ? blkpg_ioctl+0x8d0/0x8d0 [ 948.688469] ? trace_hardirqs_on+0x10/0x10 [ 948.692691] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 948.697779] ? debug_check_no_obj_freed+0x2c0/0x680 [ 948.702781] block_ioctl+0xd9/0x120 [ 948.706387] ? blkdev_fallocate+0x3a0/0x3a0 [ 948.710689] do_vfs_ioctl+0x75a/0xff0 [ 948.714471] ? lock_acquire+0x170/0x3f0 [ 948.718429] ? ioctl_preallocate+0x1a0/0x1a0 [ 948.722817] ? __fget+0x265/0x3e0 [ 948.726253] ? do_vfs_ioctl+0xff0/0xff0 [ 948.730213] ? security_file_ioctl+0x83/0xb0 [ 948.734601] SyS_ioctl+0x7f/0xb0 [ 948.737946] ? do_vfs_ioctl+0xff0/0xff0 [ 948.741917] do_syscall_64+0x1d5/0x640 [ 948.745800] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 948.750969] RIP: 0033:0x7f1005389ea7 [ 948.754660] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.762350] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 948.769600] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 948.776853] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 948.784100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 948.791349] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 948.800386] XFS (loop0): unknown mount option [logbsize=]. 08:26:18 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 24) 08:26:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vxcan0\x00', 0x0}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="a5c9fc227f09a43d2193ffb74d51b70778e1ba319650602f2b010022800b3b9523be1f7e64a03c5e9f1c2d39288f39788e57b20538260c5400c2d8e3a8253ffec187884d32fdf8916e5683ff101fe8dc2be07ac85199c87412ecc62dcd61b06ca58dc4db2b6af9bc65e5a120d25c018ccba49724ef5df254259aa1c9ff3293c753aa911dee5d888a4bce6a9b154137f5157c7fb7d2e5af8ccf94a7e832165d74cd830491a7300e270864ff1426ffd679578546e2f754a1e89a87afdcde9d186ce466b2fafedcc1fa9c99a2c3acf4fbb2114aaae41a19786f91376cf85e", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x8, 0x1, 0x8, 0x4d4, r2, 0x3, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="01fdcfa54c7b7fc900000001", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vxcan0\x00'}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="a5c9fc227f09a43d2193ffb74d51b70778e1ba319650602f2b010022800b3b9523be1f7e64a03c5e9f1c2d39288f39788e57b20538260c5400c2d8e3a8253ffec187884d32fdf8916e5683ff101fe8dc2be07ac85199c87412ecc62dcd61b06ca58dc4db2b6af9bc65e5a120d25c018ccba49724ef5df254259aa1c9ff3293c753aa911dee5d888a4bce6a9b154137f5157c7fb7d2e5af8ccf94a7e832165d74cd830491a7300e270864ff1426ffd679578546e2f754a1e89a87afdcde9d186ce466b2fafedcc1fa9c99a2c3acf4fbb2114aaae41a19786f91376cf85e", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x11, 0x8, 0x1, 0x8, 0x4d4, r2, 0x3, '\x00', r3, r4, 0x1, 0x0, 0x4}, 0x48) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="01fdcfa54c7b7fc900000001", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)) (async) 08:26:18 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc000, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000040)={0x13dacae0, 0x9, 0x3f, 0x1}, 0x10) (async) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) 08:26:18 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40010) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1404, 0x200, 0x70bd29, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x40800}, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x2404c8d0}, 0x40000d0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r3}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40010) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1404, 0x200, 0x70bd29, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x40800}, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$SMC_PNETID_GET(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x2404c8d0}, 0x40000d0) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r3}) (async) 08:26:18 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000), 0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) r4 = dup(r0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x1410, 0x4, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) (async, rerun: 64) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r3, r4, 0x2}, 0x10) (async, rerun: 64) sendmsg$802154_dgram(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f0000000080)={&(0x7f0000000140)="657d5467117e481d05137817fb3b561e295555f5dd1c86ba2bc1b86c06e72abbb881c5ae6f57cc9ae7cfc8616d731983ca023c3556c079d0c15c9c5b669fcf28122b7c3fb0a5dc70f46f635aa987f4fbe47a5b48ae2661942a6c1559c693f026483f73d45fb7b30a781826ae383a965243da72f52b62522b437b3870ad66eb4201a2363063f44a73fd5a9482c3fa60126822f4f64a7603573c6ee1054213145850dc4466d0b5f5a968b60a666b823dbe549e0287ee27d8c24a9a081faad75b6335db5f7b32549a9c1ad47b65cf2fcf84a6a521deff5358510b97090e720f", 0xde}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000000) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000008000000000000000000"], 0x10) 08:26:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 25) 08:26:18 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000), 0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) r4 = dup(r0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x1410, 0x4, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r3, r4, 0x2}, 0x10) sendmsg$802154_dgram(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f0000000080)={&(0x7f0000000140)="657d5467117e481d05137817fb3b561e295555f5dd1c86ba2bc1b86c06e72abbb881c5ae6f57cc9ae7cfc8616d731983ca023c3556c079d0c15c9c5b669fcf28122b7c3fb0a5dc70f46f635aa987f4fbe47a5b48ae2661942a6c1559c693f026483f73d45fb7b30a781826ae383a965243da72f52b62522b437b3870ad66eb4201a2363063f44a73fd5a9482c3fa60126822f4f64a7603573c6ee1054213145850dc4466d0b5f5a968b60a666b823dbe549e0287ee27d8c24a9a081faad75b6335db5f7b32549a9c1ad47b65cf2fcf84a6a521deff5358510b97090e720f", 0xde}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000000) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000008000000000000000000"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) setsockopt$WPAN_SECURITY(r2, 0x0, 0x1, &(0x7f0000000000), 0x4) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) dup(r0) (async) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x1410, 0x4, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r3, r4, 0x2}, 0x10) (async) sendmsg$802154_dgram(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x14, &(0x7f0000000080)={&(0x7f0000000140)="657d5467117e481d05137817fb3b561e295555f5dd1c86ba2bc1b86c06e72abbb881c5ae6f57cc9ae7cfc8616d731983ca023c3556c079d0c15c9c5b669fcf28122b7c3fb0a5dc70f46f635aa987f4fbe47a5b48ae2661942a6c1559c693f026483f73d45fb7b30a781826ae383a965243da72f52b62522b437b3870ad66eb4201a2363063f44a73fd5a9482c3fa60126822f4f64a7603573c6ee1054213145850dc4466d0b5f5a968b60a666b823dbe549e0287ee27d8c24a9a081faad75b6335db5f7b32549a9c1ad47b65cf2fcf84a6a521deff5358510b97090e720f", 0xde}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000000) (async) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000008000000000000000000"], 0x10) (async) 08:26:18 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) 08:26:18 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40010) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1404, 0x200, 0x70bd29, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x40800}, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x2404c8d0}, 0x40000d0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r3}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00'}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40010) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x1404, 0x200, 0x70bd29, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x40800}, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$SMC_PNETID_GET(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x2404c8d0}, 0x40000d0) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r3}) (async) 08:26:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x2, 0x2, 0x3, "5a634459dcf48f8b4854b10401833cab78aefea235a4509c94f4906497c8b7943760330388ef9225c77b952b064c8bc84652c3a1cfbaea3a69318a0d45db3864219455b4cd822814514f5ca67d9120f743c2b551b56aebbaca4fc11fcdc2e540e2b93b81d3a9299b67614a2f2d1104e86ede26e35ed2361bba9ca692d5629b8070fbccc0b50fdb98b8e2cca5ce1ca744b5f898ed4312e523bbebecf733a29a8bef452e8e0c99001cd9d5d3aeab4c78284440eb53e96a6b39028d9ece0d0619bbca3f1e018c3fc8c6bb88070d13ee0db4fc506568e964640b9a5304436301de6d62045dc80fc64b29fcf3d4578167a8"}, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 948.887873] FAULT_INJECTION: forcing a failure. [ 948.887873] name failslab, interval 1, probability 0, space 0, times 0 [ 948.905011] CPU: 1 PID: 20407 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 948.912927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.922278] Call Trace: [ 948.924868] dump_stack+0x1b2/0x281 [ 948.928505] should_fail.cold+0x10a/0x149 [ 948.932664] should_failslab+0xd6/0x130 08:26:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x2, 0x2, 0x3, "5a634459dcf48f8b4854b10401833cab78aefea235a4509c94f4906497c8b7943760330388ef9225c77b952b064c8bc84652c3a1cfbaea3a69318a0d45db3864219455b4cd822814514f5ca67d9120f743c2b551b56aebbaca4fc11fcdc2e540e2b93b81d3a9299b67614a2f2d1104e86ede26e35ed2361bba9ca692d5629b8070fbccc0b50fdb98b8e2cca5ce1ca744b5f898ed4312e523bbebecf733a29a8bef452e8e0c99001cd9d5d3aeab4c78284440eb53e96a6b39028d9ece0d0619bbca3f1e018c3fc8c6bb88070d13ee0db4fc506568e964640b9a5304436301de6d62045dc80fc64b29fcf3d4578167a8"}, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6744669800000000020004000200000019c60f105b62042953dc24b6c856661a876e7c1fba3b6c8cc7e22ddf4add91a4f9fc9389f697b23a7e943c8f589dac083202b2d97373d3cbf529f9891b288e869ba9dd09b5acc7ea41c03d5b4fc2b34331ebc89815f343f6638306e90bd206cd144ea58bcaa7f405509e4977915f8262f5d00f9979909404108eb81a5eb114ac066f00f87bf6f1cacf45612709181cc0689520b2848af605f60722b7e2e360ccaf7f91dc8425d7114f5d"], 0x93) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0xfb62cd787268ef6b, 0x0) write$nbd(r2, &(0x7f00000002c0)={0x67446698, 0x0, 0x109, 0x5, 0xfffffffe, "c445ec42f500014da4cb03fb04754651133f9b56882d602ec9b406868021faa9ed67e0742cb1d72ff96888a281016f55f7bbef5822076147fada336ba830631dd8cf544ba63fab37ef48ff166b9ccbebda3c64cbde518763d2d69eba19f456d126c809c6f2572e51a485ac057b65aaa0c9433bdd15e8e73a15fa77d382e81fdd821965bc0eaed4d7d16d55154876d9f3d38de15ba32d6cbb202c6ac852bd8346fe20f59ba90000000000000000"}, 0xbd) r3 = dup(r0) ioctl$RTC_AIE_ON(r3, 0x7001) [ 948.936649] kmem_cache_alloc_node+0x263/0x410 [ 948.941233] __alloc_skb+0x5c/0x510 [ 948.944871] kobject_uevent_env+0x882/0xf30 [ 948.949205] lo_ioctl+0x11a6/0x1cd0 [ 948.952837] ? loop_set_status64+0xe0/0xe0 [ 948.957074] blkdev_ioctl+0x540/0x1830 [ 948.960963] ? blkpg_ioctl+0x8d0/0x8d0 [ 948.964853] ? trace_hardirqs_on+0x10/0x10 [ 948.969087] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 948.974102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.978870] block_ioctl+0xd9/0x120 [ 948.982495] ? blkdev_fallocate+0x3a0/0x3a0 [ 948.986814] do_vfs_ioctl+0x75a/0xff0 [ 948.990627] ? lock_acquire+0x170/0x3f0 [ 948.994595] ? ioctl_preallocate+0x1a0/0x1a0 [ 948.998997] ? __fget+0x265/0x3e0 [ 949.002430] ? do_vfs_ioctl+0xff0/0xff0 [ 949.006394] ? security_file_ioctl+0x83/0xb0 [ 949.010786] SyS_ioctl+0x7f/0xb0 [ 949.014138] ? do_vfs_ioctl+0xff0/0xff0 [ 949.018103] do_syscall_64+0x1d5/0x640 [ 949.021975] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 949.027145] RIP: 0033:0x7f1005389ea7 [ 949.030834] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.038536] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 949.045786] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 949.053037] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 949.060288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 949.067544] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 949.084522] FAULT_INJECTION: forcing a failure. [ 949.084522] name failslab, interval 1, probability 0, space 0, times 0 [ 949.085909] XFS (loop0): unknown mount option [logbsize=]. [ 949.102034] CPU: 1 PID: 20408 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 949.109919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.119270] Call Trace: [ 949.121851] dump_stack+0x1b2/0x281 [ 949.125484] should_fail.cold+0x10a/0x149 [ 949.129618] should_failslab+0xd6/0x130 [ 949.133575] kmem_cache_alloc_node_trace+0x25a/0x400 [ 949.138660] __kmalloc_node_track_caller+0x38/0x70 [ 949.143567] __alloc_skb+0x96/0x510 [ 949.147177] kobject_uevent_env+0x882/0xf30 [ 949.151488] lo_ioctl+0x11a6/0x1cd0 [ 949.155097] ? loop_set_status64+0xe0/0xe0 [ 949.159313] blkdev_ioctl+0x540/0x1830 [ 949.163178] ? blkpg_ioctl+0x8d0/0x8d0 [ 949.167047] ? trace_hardirqs_on+0x10/0x10 [ 949.171269] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 949.176355] ? debug_check_no_obj_freed+0x2c0/0x680 [ 949.181362] block_ioctl+0xd9/0x120 [ 949.184976] ? blkdev_fallocate+0x3a0/0x3a0 [ 949.189276] do_vfs_ioctl+0x75a/0xff0 [ 949.193060] ? lock_acquire+0x170/0x3f0 [ 949.197013] ? ioctl_preallocate+0x1a0/0x1a0 [ 949.201401] ? __fget+0x265/0x3e0 [ 949.204831] ? do_vfs_ioctl+0xff0/0xff0 [ 949.208791] ? security_file_ioctl+0x83/0xb0 [ 949.213192] SyS_ioctl+0x7f/0xb0 [ 949.216547] ? do_vfs_ioctl+0xff0/0xff0 [ 949.220500] do_syscall_64+0x1d5/0x640 [ 949.224372] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 949.229540] RIP: 0033:0x7f551d045ea7 08:26:18 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 25) 08:26:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x2, 0x2, 0x3, "5a634459dcf48f8b4854b10401833cab78aefea235a4509c94f4906497c8b7943760330388ef9225c77b952b064c8bc84652c3a1cfbaea3a69318a0d45db3864219455b4cd822814514f5ca67d9120f743c2b551b56aebbaca4fc11fcdc2e540e2b93b81d3a9299b67614a2f2d1104e86ede26e35ed2361bba9ca692d5629b8070fbccc0b50fdb98b8e2cca5ce1ca744b5f898ed4312e523bbebecf733a29a8bef452e8e0c99001cd9d5d3aeab4c78284440eb53e96a6b39028d9ece0d0619bbca3f1e018c3fc8c6bb88070d13ee0db4fc506568e964640b9a5304436301de6d62045dc80fc64b29fcf3d4578167a8"}, 0xff) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6744669800000000020004000200000019c60f105b62042953dc24b6c856661a876e7c1fba3b6c8cc7e22ddf4add91a4f9fc9389f697b23a7e943c8f589dac083202b2d97373d3cbf529f9891b288e869ba9dd09b5acc7ea41c03d5b4fc2b34331ebc89815f343f6638306e90bd206cd144ea58bcaa7f405509e4977915f8262f5d00f9979909404108eb81a5eb114ac066f00f87bf6f1cacf45612709181cc0689520b2848af605f60722b7e2e360ccaf7f91dc8425d7114f5d"], 0x93) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0xfb62cd787268ef6b, 0x0) write$nbd(r2, &(0x7f00000002c0)={0x67446698, 0x0, 0x109, 0x5, 0xfffffffe, "c445ec42f500014da4cb03fb04754651133f9b56882d602ec9b406868021faa9ed67e0742cb1d72ff96888a281016f55f7bbef5822076147fada336ba830631dd8cf544ba63fab37ef48ff166b9ccbebda3c64cbde518763d2d69eba19f456d126c809c6f2572e51a485ac057b65aaa0c9433bdd15e8e73a15fa77d382e81fdd821965bc0eaed4d7d16d55154876d9f3d38de15ba32d6cbb202c6ac852bd8346fe20f59ba90000000000000000"}, 0xbd) r3 = dup(r0) ioctl$RTC_AIE_ON(r3, 0x7001) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f00000000c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) (async) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6744669800000000020004000200000019c60f105b62042953dc24b6c856661a876e7c1fba3b6c8cc7e22ddf4add91a4f9fc9389f697b23a7e943c8f589dac083202b2d97373d3cbf529f9891b288e869ba9dd09b5acc7ea41c03d5b4fc2b34331ebc89815f343f6638306e90bd206cd144ea58bcaa7f405509e4977915f8262f5d00f9979909404108eb81a5eb114ac066f00f87bf6f1cacf45612709181cc0689520b2848af605f60722b7e2e360ccaf7f91dc8425d7114f5d"], 0x93) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0xfb62cd787268ef6b, 0x0) (async) write$nbd(r2, &(0x7f00000002c0)={0x67446698, 0x0, 0x109, 0x5, 0xfffffffe, "c445ec42f500014da4cb03fb04754651133f9b56882d602ec9b406868021faa9ed67e0742cb1d72ff96888a281016f55f7bbef5822076147fada336ba830631dd8cf544ba63fab37ef48ff166b9ccbebda3c64cbde518763d2d69eba19f456d126c809c6f2572e51a485ac057b65aaa0c9433bdd15e8e73a15fa77d382e81fdd821965bc0eaed4d7d16d55154876d9f3d38de15ba32d6cbb202c6ac852bd8346fe20f59ba90000000000000000"}, 0xbd) (async) dup(r0) (async) ioctl$RTC_AIE_ON(r3, 0x7001) (async) 08:26:18 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6744669800000000000000000000000052afe51ec22a91506530c70aceb5ce49448a794312c6b6f6d49da761f5b2280000000001000000829a92ad9c63a124b33d6d0fbbadb34c321b0efd2ce88e3df68cc46fc94f7367aa2fbbf2913fd604dc52fc1a427e08789532f591"], 0x10) 08:26:18 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) [ 949.233229] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.240917] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 949.248168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 949.255417] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 949.262670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 949.269918] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 949.278846] XFS (loop4): unknown mount option [logbsize=]. 08:26:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 26) 08:26:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) 08:26:18 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6744669800000000000000000000000052afe51ec22a91506530c70aceb5ce49448a794312c6b6f6d49da761f5b2280000000001000000829a92ad9c63a124b33d6d0fbbadb34c321b0efd2ce88e3df68cc46fc94f7367aa2fbbf2913fd604dc52fc1a427e08789532f591"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6744669800000000000000000000000052afe51ec22a91506530c70aceb5ce49448a794312c6b6f6d49da761f5b2280000000001000000829a92ad9c63a124b33d6d0fbbadb34c321b0efd2ce88e3df68cc46fc94f7367aa2fbbf2913fd604dc52fc1a427e08789532f591"], 0x10) (async) 08:26:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) [ 949.349286] FAULT_INJECTION: forcing a failure. [ 949.349286] name failslab, interval 1, probability 0, space 0, times 0 [ 949.378438] CPU: 0 PID: 20484 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 949.386348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.395704] Call Trace: 08:26:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) 08:26:18 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4062, 0xfde) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00eaf2d6000010dbdf2501efffff0400060003000002b05f9401118a997a623362f590a94d2876c320e6e75ecaa7aa6ec85e6c9b3ea9b1827bcc459faca5c8846810b29984d51dd20935eada80b462b0e7b173b595c3e7399f73b4b9f47eaef789306a12b0dbc744ddaa3dccfb09e46bf613712da029e7dd8227898390d3c4cce870c5ea082c4c356f21b91f7660798aeec5f76c42f89922b9f19b1e847cee325bc7076aa4db4de610fdb84fbac71d3fdfd29bca3cad0884f0fe82026f7fe4db5b644861904972366e374b5aef8800f8578e7a50154204e1b3a3e94e1d083265fe9029999fb9"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/tty/drivers\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400), r0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r4, 0x400, 0x70bd2c, 0x2, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80000001}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6739}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000801}, 0x4) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x50, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @remote}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_TID={0xc}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_LINK={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4040000}, 0x40080) ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000000)=0x5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) read$sequencer(r6, &(0x7f0000000100)=""/180, 0xb4) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 949.398304] dump_stack+0x1b2/0x281 [ 949.401946] should_fail.cold+0x10a/0x149 [ 949.406104] should_failslab+0xd6/0x130 [ 949.410088] kmem_cache_alloc_node_trace+0x25a/0x400 [ 949.415192] __kmalloc_node_track_caller+0x38/0x70 [ 949.420131] __alloc_skb+0x96/0x510 [ 949.423770] kobject_uevent_env+0x882/0xf30 [ 949.428107] lo_ioctl+0x11a6/0x1cd0 [ 949.431739] ? loop_set_status64+0xe0/0xe0 [ 949.435982] blkdev_ioctl+0x540/0x1830 [ 949.439870] ? blkpg_ioctl+0x8d0/0x8d0 [ 949.443758] ? trace_hardirqs_on+0x10/0x10 08:26:18 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4062, 0xfde) (async) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00eaf2d6000010dbdf2501efffff0400060003000002b05f9401118a997a623362f590a94d2876c320e6e75ecaa7aa6ec85e6c9b3ea9b1827bcc459faca5c8846810b29984d51dd20935eada80b462b0e7b173b595c3e7399f73b4b9f47eaef789306a12b0dbc744ddaa3dccfb09e46bf613712da029e7dd8227898390d3c4cce870c5ea082c4c356f21b91f7660798aeec5f76c42f89922b9f19b1e847cee325bc7076aa4db4de610fdb84fbac71d3fdfd29bca3cad0884f0fe82026f7fe4db5b644861904972366e374b5aef8800f8578e7a50154204e1b3a3e94e1d083265fe9029999fb9"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/tty/drivers\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400), r0) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r4, 0x400, 0x70bd2c, 0x2, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80000001}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6739}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000801}, 0x4) (async) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x50, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @remote}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_TID={0xc}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_LINK={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4040000}, 0x40080) (async) ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000000)=0x5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) (async) read$sequencer(r6, &(0x7f0000000100)=""/180, 0xb4) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 949.447997] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 949.453101] ? debug_check_no_obj_freed+0x2c0/0x680 [ 949.458123] block_ioctl+0xd9/0x120 [ 949.461752] ? blkdev_fallocate+0x3a0/0x3a0 [ 949.466090] do_vfs_ioctl+0x75a/0xff0 [ 949.469881] ? lock_acquire+0x170/0x3f0 [ 949.473847] ? ioctl_preallocate+0x1a0/0x1a0 [ 949.478256] ? __fget+0x265/0x3e0 [ 949.481713] ? do_vfs_ioctl+0xff0/0xff0 [ 949.485686] ? security_file_ioctl+0x83/0xb0 [ 949.490087] SyS_ioctl+0x7f/0xb0 [ 949.493454] ? do_vfs_ioctl+0xff0/0xff0 [ 949.497416] do_syscall_64+0x1d5/0x640 [ 949.501295] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 949.506473] RIP: 0033:0x7f1005389ea7 [ 949.510168] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.517867] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 949.525116] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 949.532375] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 949.539630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 949.546880] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 949.561584] FAULT_INJECTION: forcing a failure. [ 949.561584] name failslab, interval 1, probability 0, space 0, times 0 [ 949.575304] XFS (loop0): unknown mount option [logbsize=]. [ 949.582677] CPU: 0 PID: 20497 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 949.590570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.599923] Call Trace: [ 949.602513] dump_stack+0x1b2/0x281 [ 949.606136] should_fail.cold+0x10a/0x149 [ 949.610274] should_failslab+0xd6/0x130 [ 949.614235] kmem_cache_alloc_node+0x263/0x410 [ 949.618800] __alloc_skb+0x5c/0x510 [ 949.622419] kobject_uevent_env+0x882/0xf30 [ 949.626738] lo_ioctl+0x11a6/0x1cd0 [ 949.630358] ? loop_set_status64+0xe0/0xe0 [ 949.634592] blkdev_ioctl+0x540/0x1830 [ 949.638466] ? blkpg_ioctl+0x8d0/0x8d0 [ 949.642353] ? trace_hardirqs_on+0x10/0x10 [ 949.646581] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 949.651665] ? debug_check_no_obj_freed+0x2c0/0x680 [ 949.656665] block_ioctl+0xd9/0x120 [ 949.660289] ? blkdev_fallocate+0x3a0/0x3a0 [ 949.664599] do_vfs_ioctl+0x75a/0xff0 [ 949.668388] ? lock_acquire+0x170/0x3f0 [ 949.672352] ? ioctl_preallocate+0x1a0/0x1a0 [ 949.676748] ? __fget+0x265/0x3e0 [ 949.680189] ? do_vfs_ioctl+0xff0/0xff0 [ 949.684158] ? security_file_ioctl+0x83/0xb0 [ 949.688554] SyS_ioctl+0x7f/0xb0 [ 949.691902] ? do_vfs_ioctl+0xff0/0xff0 [ 949.695855] do_syscall_64+0x1d5/0x640 [ 949.699724] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 949.704892] RIP: 0033:0x7f551d045ea7 [ 949.708581] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.716264] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 949.723519] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 949.730781] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 949.738037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:26:19 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 26) 08:26:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000001740)=""/4062, 0xfde) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="00eaf2d6000010dbdf2501efffff0400060003000002b05f9401118a997a623362f590a94d2876c320e6e75ecaa7aa6ec85e6c9b3ea9b1827bcc459faca5c8846810b29984d51dd20935eada80b462b0e7b173b595c3e7399f73b4b9f47eaef789306a12b0dbc744ddaa3dccfb09e46bf613712da029e7dd8227898390d3c4cce870c5ea082c4c356f21b91f7660798aeec5f76c42f89922b9f19b1e847cee325bc7076aa4db4de610fdb84fbac71d3fdfd29bca3cad0884f0fe82026f7fe4db5b644861904972366e374b5aef8800f8578e7a50154204e1b3a3e94e1d083265fe9029999fb9"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/tty/drivers\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400), r0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r4, 0x400, 0x70bd2c, 0x2, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x40}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80000001}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6739}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000801}, 0x4) (async) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x50, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @remote}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_TID={0xc}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}, @GTPA_LINK={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4040000}, 0x40080) (async) ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000000)=0x5) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) read$sequencer(r6, &(0x7f0000000100)=""/180, 0xb4) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6744669800000000000000000000000052afe51ec22a91506530c70aceb5ce49448a794312c6b6f6d49da761f5b2280000000001000000829a92ad9c63a124b33d6d0fbbadb34c321b0efd2ce88e3df68cc46fc94f7367aa2fbbf2913fd604dc52fc1a427e08789532f591"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6744669800000000000000000000000052afe51ec22a91506530c70aceb5ce49448a794312c6b6f6d49da761f5b2280000000001000000829a92ad9c63a124b33d6d0fbbadb34c321b0efd2ce88e3df68cc46fc94f7367aa2fbbf2913fd604dc52fc1a427e08789532f591"], 0x10) (async) 08:26:19 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) 08:26:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6744669800000000020004000200000019c60f105b62042953dc24b6c856661a876e7c1fba3b6c8cc7e22ddf4add91a4f9fc9389f697b23a7e943c8f589dac083202b2d97373d3cbf529f9891b288e869ba9dd09b5acc7ea41c03d5b4fc2b34331ebc89815f343f6638306e90bd206cd144ea58bcaa7f405509e4977915f8262f5d00f9979909404108eb81a5eb114ac066f00f87bf6f1cacf45612709181cc0689520b2848af605f60722b7e2e360ccaf7f91dc8425d7114f5d"], 0x93) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0xfb62cd787268ef6b, 0x0) (async) write$nbd(r2, &(0x7f00000002c0)={0x67446698, 0x0, 0x109, 0x5, 0xfffffffe, "c445ec42f500014da4cb03fb04754651133f9b56882d602ec9b406868021faa9ed67e0742cb1d72ff96888a281016f55f7bbef5822076147fada336ba830631dd8cf544ba63fab37ef48ff166b9ccbebda3c64cbde518763d2d69eba19f456d126c809c6f2572e51a485ac057b65aaa0c9433bdd15e8e73a15fa77d382e81fdd821965bc0eaed4d7d16d55154876d9f3d38de15ba32d6cbb202c6ac852bd8346fe20f59ba90000000000000000"}, 0xbd) r3 = dup(r0) ioctl$RTC_AIE_ON(r3, 0x7001) [ 949.745304] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 949.768496] XFS (loop4): unknown mount option [logbsize=]. 08:26:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 27) 08:26:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0202}}}, 0x14) 08:26:19 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x403) ioctl$SNDCTL_SEQ_NRSYNTHS(r1, 0x8004510a, &(0x7f0000000040)) write$nbd(r0, 0x0, 0x0) 08:26:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) (async, rerun: 32) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0202}}}, 0x14) 08:26:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) connect$802154_dgram(r1, &(0x7f0000000040)={0x24, @short={0x2, 0x3, 0xaaa0}}, 0x14) write$nbd(r0, &(0x7f0000000100), 0x10) [ 949.842263] FAULT_INJECTION: forcing a failure. [ 949.842263] name failslab, interval 1, probability 0, space 0, times 0 08:26:19 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x1f, 0x4, 0x80, 0x9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) (async) bind$802154_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0202}}}, 0x14) [ 949.883683] CPU: 1 PID: 20540 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 949.891605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.900960] Call Trace: [ 949.903559] dump_stack+0x1b2/0x281 [ 949.907204] should_fail.cold+0x10a/0x149 [ 949.911364] should_failslab+0xd6/0x130 [ 949.915344] kmem_cache_alloc_node+0x263/0x410 [ 949.919932] __alloc_skb+0x5c/0x510 [ 949.923570] kobject_uevent_env+0x882/0xf30 [ 949.927901] lo_ioctl+0x11a6/0x1cd0 [ 949.931533] ? loop_set_status64+0xe0/0xe0 [ 949.935765] blkdev_ioctl+0x540/0x1830 [ 949.939642] ? blkpg_ioctl+0x8d0/0x8d0 [ 949.943609] ? trace_hardirqs_on+0x10/0x10 [ 949.947833] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 949.952839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.957577] block_ioctl+0xd9/0x120 [ 949.961183] ? blkdev_fallocate+0x3a0/0x3a0 [ 949.965488] do_vfs_ioctl+0x75a/0xff0 [ 949.969277] ? lock_acquire+0x170/0x3f0 [ 949.973230] ? ioctl_preallocate+0x1a0/0x1a0 [ 949.977623] ? __fget+0x265/0x3e0 [ 949.981064] ? do_vfs_ioctl+0xff0/0xff0 [ 949.985020] ? security_file_ioctl+0x83/0xb0 [ 949.989416] SyS_ioctl+0x7f/0xb0 [ 949.992764] ? do_vfs_ioctl+0xff0/0xff0 [ 949.996720] do_syscall_64+0x1d5/0x640 [ 950.000591] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 950.005768] RIP: 0033:0x7f1005389ea7 [ 950.009466] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.017153] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 950.024405] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 950.031662] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 950.038917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 950.046165] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 950.062960] FAULT_INJECTION: forcing a failure. [ 950.062960] name failslab, interval 1, probability 0, space 0, times 0 [ 950.074668] XFS (loop0): unknown mount option [logbsize=]. [ 950.075470] CPU: 0 PID: 20545 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 950.088191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.097529] Call Trace: [ 950.100107] dump_stack+0x1b2/0x281 [ 950.103730] should_fail.cold+0x10a/0x149 [ 950.107869] should_failslab+0xd6/0x130 [ 950.111825] kmem_cache_alloc_node+0x263/0x410 [ 950.116389] __alloc_skb+0x5c/0x510 [ 950.119998] kobject_uevent_env+0x882/0xf30 [ 950.124311] lo_ioctl+0x11a6/0x1cd0 [ 950.127920] ? loop_set_status64+0xe0/0xe0 [ 950.132137] blkdev_ioctl+0x540/0x1830 [ 950.136002] ? blkpg_ioctl+0x8d0/0x8d0 [ 950.139869] ? trace_hardirqs_on+0x10/0x10 [ 950.144084] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 950.149166] ? debug_check_no_obj_freed+0x2c0/0x680 [ 950.154162] block_ioctl+0xd9/0x120 [ 950.157768] ? blkdev_fallocate+0x3a0/0x3a0 [ 950.162079] do_vfs_ioctl+0x75a/0xff0 [ 950.165871] ? lock_acquire+0x170/0x3f0 [ 950.169826] ? ioctl_preallocate+0x1a0/0x1a0 [ 950.174214] ? __fget+0x265/0x3e0 [ 950.177644] ? do_vfs_ioctl+0xff0/0xff0 [ 950.181606] ? security_file_ioctl+0x83/0xb0 [ 950.186008] SyS_ioctl+0x7f/0xb0 [ 950.189354] ? do_vfs_ioctl+0xff0/0xff0 [ 950.193308] do_syscall_64+0x1d5/0x640 [ 950.197179] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 950.202356] RIP: 0033:0x7f551d045ea7 [ 950.206050] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.213735] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 950.220990] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 950.228258] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 950.235510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 950.242766] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 950.252374] XFS (loop4): unknown mount option [logbsize=]. 08:26:19 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 27) 08:26:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) socketpair(0x18, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x50, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x8001, 0xf0c6, 0x3]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8c1}]}, 0x50}, 0x1, 0x0, 0x0, 0x90}, 0x24000000) r3 = dup(r0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000140)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @private0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000800}, 0x24000000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r4, 0x40046210, &(0x7f00000003c0)) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340), 0x101000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r5, 0x54a3) 08:26:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) connect$802154_dgram(r1, &(0x7f0000000040)={0x24, @short={0x2, 0x3, 0xaaa0}}, 0x14) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:19 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x1f, 0x4, 0x80, 0x9}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:19 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x403) ioctl$SNDCTL_SEQ_NRSYNTHS(r1, 0x8004510a, &(0x7f0000000040)) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x403) (async) ioctl$SNDCTL_SEQ_NRSYNTHS(r1, 0x8004510a, &(0x7f0000000040)) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 28) 08:26:19 executing program 5: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0x1f, 0x4, 0x80, 0x9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) socketpair(0x18, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x50, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x8001, 0xf0c6, 0x3]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8c1}]}, 0x50}, 0x1, 0x0, 0x0, 0x90}, 0x24000000) (async) r3 = dup(r0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000140)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @private0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000800}, 0x24000000) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) (rerun: 64) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r4, 0x40046210, &(0x7f00000003c0)) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) (async) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340), 0x101000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r5, 0x54a3) 08:26:19 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x403) ioctl$SNDCTL_SEQ_NRSYNTHS(r1, 0x8004510a, &(0x7f0000000040)) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x403) (async) ioctl$SNDCTL_SEQ_NRSYNTHS(r1, 0x8004510a, &(0x7f0000000040)) (async) write$nbd(r0, 0x0, 0x0) (async) [ 950.355000] FAULT_INJECTION: forcing a failure. [ 950.355000] name failslab, interval 1, probability 0, space 0, times 0 [ 950.379385] CPU: 0 PID: 20585 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 950.387297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.396654] Call Trace: [ 950.399245] dump_stack+0x1b2/0x281 08:26:19 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3}, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$SNDCTL_SYNTH_MEMAVL(r1, 0xc004510e, &(0x7f0000000080)=0x4) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000140)=0x1) 08:26:19 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3}, 0x4) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$SNDCTL_SYNTH_MEMAVL(r1, 0xc004510e, &(0x7f0000000080)=0x4) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000140)=0x1) 08:26:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) connect$802154_dgram(r1, &(0x7f0000000040)={0x24, @short={0x2, 0x3, 0xaaa0}}, 0x14) (rerun: 32) write$nbd(r0, &(0x7f0000000100), 0x10) [ 950.402878] should_fail.cold+0x10a/0x149 [ 950.407027] should_failslab+0xd6/0x130 [ 950.411003] kmem_cache_alloc_node_trace+0x25a/0x400 [ 950.416105] __kmalloc_node_track_caller+0x38/0x70 [ 950.421030] __alloc_skb+0x96/0x510 [ 950.424660] kobject_uevent_env+0x882/0xf30 [ 950.428991] lo_ioctl+0x11a6/0x1cd0 [ 950.432621] ? loop_set_status64+0xe0/0xe0 [ 950.436859] blkdev_ioctl+0x540/0x1830 [ 950.440744] ? blkpg_ioctl+0x8d0/0x8d0 [ 950.444630] ? trace_hardirqs_on+0x10/0x10 [ 950.448866] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 950.453964] ? debug_check_no_obj_freed+0x2c0/0x680 [ 950.458982] block_ioctl+0xd9/0x120 [ 950.462595] ? blkdev_fallocate+0x3a0/0x3a0 [ 950.466906] do_vfs_ioctl+0x75a/0xff0 [ 950.470698] ? lock_acquire+0x170/0x3f0 [ 950.474658] ? ioctl_preallocate+0x1a0/0x1a0 [ 950.479061] ? __fget+0x265/0x3e0 [ 950.482494] ? do_vfs_ioctl+0xff0/0xff0 [ 950.486451] ? security_file_ioctl+0x83/0xb0 [ 950.490837] SyS_ioctl+0x7f/0xb0 [ 950.494180] ? do_vfs_ioctl+0xff0/0xff0 [ 950.498134] do_syscall_64+0x1d5/0x640 [ 950.502003] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 950.507171] RIP: 0033:0x7f1005389ea7 [ 950.510859] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.518544] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 950.525792] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 950.533042] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 950.540292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 950.547549] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 950.565271] FAULT_INJECTION: forcing a failure. [ 950.565271] name failslab, interval 1, probability 0, space 0, times 0 [ 950.569542] XFS (loop0): unknown mount option [logbsize=]. [ 950.583135] CPU: 0 PID: 20584 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 950.591020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.600373] Call Trace: [ 950.602961] dump_stack+0x1b2/0x281 [ 950.606580] should_fail.cold+0x10a/0x149 [ 950.610710] should_failslab+0xd6/0x130 [ 950.614674] kmem_cache_alloc_node_trace+0x25a/0x400 [ 950.619763] __kmalloc_node_track_caller+0x38/0x70 [ 950.624677] __alloc_skb+0x96/0x510 [ 950.628296] kobject_uevent_env+0x882/0xf30 [ 950.632601] lo_ioctl+0x11a6/0x1cd0 [ 950.636210] ? loop_set_status64+0xe0/0xe0 [ 950.640439] blkdev_ioctl+0x540/0x1830 [ 950.644312] ? blkpg_ioctl+0x8d0/0x8d0 [ 950.648178] ? trace_hardirqs_on+0x10/0x10 [ 950.652393] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 950.657478] ? debug_check_no_obj_freed+0x2c0/0x680 [ 950.662486] block_ioctl+0xd9/0x120 [ 950.666100] ? blkdev_fallocate+0x3a0/0x3a0 [ 950.670404] do_vfs_ioctl+0x75a/0xff0 [ 950.674195] ? lock_acquire+0x170/0x3f0 [ 950.678156] ? ioctl_preallocate+0x1a0/0x1a0 [ 950.682554] ? __fget+0x265/0x3e0 [ 950.685996] ? do_vfs_ioctl+0xff0/0xff0 [ 950.689949] ? security_file_ioctl+0x83/0xb0 [ 950.694335] SyS_ioctl+0x7f/0xb0 [ 950.697677] ? do_vfs_ioctl+0xff0/0xff0 [ 950.701637] do_syscall_64+0x1d5/0x640 [ 950.705515] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 950.710686] RIP: 0033:0x7f551d045ea7 [ 950.714376] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.722066] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 950.729329] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 950.736613] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 950.743868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 950.751123] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 950.762366] XFS (loop4): unknown mount option [logbsize=]. 08:26:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 28) 08:26:20 executing program 3: ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) 08:26:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3}, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) ioctl$SNDCTL_SYNTH_MEMAVL(r1, 0xc004510e, &(0x7f0000000080)=0x4) (async) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000140)=0x1) 08:26:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async, rerun: 32) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 32) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) socketpair(0x18, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x50, 0x0, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x8001, 0xf0c6, 0x3]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8c1}]}, 0x50}, 0x1, 0x0, 0x0, 0x90}, 0x24000000) (async, rerun: 32) r3 = dup(r0) (rerun: 32) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000140)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, 0x0, 0x300, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @private0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000800}, 0x24000000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r4, 0x40046210, &(0x7f00000003c0)) (async) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), r1) (async) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340), 0x101000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r5, 0x54a3) 08:26:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) write$nbd(r0, 0x0, 0x0) 08:26:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 29) 08:26:20 executing program 3: ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000000)) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) 08:26:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) write$nbd(r0, 0x0, 0x0) 08:26:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) write$nbd(r0, &(0x7f0000000100), 0x10) [ 950.869047] FAULT_INJECTION: forcing a failure. [ 950.869047] name failslab, interval 1, probability 0, space 0, times 0 [ 950.892101] CPU: 0 PID: 20632 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 950.900003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.909354] Call Trace: [ 950.911953] dump_stack+0x1b2/0x281 08:26:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 950.915587] should_fail.cold+0x10a/0x149 [ 950.919741] should_failslab+0xd6/0x130 [ 950.923715] kmem_cache_alloc_node_trace+0x25a/0x400 [ 950.928822] __kmalloc_node_track_caller+0x38/0x70 [ 950.933748] __alloc_skb+0x96/0x510 [ 950.937376] kobject_uevent_env+0x882/0xf30 [ 950.941707] lo_ioctl+0x11a6/0x1cd0 [ 950.945336] ? loop_set_status64+0xe0/0xe0 [ 950.949572] blkdev_ioctl+0x540/0x1830 [ 950.953461] ? blkpg_ioctl+0x8d0/0x8d0 [ 950.957346] ? trace_hardirqs_on+0x10/0x10 [ 950.961581] ? _raw_spin_unlock_irqrestore+0x66/0xe0 08:26:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698020025501ff2e3a1e27e4a90e046ee98000000000000030000009210c8b6d591607172ae6a5db16af135df3ae69a7f109cc158f33b58f1b11c2ee5372d68e9d6031695c56d2d5758007654fc3e1c792aa6"], 0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 950.966686] ? debug_check_no_obj_freed+0x2c0/0x680 [ 950.971706] block_ioctl+0xd9/0x120 [ 950.975338] ? blkdev_fallocate+0x3a0/0x3a0 [ 950.979662] do_vfs_ioctl+0x75a/0xff0 [ 950.983459] ? lock_acquire+0x170/0x3f0 [ 950.987428] ? ioctl_preallocate+0x1a0/0x1a0 [ 950.991837] ? __fget+0x265/0x3e0 [ 950.995288] ? do_vfs_ioctl+0xff0/0xff0 [ 950.999253] ? security_file_ioctl+0x83/0xb0 [ 951.003661] SyS_ioctl+0x7f/0xb0 [ 951.007026] ? do_vfs_ioctl+0xff0/0xff0 [ 951.011000] do_syscall_64+0x1d5/0x640 [ 951.014893] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 951.020082] RIP: 0033:0x7f551d045ea7 [ 951.023787] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 951.031488] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 951.038743] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 951.046002] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 951.053252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 951.060509] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 951.075501] XFS (loop4): unknown mount option [logbsize=]. [ 951.080358] FAULT_INJECTION: forcing a failure. [ 951.080358] name failslab, interval 1, probability 0, space 0, times 0 [ 951.095547] CPU: 1 PID: 20637 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 951.103448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.112804] Call Trace: [ 951.115383] dump_stack+0x1b2/0x281 [ 951.118991] should_fail.cold+0x10a/0x149 [ 951.123117] should_failslab+0xd6/0x130 [ 951.127081] kmem_cache_alloc_node_trace+0x25a/0x400 [ 951.132173] __kmalloc_node_track_caller+0x38/0x70 [ 951.137083] __alloc_skb+0x96/0x510 [ 951.140696] kobject_uevent_env+0x882/0xf30 [ 951.145001] lo_ioctl+0x11a6/0x1cd0 [ 951.148607] ? loop_set_status64+0xe0/0xe0 [ 951.152828] blkdev_ioctl+0x540/0x1830 [ 951.156699] ? blkpg_ioctl+0x8d0/0x8d0 [ 951.160565] ? trace_hardirqs_on+0x10/0x10 [ 951.164782] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 951.169879] ? debug_check_no_obj_freed+0x2c0/0x680 [ 951.174967] block_ioctl+0xd9/0x120 [ 951.178582] ? blkdev_fallocate+0x3a0/0x3a0 [ 951.182893] do_vfs_ioctl+0x75a/0xff0 [ 951.186697] ? lock_acquire+0x170/0x3f0 [ 951.190649] ? ioctl_preallocate+0x1a0/0x1a0 [ 951.195042] ? __fget+0x265/0x3e0 [ 951.198488] ? do_vfs_ioctl+0xff0/0xff0 [ 951.202444] ? security_file_ioctl+0x83/0xb0 [ 951.206833] SyS_ioctl+0x7f/0xb0 [ 951.210212] ? do_vfs_ioctl+0xff0/0xff0 [ 951.214206] do_syscall_64+0x1d5/0x640 [ 951.218076] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 951.223252] RIP: 0033:0x7f1005389ea7 [ 951.226946] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 951.234638] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 951.241887] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 951.249138] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 951.256387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 951.263639] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:20 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 29) 08:26:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698020025501ff2e3a1e27e4a90e046ee98000000000000030000009210c8b6d591607172ae6a5db16af135df3ae69a7f109cc158f33b58f1b11c2ee5372d68e9d6031695c56d2d5758007654fc3e1c792aa6"], 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) 08:26:20 executing program 3: ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x10) (async) 08:26:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$SNDCTL_TMR_SOURCE(0xffffffffffffffff, 0xc0045406) 08:26:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 30) [ 951.273352] XFS (loop0): unknown mount option [logbsize=]. 08:26:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$SNDCTL_TMR_SOURCE(0xffffffffffffffff, 0xc0045406) [ 951.360646] FAULT_INJECTION: forcing a failure. [ 951.360646] name failslab, interval 1, probability 0, space 0, times 0 [ 951.382968] CPU: 1 PID: 20674 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 951.390878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.400232] Call Trace: [ 951.402823] dump_stack+0x1b2/0x281 [ 951.406466] should_fail.cold+0x10a/0x149 [ 951.410615] should_failslab+0xd6/0x130 [ 951.414598] kmem_cache_alloc_node+0x263/0x410 [ 951.419184] __alloc_skb+0x5c/0x510 [ 951.422813] kobject_uevent_env+0x882/0xf30 [ 951.427143] lo_ioctl+0x11a6/0x1cd0 [ 951.430786] ? loop_set_status64+0xe0/0xe0 [ 951.435019] blkdev_ioctl+0x540/0x1830 [ 951.438906] ? blkpg_ioctl+0x8d0/0x8d0 [ 951.442795] ? trace_hardirqs_on+0x10/0x10 [ 951.447034] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 951.452143] ? debug_check_no_obj_freed+0x2c0/0x680 [ 951.457171] block_ioctl+0xd9/0x120 08:26:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698020025501ff2e3a1e27e4a90e046ee98000000000000030000009210c8b6d591607172ae6a5db16af135df3ae69a7f109cc158f33b58f1b11c2ee5372d68e9d6031695c56d2d5758007654fc3e1c792aa6"], 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) 08:26:20 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x81) socket$nl_route(0x10, 0x3, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x204002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$SNDCTL_TMR_SOURCE(0xffffffffffffffff, 0xc0045406) 08:26:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000100)=0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_mount_image$omfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x8008, &(0x7f0000000280)={[], [{@subj_user}, {@fowner_lt={'fowner<', 0xee01}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '/proc/keys\x00'}}, {@pcr={'pcr', 0x3d, 0x403d}}, {@uid_gt}, {@dont_appraise}, {@subj_user={'subj_user', 0x3d, '-}-:-!-#\x9a:'}}]}) 08:26:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) write$nbd(r0, 0x0, 0xffffffffffffffba) [ 951.460836] ? blkdev_fallocate+0x3a0/0x3a0 [ 951.465162] do_vfs_ioctl+0x75a/0xff0 [ 951.468962] ? lock_acquire+0x170/0x3f0 [ 951.472933] ? ioctl_preallocate+0x1a0/0x1a0 [ 951.477346] ? __fget+0x265/0x3e0 [ 951.480801] ? do_vfs_ioctl+0xff0/0xff0 [ 951.484891] ? security_file_ioctl+0x83/0xb0 [ 951.489302] SyS_ioctl+0x7f/0xb0 [ 951.492663] ? do_vfs_ioctl+0xff0/0xff0 [ 951.496621] do_syscall_64+0x1d5/0x640 [ 951.500496] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 951.505668] RIP: 0033:0x7f551d045ea7 [ 951.509365] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 951.517051] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 951.524300] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 951.531555] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 951.538805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 951.546051] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 951.557144] XFS (loop4): unknown mount option [logbsize=]. [ 951.563605] FAULT_INJECTION: forcing a failure. [ 951.563605] name failslab, interval 1, probability 0, space 0, times 0 [ 951.575553] CPU: 1 PID: 20677 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 951.583541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.592876] Call Trace: [ 951.595452] dump_stack+0x1b2/0x281 [ 951.599058] should_fail.cold+0x10a/0x149 [ 951.603196] should_failslab+0xd6/0x130 [ 951.607158] kmem_cache_alloc_node+0x263/0x410 [ 951.611720] __alloc_skb+0x5c/0x510 [ 951.615329] kobject_uevent_env+0x882/0xf30 [ 951.619639] lo_ioctl+0x11a6/0x1cd0 [ 951.623247] ? loop_set_status64+0xe0/0xe0 [ 951.627458] blkdev_ioctl+0x540/0x1830 [ 951.631326] ? blkpg_ioctl+0x8d0/0x8d0 [ 951.635194] ? trace_hardirqs_on+0x10/0x10 [ 951.639409] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 951.644490] ? debug_check_no_obj_freed+0x2c0/0x680 [ 951.649510] block_ioctl+0xd9/0x120 [ 951.653121] ? blkdev_fallocate+0x3a0/0x3a0 [ 951.657511] do_vfs_ioctl+0x75a/0xff0 [ 951.661293] ? lock_acquire+0x170/0x3f0 [ 951.665244] ? ioctl_preallocate+0x1a0/0x1a0 [ 951.669631] ? __fget+0x265/0x3e0 [ 951.673081] ? do_vfs_ioctl+0xff0/0xff0 [ 951.677043] ? security_file_ioctl+0x83/0xb0 [ 951.681445] SyS_ioctl+0x7f/0xb0 [ 951.684798] ? do_vfs_ioctl+0xff0/0xff0 [ 951.688754] do_syscall_64+0x1d5/0x640 [ 951.692625] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 951.697802] RIP: 0033:0x7f1005389ea7 [ 951.701500] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 951.709186] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 951.716431] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 951.723678] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 951.730927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 951.738305] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 30) 08:26:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) write$nbd(r0, 0x0, 0xffffffffffffffba) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) (async) write$nbd(r0, 0x0, 0xffffffffffffffba) (async) 08:26:21 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='u\x00\x00\x00'], 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000140)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7, 0x0, 0x9, 0x7, 0x100, "6a3da13610148bc5e1409ee6a4b59dc51dec75693f934685b81fd241f43d68d27a364fe062993d0c35fc5849c8b3909e641f23907a918a66e92fe71eebe642a5af80bf5f30569d8741b44e0f81f641c04aff9e01151292ece863b395e1ea00bd796338e59fe9469bdc08fd2962e35970612a9b5fea228704c9532a3e3853a618"}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x4}) 08:26:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x81) socket$nl_route(0x10, 0x3, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x204002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x81) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x204002, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) 08:26:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 31) 08:26:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000100)=0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) syz_mount_image$omfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x8008, &(0x7f0000000280)={[], [{@subj_user}, {@fowner_lt={'fowner<', 0xee01}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '/proc/keys\x00'}}, {@pcr={'pcr', 0x3d, 0x403d}}, {@uid_gt}, {@dont_appraise}, {@subj_user={'subj_user', 0x3d, '-}-:-!-#\x9a:'}}]}) [ 951.762349] XFS (loop0): unknown mount option [logbsize=]. 08:26:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) write$nbd(r0, 0x0, 0xffffffffffffffba) 08:26:21 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='u\x00\x00\x00'], 0x10) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) (async) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000140)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7, 0x0, 0x9, 0x7, 0x100, "6a3da13610148bc5e1409ee6a4b59dc51dec75693f934685b81fd241f43d68d27a364fe062993d0c35fc5849c8b3909e641f23907a918a66e92fe71eebe642a5af80bf5f30569d8741b44e0f81f641c04aff9e01151292ece863b395e1ea00bd796338e59fe9469bdc08fd2962e35970612a9b5fea228704c9532a3e3853a618"}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x4}) 08:26:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) r3 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000000000000d8504917a4fc72f1a5c791a81b63780abe6a0f3022ed91060176996fb3e0da52ba6655d05d7857ecf4f2528c4f90908026c32c44bcb1f64291e13ba1ade33432b6466f8ec94402bde21cf24141933baeaf4cdacd2a013d6dfeb0925b9968b7703adfd85f4bcf24badfbccc691b57acbfae", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f00000001c0)={r4, r5, 0xf6e, 0x81, &(0x7f0000000100)="cbb9fa86718cac53db6aeb9e4a7ed872330b7c3f6bc7af3aea2a747250080ed40b59914710f610a52c102f506b277b22c9c7c857c030cca57e1190dbbdc1d8d5faf15a6a10a03220b189c3f15db9909e1c6e58caa615b8ae594b21f86823b006c0a32f44cca6b95b45ad3a525e66578d6593cd9a956b8f3ba816a0fc704a47fe8f", 0x9, 0x0, 0x401, 0x0, 0x9, 0x0, 0x447d, 'syz0\x00'}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), r6) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) write$nbd(r0, 0x0, 0x0) [ 951.918195] FAULT_INJECTION: forcing a failure. [ 951.918195] name failslab, interval 1, probability 0, space 0, times 0 [ 951.965570] CPU: 0 PID: 20739 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 951.973472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.982830] Call Trace: [ 951.985431] dump_stack+0x1b2/0x281 [ 951.989063] should_fail.cold+0x10a/0x149 [ 951.993220] should_failslab+0xd6/0x130 [ 951.997198] kmem_cache_alloc_node+0x263/0x410 [ 952.001784] __alloc_skb+0x5c/0x510 [ 952.005425] kobject_uevent_env+0x882/0xf30 [ 952.009754] lo_ioctl+0x11a6/0x1cd0 [ 952.013377] ? loop_set_status64+0xe0/0xe0 [ 952.017604] blkdev_ioctl+0x540/0x1830 [ 952.021478] ? blkpg_ioctl+0x8d0/0x8d0 [ 952.025351] ? trace_hardirqs_on+0x10/0x10 [ 952.029592] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 952.034675] ? debug_check_no_obj_freed+0x2c0/0x680 [ 952.039676] block_ioctl+0xd9/0x120 [ 952.043283] ? blkdev_fallocate+0x3a0/0x3a0 [ 952.047584] do_vfs_ioctl+0x75a/0xff0 [ 952.051372] ? lock_acquire+0x170/0x3f0 [ 952.055327] ? ioctl_preallocate+0x1a0/0x1a0 [ 952.059742] ? __fget+0x265/0x3e0 [ 952.063177] ? do_vfs_ioctl+0xff0/0xff0 [ 952.067137] ? security_file_ioctl+0x83/0xb0 [ 952.071526] SyS_ioctl+0x7f/0xb0 [ 952.074870] ? do_vfs_ioctl+0xff0/0xff0 [ 952.078822] do_syscall_64+0x1d5/0x640 [ 952.082692] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 952.087864] RIP: 0033:0x7f1005389ea7 [ 952.091554] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.099240] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 952.106491] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:26:21 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='u\x00\x00\x00'], 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) (async) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000140)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7, 0x0, 0x9, 0x7, 0x100, "6a3da13610148bc5e1409ee6a4b59dc51dec75693f934685b81fd241f43d68d27a364fe062993d0c35fc5849c8b3909e641f23907a918a66e92fe71eebe642a5af80bf5f30569d8741b44e0f81f641c04aff9e01151292ece863b395e1ea00bd796338e59fe9469bdc08fd2962e35970612a9b5fea228704c9532a3e3853a618"}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x4}) 08:26:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async, rerun: 64) r2 = socket$l2tp6(0xa, 0x2, 0x73) r3 = dup(r0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000000000000d8504917a4fc72f1a5c791a81b63780abe6a0f3022ed91060176996fb3e0da52ba6655d05d7857ecf4f2528c4f90908026c32c44bcb1f64291e13ba1ade33432b6466f8ec94402bde21cf24141933baeaf4cdacd2a013d6dfeb0925b9968b7703adfd85f4bcf24badfbccc691b57acbfae", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f00000001c0)={r4, r5, 0xf6e, 0x81, &(0x7f0000000100)="cbb9fa86718cac53db6aeb9e4a7ed872330b7c3f6bc7af3aea2a747250080ed40b59914710f610a52c102f506b277b22c9c7c857c030cca57e1190dbbdc1d8d5faf15a6a10a03220b189c3f15db9909e1c6e58caa615b8ae594b21f86823b006c0a32f44cca6b95b45ad3a525e66578d6593cd9a956b8f3ba816a0fc704a47fe8f", 0x9, 0x0, 0x401, 0x0, 0x9, 0x0, 0x447d, 'syz0\x00'}) (async) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), r6) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) write$nbd(r0, 0x0, 0x0) 08:26:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x81) socket$nl_route(0x10, 0x3, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x204002, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x81) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x204002, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 952.113742] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 952.120999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 952.128255] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 952.158210] FAULT_INJECTION: forcing a failure. [ 952.158210] name failslab, interval 1, probability 0, space 0, times 0 [ 952.162510] XFS (loop0): unknown mount option [logbsize=]. [ 952.183557] CPU: 1 PID: 20726 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 952.191460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.200812] Call Trace: [ 952.203401] dump_stack+0x1b2/0x281 [ 952.207035] should_fail.cold+0x10a/0x149 [ 952.211189] should_failslab+0xd6/0x130 [ 952.215168] kmem_cache_alloc_node+0x263/0x410 [ 952.219753] __alloc_skb+0x5c/0x510 [ 952.223376] kobject_uevent_env+0x882/0xf30 [ 952.227698] lo_ioctl+0x11a6/0x1cd0 [ 952.231332] ? loop_set_status64+0xe0/0xe0 [ 952.235562] blkdev_ioctl+0x540/0x1830 [ 952.239435] ? blkpg_ioctl+0x8d0/0x8d0 [ 952.243304] ? trace_hardirqs_on+0x10/0x10 [ 952.247521] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 952.252604] ? debug_check_no_obj_freed+0x2c0/0x680 [ 952.257602] block_ioctl+0xd9/0x120 [ 952.261209] ? blkdev_fallocate+0x3a0/0x3a0 [ 952.265508] do_vfs_ioctl+0x75a/0xff0 [ 952.269342] ? lock_acquire+0x170/0x3f0 [ 952.273309] ? ioctl_preallocate+0x1a0/0x1a0 [ 952.277706] ? __fget+0x265/0x3e0 [ 952.281154] ? do_vfs_ioctl+0xff0/0xff0 [ 952.285110] ? security_file_ioctl+0x83/0xb0 [ 952.289498] SyS_ioctl+0x7f/0xb0 [ 952.292844] ? do_vfs_ioctl+0xff0/0xff0 [ 952.296805] do_syscall_64+0x1d5/0x640 [ 952.300704] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 952.305874] RIP: 0033:0x7f551d045ea7 [ 952.309568] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.317271] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 952.324528] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 952.331779] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 952.339028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 952.346276] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:21 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 31) 08:26:21 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000000000000010000000000"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000140)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x1, 0x7, 0x20, 0xb20e, 0x8, "ec228cebcc59ae18bec95173a648bd336610ee71b276f99723ca6e6927e8c42ea4ebf98121ae7f5c7861e4a55c082bf06ed9cb5f2c1abe38ec97565d0c675d6f1507a5da7db194cbd4039c18fab6e10f1d03a40e3ea356f2c3ea921d7b79b80c5b9b09f341d47083f679b8bd805fb3b8c21311d883c5f8ef371dc84831783ef6"}) 08:26:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x1, 0x3, 0x3, 0x1, "6a4a06cce20b39b03fb54e9ad9c9724d4936d4cedcee17b196a9a4ee7beff063f98259adbbbdec5acc0c24dc87bb387c10a2229401fc84e0113e4ca81334"}, 0x4e) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x10, 0x4, 0x1, "8f8a401365b2c1121ac60e9c6b0d551d493bcd50b6cd48d5000000000000003ee6c0540fbcf54d5c4e6ed7985d2941aa49d552d1391f01fe0c87428d16b0cd63a56d0e19e1838bc534cc8e561a3d49e2402a4cdf13e7021d5b85f5f2320e76b314f4b356eb7fdd33cebf3890a3a7b1718dad6d001000e855aad770c72edae57dd5c463c51586a48b7046e6c8ea2256881f776e00100000000000003081b4eb311138a50c8132f85173aa37057bd6cbe47afde0cbffbc13bbe63e954aaaafe029aa326f0f86416eb3087af802073a67117cb16ef045c228b3b28b614f1b35d41ec550bba80000000000001bcaef8276cb47468595e341c5f9d8c500000000000000c4a7be0d4aa6dcf08fc465a25cd57a004f083ac6376ff7567a1123da59528e1677b4ec01f6a01c20d1dc3e0ac6fe4834fae31538ced501bbfd3b9bc770cf4ac5041e438b255c80c6"}, 0x159) 08:26:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000100)=0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_mount_image$omfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x8008, &(0x7f0000000280)={[], [{@subj_user}, {@fowner_lt={'fowner<', 0xee01}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '/proc/keys\x00'}}, {@pcr={'pcr', 0x3d, 0x403d}}, {@uid_gt}, {@dont_appraise}, {@subj_user={'subj_user', 0x3d, '-}-:-!-#\x9a:'}}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_CTRLRATE(r1, 0xc0045103, &(0x7f0000000100)=0x7) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) syz_mount_image$omfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x8008, &(0x7f0000000280)={[], [{@subj_user}, {@fowner_lt={'fowner<', 0xee01}}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '/proc/keys\x00'}}, {@pcr={'pcr', 0x3d, 0x403d}}, {@uid_gt}, {@dont_appraise}, {@subj_user={'subj_user', 0x3d, '-}-:-!-#\x9a:'}}]}) (async) [ 952.362641] XFS (loop4): unknown mount option [logbsize=]. 08:26:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 32) 08:26:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) r3 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000000000000d8504917a4fc72f1a5c791a81b63780abe6a0f3022ed91060176996fb3e0da52ba6655d05d7857ecf4f2528c4f90908026c32c44bcb1f64291e13ba1ade33432b6466f8ec94402bde21cf24141933baeaf4cdacd2a013d6dfeb0925b9968b7703adfd85f4bcf24badfbccc691b57acbfae", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f00000001c0)={r4, r5, 0xf6e, 0x81, &(0x7f0000000100)="cbb9fa86718cac53db6aeb9e4a7ed872330b7c3f6bc7af3aea2a747250080ed40b59914710f610a52c102f506b277b22c9c7c857c030cca57e1190dbbdc1d8d5faf15a6a10a03220b189c3f15db9909e1c6e58caa615b8ae594b21f86823b006c0a32f44cca6b95b45ad3a525e66578d6593cd9a956b8f3ba816a0fc704a47fe8f", 0x9, 0x0, 0x401, 0x0, 0x9, 0x0, 0x447d, 'syz0\x00'}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), r6) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) dup(r0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000000000000d8504917a4fc72f1a5c791a81b63780abe6a0f3022ed91060176996fb3e0da52ba6655d05d7857ecf4f2528c4f90908026c32c44bcb1f64291e13ba1ade33432b6466f8ec94402bde21cf24141933baeaf4cdacd2a013d6dfeb0925b9968b7703adfd85f4bcf24badfbccc691b57acbfae", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f00000001c0)={r4, r5, 0xf6e, 0x81, &(0x7f0000000100)="cbb9fa86718cac53db6aeb9e4a7ed872330b7c3f6bc7af3aea2a747250080ed40b59914710f610a52c102f506b277b22c9c7c857c030cca57e1190dbbdc1d8d5faf15a6a10a03220b189c3f15db9909e1c6e58caa615b8ae594b21f86823b006c0a32f44cca6b95b45ad3a525e66578d6593cd9a956b8f3ba816a0fc704a47fe8f", 0x9, 0x0, 0x401, 0x0, 0x9, 0x0, 0x447d, 'syz0\x00'}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r6, &(0x7f0000000740)=""/4096, 0x1000) (async) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), r6) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x1, 0x3, 0x3, 0x1, "6a4a06cce20b39b03fb54e9ad9c9724d4936d4cedcee17b196a9a4ee7beff063f98259adbbbdec5acc0c24dc87bb387c10a2229401fc84e0113e4ca81334"}, 0x4e) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x10, 0x4, 0x1, "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"}, 0x159) 08:26:21 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000000000000010000000000"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000140)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x1, 0x7, 0x20, 0xb20e, 0x8, "ec228cebcc59ae18bec95173a648bd336610ee71b276f99723ca6e6927e8c42ea4ebf98121ae7f5c7861e4a55c082bf06ed9cb5f2c1abe38ec97565d0c675d6f1507a5da7db194cbd4039c18fab6e10f1d03a40e3ea356f2c3ea921d7b79b80c5b9b09f341d47083f679b8bd805fb3b8c21311d883c5f8ef371dc84831783ef6"}) 08:26:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x1, 0x3, 0x3, 0x1, "6a4a06cce20b39b03fb54e9ad9c9724d4936d4cedcee17b196a9a4ee7beff063f98259adbbbdec5acc0c24dc87bb387c10a2229401fc84e0113e4ca81334"}, 0x4e) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x10, 0x4, 0x1, "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"}, 0x159) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x1, 0x3, 0x3, 0x1, "6a4a06cce20b39b03fb54e9ad9c9724d4936d4cedcee17b196a9a4ee7beff063f98259adbbbdec5acc0c24dc87bb387c10a2229401fc84e0113e4ca81334"}, 0x4e) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) (async) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x0, 0x10, 0x4, 0x1, "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"}, 0x159) (async) 08:26:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) [ 952.470726] FAULT_INJECTION: forcing a failure. [ 952.470726] name failslab, interval 1, probability 0, space 0, times 0 08:26:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x2}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) setns(r1, 0x22020000) [ 952.518795] CPU: 1 PID: 20786 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 952.526702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.536057] Call Trace: [ 952.538652] dump_stack+0x1b2/0x281 [ 952.542296] should_fail.cold+0x10a/0x149 [ 952.546452] should_failslab+0xd6/0x130 [ 952.550437] kmem_cache_alloc_node_trace+0x25a/0x400 [ 952.555552] __kmalloc_node_track_caller+0x38/0x70 [ 952.560494] __alloc_skb+0x96/0x510 [ 952.564133] kobject_uevent_env+0x882/0xf30 08:26:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x2}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) setns(r1, 0x22020000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x2}, 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) setns(r1, 0x22020000) (async) [ 952.568475] lo_ioctl+0x11a6/0x1cd0 [ 952.572110] ? loop_set_status64+0xe0/0xe0 [ 952.576362] blkdev_ioctl+0x540/0x1830 [ 952.580257] ? blkpg_ioctl+0x8d0/0x8d0 [ 952.584149] ? trace_hardirqs_on+0x10/0x10 [ 952.588389] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 952.593487] ? debug_check_no_obj_freed+0x2c0/0x680 [ 952.598487] block_ioctl+0xd9/0x120 [ 952.602093] ? blkdev_fallocate+0x3a0/0x3a0 [ 952.606401] do_vfs_ioctl+0x75a/0xff0 [ 952.610203] ? lock_acquire+0x170/0x3f0 [ 952.614170] ? ioctl_preallocate+0x1a0/0x1a0 [ 952.618555] ? __fget+0x265/0x3e0 [ 952.621986] ? do_vfs_ioctl+0xff0/0xff0 [ 952.625936] ? security_file_ioctl+0x83/0xb0 [ 952.630341] SyS_ioctl+0x7f/0xb0 [ 952.633698] ? do_vfs_ioctl+0xff0/0xff0 [ 952.637666] do_syscall_64+0x1d5/0x640 [ 952.641549] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 952.646722] RIP: 0033:0x7f1005389ea7 [ 952.650413] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.658101] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 952.665355] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 952.672609] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 952.679859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 952.687111] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 952.699292] XFS (loop0): unknown mount option [logbsize=]. [ 952.700501] FAULT_INJECTION: forcing a failure. [ 952.700501] name failslab, interval 1, probability 0, space 0, times 0 [ 952.717431] CPU: 0 PID: 20793 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 952.725325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.734680] Call Trace: [ 952.737256] dump_stack+0x1b2/0x281 [ 952.740879] should_fail.cold+0x10a/0x149 [ 952.745030] should_failslab+0xd6/0x130 [ 952.748993] kmem_cache_alloc_node_trace+0x25a/0x400 [ 952.754092] __kmalloc_node_track_caller+0x38/0x70 [ 952.759012] __alloc_skb+0x96/0x510 [ 952.762721] kobject_uevent_env+0x882/0xf30 [ 952.767028] lo_ioctl+0x11a6/0x1cd0 [ 952.770647] ? loop_set_status64+0xe0/0xe0 [ 952.774870] blkdev_ioctl+0x540/0x1830 [ 952.778736] ? blkpg_ioctl+0x8d0/0x8d0 [ 952.782690] ? trace_hardirqs_on+0x10/0x10 [ 952.786936] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 952.792018] ? debug_check_no_obj_freed+0x2c0/0x680 [ 952.797018] block_ioctl+0xd9/0x120 [ 952.800636] ? blkdev_fallocate+0x3a0/0x3a0 [ 952.804947] do_vfs_ioctl+0x75a/0xff0 [ 952.808729] ? lock_acquire+0x170/0x3f0 [ 952.812685] ? ioctl_preallocate+0x1a0/0x1a0 [ 952.817077] ? __fget+0x265/0x3e0 [ 952.820520] ? do_vfs_ioctl+0xff0/0xff0 [ 952.824495] ? security_file_ioctl+0x83/0xb0 [ 952.828899] SyS_ioctl+0x7f/0xb0 [ 952.832262] ? do_vfs_ioctl+0xff0/0xff0 [ 952.836225] do_syscall_64+0x1d5/0x640 [ 952.840107] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 952.845286] RIP: 0033:0x7f551d045ea7 [ 952.848978] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 952.856674] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 952.863934] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 952.871189] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 952.878453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 952.885703] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 08:26:22 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000000000000010000000000"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000140)={@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x1, 0x7, 0x20, 0xb20e, 0x8, "ec228cebcc59ae18bec95173a648bd336610ee71b276f99723ca6e6927e8c42ea4ebf98121ae7f5c7861e4a55c082bf06ed9cb5f2c1abe38ec97565d0c675d6f1507a5da7db194cbd4039c18fab6e10f1d03a40e3ea356f2c3ea921d7b79b80c5b9b09f341d47083f679b8bd805fb3b8c21311d883c5f8ef371dc84831783ef6"}) 08:26:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x2}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) setns(r1, 0x22020000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0x0, 0x0, 0x0, 0x2}, 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) setns(r1, 0x22020000) (async) 08:26:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async, rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) (rerun: 32) 08:26:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 32) 08:26:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 33) 08:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x4b0080) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000140)=0x54) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x214}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r1, 0x80045104, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0xee) r5 = ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) r6 = openat$cgroup_type(r2, &(0x7f0000000480), 0x2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000006c0)={0x144, 0x0, &(0x7f0000002740)=[@request_death={0x400c630e, 0x1}, @acquire={0x40046305, 0x1}, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50, 0x18, &(0x7f00000001c0)={@fda={0x66646185, 0x6, 0x1, 0x32}, @fd={0x66642a85, 0x0, r5}, @flat=@weak_handle={0x77682a85, 0x1001}}, &(0x7f0000000280)={0x0, 0x20, 0x38}}, 0x40}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x68, 0x18, &(0x7f00000003c0)={@fda={0x66646185, 0x4, 0x2, 0x39}, @ptr={0x70742a85, 0x0, &(0x7f00000002c0)=""/202, 0xca, 0x0, 0x37}, @fda={0x66646185, 0x0, 0x2, 0x3a}}, &(0x7f0000000440)={0x0, 0x20, 0x48}}, 0x3440}, @decrefs={0x40046307, 0x1}, @register_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1d1c4b95405ebc41, 0x0, 0x0, 0x50, 0x18, &(0x7f00000004c0)={@fda={0x66646185, 0x4, 0x0, 0x36}, @fd={0x66642a85, 0x0, r6}, @flat=@handle={0x73682a85, 0x1c1821819066fc8c, 0x3}}, &(0x7f0000000540)={0x0, 0x20, 0x38}}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000580)={@ptr={0x70742a85, 0x1, &(0x7f0000001740)=""/4096, 0x1000, 0x0, 0xe}, @flat=@weak_handle={0x77682a85, 0x0, 0x1}, @fda={0x66646185, 0x1, 0x1, 0x27}}, &(0x7f0000000700)={0x0, 0x28, 0x40}}}], 0xb5, 0x0, &(0x7f0000000600)="3d0ac68c4258f589446a383c07593cd3de0ef3fd4b6c6a62bdda4aeeb94ce7d68bf9fe74c2b2d6bd6e580d630687551c1db54c957a0d8509afa0d4f5b4bdcfe8529d999532007e21fcceb0993b9d0daa7e3b008c1a557587fcc7947c9f5652ebc93da4d9864dc55256a381ec0b11fe16f388ef09fe878da60e1749bd2c362e0ad866dc7cbae1d1d89544ddc56359ddd610c8095216462aac355635455e3282b66102f7f3c4289784da3c28a3f62fbd09bc18cfa0c8"}) [ 952.931619] XFS (loop4): unknown mount option [logbsize=]. 08:26:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0xfffffffc}, 0x10) 08:26:22 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x0, 0x0, "4a53971d29e5c87f88da7af3fcb223e22977d0129d9d3c49cf88104573832cad1f4b1006c055709cead3a2"}, 0x3b) 08:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) (async, rerun: 32) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x4b0080) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000140)=0x54) (async, rerun: 64) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x214}) (rerun: 64) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r1, 0x80045104, &(0x7f0000000040)) (async) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0xee) (async, rerun: 32) r5 = ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) (rerun: 32) r6 = openat$cgroup_type(r2, &(0x7f0000000480), 0x2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000006c0)={0x144, 0x0, &(0x7f0000002740)=[@request_death={0x400c630e, 0x1}, @acquire={0x40046305, 0x1}, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50, 0x18, &(0x7f00000001c0)={@fda={0x66646185, 0x6, 0x1, 0x32}, @fd={0x66642a85, 0x0, r5}, @flat=@weak_handle={0x77682a85, 0x1001}}, &(0x7f0000000280)={0x0, 0x20, 0x38}}, 0x40}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x68, 0x18, &(0x7f00000003c0)={@fda={0x66646185, 0x4, 0x2, 0x39}, @ptr={0x70742a85, 0x0, &(0x7f00000002c0)=""/202, 0xca, 0x0, 0x37}, @fda={0x66646185, 0x0, 0x2, 0x3a}}, &(0x7f0000000440)={0x0, 0x20, 0x48}}, 0x3440}, @decrefs={0x40046307, 0x1}, @register_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1d1c4b95405ebc41, 0x0, 0x0, 0x50, 0x18, &(0x7f00000004c0)={@fda={0x66646185, 0x4, 0x0, 0x36}, @fd={0x66642a85, 0x0, r6}, @flat=@handle={0x73682a85, 0x1c1821819066fc8c, 0x3}}, &(0x7f0000000540)={0x0, 0x20, 0x38}}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000580)={@ptr={0x70742a85, 0x1, &(0x7f0000001740)=""/4096, 0x1000, 0x0, 0xe}, @flat=@weak_handle={0x77682a85, 0x0, 0x1}, @fda={0x66646185, 0x1, 0x1, 0x27}}, &(0x7f0000000700)={0x0, 0x28, 0x40}}}], 0xb5, 0x0, &(0x7f0000000600)="3d0ac68c4258f589446a383c07593cd3de0ef3fd4b6c6a62bdda4aeeb94ce7d68bf9fe74c2b2d6bd6e580d630687551c1db54c957a0d8509afa0d4f5b4bdcfe8529d999532007e21fcceb0993b9d0daa7e3b008c1a557587fcc7947c9f5652ebc93da4d9864dc55256a381ec0b11fe16f388ef09fe878da60e1749bd2c362e0ad866dc7cbae1d1d89544ddc56359ddd610c8095216462aac355635455e3282b66102f7f3c4289784da3c28a3f62fbd09bc18cfa0c8"}) 08:26:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0xfffffffc}, 0x10) [ 953.017045] FAULT_INJECTION: forcing a failure. [ 953.017045] name failslab, interval 1, probability 0, space 0, times 0 [ 953.060447] CPU: 0 PID: 20856 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 953.068349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.077701] Call Trace: [ 953.080292] dump_stack+0x1b2/0x281 [ 953.083920] should_fail.cold+0x10a/0x149 [ 953.088098] should_failslab+0xd6/0x130 [ 953.092069] kmem_cache_alloc_node_trace+0x25a/0x400 [ 953.097186] __kmalloc_node_track_caller+0x38/0x70 [ 953.102121] __alloc_skb+0x96/0x510 [ 953.105764] kobject_uevent_env+0x882/0xf30 08:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100), 0x4b0080) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000140)=0x54) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x214}) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r1, 0x80045104, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0xee) (async) r5 = ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) (async, rerun: 32) r6 = openat$cgroup_type(r2, &(0x7f0000000480), 0x2, 0x0) (rerun: 32) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000006c0)={0x144, 0x0, &(0x7f0000002740)=[@request_death={0x400c630e, 0x1}, @acquire={0x40046305, 0x1}, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50, 0x18, &(0x7f00000001c0)={@fda={0x66646185, 0x6, 0x1, 0x32}, @fd={0x66642a85, 0x0, r5}, @flat=@weak_handle={0x77682a85, 0x1001}}, &(0x7f0000000280)={0x0, 0x20, 0x38}}, 0x40}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x68, 0x18, &(0x7f00000003c0)={@fda={0x66646185, 0x4, 0x2, 0x39}, @ptr={0x70742a85, 0x0, &(0x7f00000002c0)=""/202, 0xca, 0x0, 0x37}, @fda={0x66646185, 0x0, 0x2, 0x3a}}, &(0x7f0000000440)={0x0, 0x20, 0x48}}, 0x3440}, @decrefs={0x40046307, 0x1}, @register_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1d1c4b95405ebc41, 0x0, 0x0, 0x50, 0x18, &(0x7f00000004c0)={@fda={0x66646185, 0x4, 0x0, 0x36}, @fd={0x66642a85, 0x0, r6}, @flat=@handle={0x73682a85, 0x1c1821819066fc8c, 0x3}}, &(0x7f0000000540)={0x0, 0x20, 0x38}}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000580)={@ptr={0x70742a85, 0x1, &(0x7f0000001740)=""/4096, 0x1000, 0x0, 0xe}, @flat=@weak_handle={0x77682a85, 0x0, 0x1}, @fda={0x66646185, 0x1, 0x1, 0x27}}, &(0x7f0000000700)={0x0, 0x28, 0x40}}}], 0xb5, 0x0, &(0x7f0000000600)="3d0ac68c4258f589446a383c07593cd3de0ef3fd4b6c6a62bdda4aeeb94ce7d68bf9fe74c2b2d6bd6e580d630687551c1db54c957a0d8509afa0d4f5b4bdcfe8529d999532007e21fcceb0993b9d0daa7e3b008c1a557587fcc7947c9f5652ebc93da4d9864dc55256a381ec0b11fe16f388ef09fe878da60e1749bd2c362e0ad866dc7cbae1d1d89544ddc56359ddd610c8095216462aac355635455e3282b66102f7f3c4289784da3c28a3f62fbd09bc18cfa0c8"}) [ 953.110103] lo_ioctl+0x11a6/0x1cd0 [ 953.113737] ? loop_set_status64+0xe0/0xe0 [ 953.117976] blkdev_ioctl+0x540/0x1830 [ 953.121869] ? blkpg_ioctl+0x8d0/0x8d0 [ 953.125757] ? trace_hardirqs_on+0x10/0x10 [ 953.129996] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 953.135106] ? debug_check_no_obj_freed+0x2c0/0x680 [ 953.140126] block_ioctl+0xd9/0x120 [ 953.143750] ? blkdev_fallocate+0x3a0/0x3a0 [ 953.148070] do_vfs_ioctl+0x75a/0xff0 [ 953.151869] ? lock_acquire+0x170/0x3f0 [ 953.155837] ? ioctl_preallocate+0x1a0/0x1a0 08:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 953.160245] ? __fget+0x265/0x3e0 [ 953.163695] ? do_vfs_ioctl+0xff0/0xff0 [ 953.167664] ? security_file_ioctl+0x83/0xb0 [ 953.172091] SyS_ioctl+0x7f/0xb0 [ 953.175459] ? do_vfs_ioctl+0xff0/0xff0 [ 953.179433] do_syscall_64+0x1d5/0x640 [ 953.183328] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 953.188513] RIP: 0033:0x7f1005389ea7 [ 953.192215] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 953.199922] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 953.207189] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 953.214450] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 953.221709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 953.228973] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 953.245677] XFS (loop0): unknown mount option [logbsize=]. [ 953.250488] FAULT_INJECTION: forcing a failure. [ 953.250488] name failslab, interval 1, probability 0, space 0, times 0 [ 953.264580] CPU: 1 PID: 20861 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 953.272464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.281813] Call Trace: [ 953.284386] dump_stack+0x1b2/0x281 [ 953.288005] should_fail.cold+0x10a/0x149 [ 953.292146] should_failslab+0xd6/0x130 [ 953.296107] kmem_cache_alloc_node_trace+0x25a/0x400 [ 953.301201] __kmalloc_node_track_caller+0x38/0x70 [ 953.306112] __alloc_skb+0x96/0x510 [ 953.309721] kobject_uevent_env+0x882/0xf30 [ 953.314029] lo_ioctl+0x11a6/0x1cd0 [ 953.317645] ? loop_set_status64+0xe0/0xe0 [ 953.321867] blkdev_ioctl+0x540/0x1830 [ 953.325734] ? blkpg_ioctl+0x8d0/0x8d0 [ 953.329600] ? trace_hardirqs_on+0x10/0x10 [ 953.333817] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 953.338902] ? debug_check_no_obj_freed+0x2c0/0x680 [ 953.343901] block_ioctl+0xd9/0x120 [ 953.347506] ? blkdev_fallocate+0x3a0/0x3a0 [ 953.351811] do_vfs_ioctl+0x75a/0xff0 [ 953.355599] ? lock_acquire+0x170/0x3f0 [ 953.359559] ? ioctl_preallocate+0x1a0/0x1a0 [ 953.363963] ? __fget+0x265/0x3e0 [ 953.367406] ? do_vfs_ioctl+0xff0/0xff0 [ 953.371360] ? security_file_ioctl+0x83/0xb0 [ 953.375746] SyS_ioctl+0x7f/0xb0 [ 953.379090] ? do_vfs_ioctl+0xff0/0xff0 [ 953.383046] do_syscall_64+0x1d5/0x640 [ 953.386918] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 953.392088] RIP: 0033:0x7f551d045ea7 [ 953.395780] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 953.403464] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 08:26:22 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 33) 08:26:22 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x0, 0x0, "4a53971d29e5c87f88da7af3fcb223e22977d0129d9d3c49cf88104573832cad1f4b1006c055709cead3a2"}, 0x3b) 08:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={0x1}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0xfffffffc}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0xfffffffc}, 0x10) (async) [ 953.410710] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 953.417965] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 953.425224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 953.432477] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 953.442024] XFS (loop4): unknown mount option [logbsize=]. 08:26:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 34) 08:26:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) (async) 08:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={0x1}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) 08:26:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0xbae, 0x0, 0x2, 0x2, "191e7c40219fbb5a6646c86e04c6da8a1e65c7a86e2bd86648aa18992400c6b657640327b18c07556a17038f89144f344e2e75691fb94dac15709c1ea3b07be6c710583579a41f8a9049b1e695d33e964d355b6ce23455160baea921f60bdbb8070489f17ae5dd2978e65b26f9190a585e4b0dd3679772ddff8e4f1e0b39316707ec78c2a0eb675cd12090399c404e99a4500794a0965b7c6507e9683398c60eab86733fb54ce6388fa17cf2c55b18a4dd04de8f22bd2d285071eaee042097e9a6ccc702d07d78ba335a0eb648eb0bd790a7634559e03ae01416a4dde2079049f2363ece44869c5858277c8d953888b563a5cb867ea2c5d92e6ccd8d3a37648d47e7ceefda33b039f1d2150eef367b395011014d64"}, 0xfffffffffffffd61) 08:26:22 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x0, 0x0, "4a53971d29e5c87f88da7af3fcb223e22977d0129d9d3c49cf88104573832cad1f4b1006c055709cead3a2"}, 0x3b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x0, 0x0, 0x0, "4a53971d29e5c87f88da7af3fcb223e22977d0129d9d3c49cf88104573832cad1f4b1006c055709cead3a2"}, 0x3b) (async) 08:26:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0xbae, 0x0, 0x2, 0x2, "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"}, 0xfffffffffffffd61) 08:26:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0x0, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x0, 0x7, 0x8]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x4044840) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000480)={0xffffffffffffffff, r0, 0x9, 0x99, &(0x7f00000003c0)="e7a4a540beab470625043d825635e4fbf9158d71957d0f5c98138dd624cfeb9d69ad25d061a7309310098f3362eb27c4503299cdd74e219e688b110c5a3e5065aa0791cf9b589431f5af275789df10a9d03651aec4b3cab8ef653dca294085eb27f42f2654bf8b2a84f2cb39e3f05d595e6c3aa2c90ad3659e9e388e55aaccfa8088c4e9b5b76e742c1397c7d2fa4bed2ba1f4ff38ae62e33d", 0x7, 0x1, 0x0, 0x80, 0x6, 0x0, 0xfffffff8, 'syz1\x00'}) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x20042, 0x0) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x28, r5, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14}]}, 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x80) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) [ 953.524156] FAULT_INJECTION: forcing a failure. [ 953.524156] name failslab, interval 1, probability 0, space 0, times 0 [ 953.556850] CPU: 1 PID: 20894 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 953.564754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:26:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0x0, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x0, 0x7, 0x8]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x4044840) (async) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000480)={0xffffffffffffffff, r0, 0x9, 0x99, &(0x7f00000003c0)="e7a4a540beab470625043d825635e4fbf9158d71957d0f5c98138dd624cfeb9d69ad25d061a7309310098f3362eb27c4503299cdd74e219e688b110c5a3e5065aa0791cf9b589431f5af275789df10a9d03651aec4b3cab8ef653dca294085eb27f42f2654bf8b2a84f2cb39e3f05d595e6c3aa2c90ad3659e9e388e55aaccfa8088c4e9b5b76e742c1397c7d2fa4bed2ba1f4ff38ae62e33d", 0x7, 0x1, 0x0, 0x80, 0x6, 0x0, 0xfffffff8, 'syz1\x00'}) (async) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x20042, 0x0) (async, rerun: 64) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000280), 0xffffffffffffffff) (rerun: 64) sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x28, r5, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14}]}, 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x80) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) [ 953.574110] Call Trace: [ 953.576700] dump_stack+0x1b2/0x281 [ 953.580336] should_fail.cold+0x10a/0x149 [ 953.584496] should_failslab+0xd6/0x130 [ 953.588477] kmem_cache_alloc_node_trace+0x25a/0x400 [ 953.593596] __kmalloc_node_track_caller+0x38/0x70 [ 953.598550] __alloc_skb+0x96/0x510 [ 953.602191] kobject_uevent_env+0x882/0xf30 [ 953.606533] lo_ioctl+0x11a6/0x1cd0 [ 953.610171] ? loop_set_status64+0xe0/0xe0 [ 953.614409] blkdev_ioctl+0x540/0x1830 [ 953.618302] ? blkpg_ioctl+0x8d0/0x8d0 [ 953.622192] ? trace_hardirqs_on+0x10/0x10 [ 953.626436] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 953.631542] ? debug_check_no_obj_freed+0x2c0/0x680 [ 953.636562] block_ioctl+0xd9/0x120 [ 953.640189] ? blkdev_fallocate+0x3a0/0x3a0 [ 953.644504] do_vfs_ioctl+0x75a/0xff0 [ 953.648288] ? lock_acquire+0x170/0x3f0 [ 953.652246] ? ioctl_preallocate+0x1a0/0x1a0 [ 953.656638] ? __fget+0x265/0x3e0 [ 953.660080] ? do_vfs_ioctl+0xff0/0xff0 [ 953.664039] ? security_file_ioctl+0x83/0xb0 [ 953.668430] SyS_ioctl+0x7f/0xb0 [ 953.671783] ? do_vfs_ioctl+0xff0/0xff0 [ 953.675749] do_syscall_64+0x1d5/0x640 [ 953.679627] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 953.684801] RIP: 0033:0x7f1005389ea7 [ 953.688500] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 953.696188] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 [ 953.703439] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 953.710688] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 953.717937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 953.725185] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 953.742615] FAULT_INJECTION: forcing a failure. [ 953.742615] name failslab, interval 1, probability 0, space 0, times 0 [ 953.765874] XFS (loop0): unknown mount option [logbsize=]. [ 953.772148] CPU: 0 PID: 20903 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 953.780050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.789578] Call Trace: [ 953.792170] dump_stack+0x1b2/0x281 [ 953.795804] should_fail.cold+0x10a/0x149 [ 953.799957] should_failslab+0xd6/0x130 [ 953.803931] kmem_cache_alloc_trace+0x29a/0x3d0 [ 953.808603] ? kobj_ns_drop+0x80/0x80 [ 953.812406] call_usermodehelper_setup+0x73/0x2e0 [ 953.817261] kobject_uevent_env+0xc21/0xf30 [ 953.821598] lo_ioctl+0x11a6/0x1cd0 [ 953.825244] ? loop_set_status64+0xe0/0xe0 [ 953.829497] blkdev_ioctl+0x540/0x1830 [ 953.833387] ? blkpg_ioctl+0x8d0/0x8d0 [ 953.837280] ? trace_hardirqs_on+0x10/0x10 [ 953.841519] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 953.846624] ? debug_check_no_obj_freed+0x2c0/0x680 [ 953.851645] block_ioctl+0xd9/0x120 [ 953.855272] ? blkdev_fallocate+0x3a0/0x3a0 [ 953.859597] do_vfs_ioctl+0x75a/0xff0 [ 953.863395] ? lock_acquire+0x170/0x3f0 [ 953.867366] ? ioctl_preallocate+0x1a0/0x1a0 [ 953.871775] ? __fget+0x265/0x3e0 [ 953.875233] ? do_vfs_ioctl+0xff0/0xff0 [ 953.879204] ? security_file_ioctl+0x83/0xb0 [ 953.883612] SyS_ioctl+0x7f/0xb0 [ 953.886975] ? do_vfs_ioctl+0xff0/0xff0 [ 953.890948] do_syscall_64+0x1d5/0x640 [ 953.894846] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 953.900038] RIP: 0033:0x7f551d045ea7 [ 953.903740] RSP: 002b:00007f551b9baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 953.911447] RAX: ffffffffffffffda RBX: 00007f551d08fa20 RCX: 00007f551d045ea7 [ 953.918718] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:26:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 34) 08:26:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0xbae, 0x0, 0x2, 0x2, "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"}, 0xfffffffffffffd61) 08:26:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r2, 0x0, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x4, 0x0, 0x7, 0x8]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x4044840) (async) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000480)={0xffffffffffffffff, r0, 0x9, 0x99, &(0x7f00000003c0)="e7a4a540beab470625043d825635e4fbf9158d71957d0f5c98138dd624cfeb9d69ad25d061a7309310098f3362eb27c4503299cdd74e219e688b110c5a3e5065aa0791cf9b589431f5af275789df10a9d03651aec4b3cab8ef653dca294085eb27f42f2654bf8b2a84f2cb39e3f05d595e6c3aa2c90ad3659e9e388e55aaccfa8088c4e9b5b76e742c1397c7d2fa4bed2ba1f4ff38ae62e33d", 0x7, 0x1, 0x0, 0x80, 0x6, 0x0, 0xfffffff8, 'syz1\x00'}) (async) r4 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x20042, 0x0) (async) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x28, r5, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14}]}, 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x80) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) 08:26:23 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SYNTH_MEMAVL(r1, 0xc004510e, &(0x7f0000000000)=0x92a) [ 953.925989] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 953.933258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 953.940527] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 953.966894] XFS (loop4): unknown mount option [logbsize=]. [ 954.006080] FAULT_INJECTION: forcing a failure. [ 954.006080] name failslab, interval 1, probability 0, space 0, times 0 [ 954.019409] CPU: 0 PID: 20936 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 954.027304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.036655] Call Trace: [ 954.039244] dump_stack+0x1b2/0x281 [ 954.042879] should_fail.cold+0x10a/0x149 [ 954.047036] should_failslab+0xd6/0x130 [ 954.051013] kmem_cache_alloc_trace+0x29a/0x3d0 [ 954.055715] ? kobj_ns_drop+0x80/0x80 [ 954.059516] call_usermodehelper_setup+0x73/0x2e0 [ 954.064368] kobject_uevent_env+0xc21/0xf30 [ 954.068702] lo_ioctl+0x11a6/0x1cd0 [ 954.072336] ? loop_set_status64+0xe0/0xe0 [ 954.076579] blkdev_ioctl+0x540/0x1830 [ 954.080484] ? blkpg_ioctl+0x8d0/0x8d0 [ 954.084376] ? trace_hardirqs_on+0x10/0x10 [ 954.088615] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 954.093721] ? debug_check_no_obj_freed+0x2c0/0x680 [ 954.098742] block_ioctl+0xd9/0x120 [ 954.102372] ? blkdev_fallocate+0x3a0/0x3a0 [ 954.106701] do_vfs_ioctl+0x75a/0xff0 [ 954.110512] ? lock_acquire+0x170/0x3f0 [ 954.114487] ? ioctl_preallocate+0x1a0/0x1a0 [ 954.118895] ? __fget+0x265/0x3e0 [ 954.122351] ? do_vfs_ioctl+0xff0/0xff0 [ 954.126323] ? security_file_ioctl+0x83/0xb0 [ 954.130728] SyS_ioctl+0x7f/0xb0 [ 954.134088] ? do_vfs_ioctl+0xff0/0xff0 [ 954.138046] do_syscall_64+0x1d5/0x640 [ 954.141919] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 954.147088] RIP: 0033:0x7f1005389ea7 [ 954.150777] RSP: 002b:00007f1003cfef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 954.158461] RAX: ffffffffffffffda RBX: 00007f10053d3a20 RCX: 00007f1005389ea7 08:26:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 35) 08:26:23 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:23 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@exit_looper], 0xb4, 0x0, &(0x7f0000000140)="cb7d616a51c341a585dbbc8897c62e5e283f2627b24d4551a60b9092ac97583bfcdbc4f161b927c998c87963124c212fc2ac7db61d578b27e4711b7af0c36e1652bfcfdb98fc7a67d551f1fd12ac5b81df6f778c49aab0935609f1393e5eaee1739242ec14bfe2519efdfc392f7b288fefcf6755a3684974572aee08a3f3d0c46232602db7680f01bb410ae4123b7b5d47b22d1d9c7567fe32dd81f44df34741a7baf8c03c34e517eb690dc70b34c69888b4802d"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:23 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SYNTH_MEMAVL(r1, 0xc004510e, &(0x7f0000000000)=0x92a) 08:26:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x2, 0x4) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x0, 0x4, 0x4, "8ba997ba59e45d88538f1d63854a3f5295f8d7ebf6962200563decbc1f7c3b1cf61a553934b9eae2110538c3c506526b703b9133a91a77ad273260c1ffe19662d4548afba9fc5ea19fe1e3430dbd886eca7d4f7480bb448ef98cb7b60fd1b3482a33a5c325b435044758d5ec0816b0058cdbf3cc14728ffd26180eb33c4292e42c24f00d580304351a65a3eaec7e91695200aa8d119861dda3bcdda45ef1c9c17311b3793942e64ab42095e2893581000d7ad6462d05"}, 0xc6) 08:26:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 35) [ 954.165707] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 954.172955] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 954.180315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 954.187563] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 954.196714] XFS (loop0): unknown mount option [logbsize=]. 08:26:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x2, 0x4) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x0, 0x4, 0x4, "8ba997ba59e45d88538f1d63854a3f5295f8d7ebf6962200563decbc1f7c3b1cf61a553934b9eae2110538c3c506526b703b9133a91a77ad273260c1ffe19662d4548afba9fc5ea19fe1e3430dbd886eca7d4f7480bb448ef98cb7b60fd1b3482a33a5c325b435044758d5ec0816b0058cdbf3cc14728ffd26180eb33c4292e42c24f00d580304351a65a3eaec7e91695200aa8d119861dda3bcdda45ef1c9c17311b3793942e64ab42095e2893581000d7ad6462d05"}, 0xc6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x2, 0x4) (async) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x0, 0x4, 0x4, "8ba997ba59e45d88538f1d63854a3f5295f8d7ebf6962200563decbc1f7c3b1cf61a553934b9eae2110538c3c506526b703b9133a91a77ad273260c1ffe19662d4548afba9fc5ea19fe1e3430dbd886eca7d4f7480bb448ef98cb7b60fd1b3482a33a5c325b435044758d5ec0816b0058cdbf3cc14728ffd26180eb33c4292e42c24f00d580304351a65a3eaec7e91695200aa8d119861dda3bcdda45ef1c9c17311b3793942e64ab42095e2893581000d7ad6462d05"}, 0xc6) (async) 08:26:23 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) (async) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:23 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SYNTH_MEMAVL(r1, 0xc004510e, &(0x7f0000000000)=0x92a) 08:26:23 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@exit_looper], 0xb4, 0x0, &(0x7f0000000140)="cb7d616a51c341a585dbbc8897c62e5e283f2627b24d4551a60b9092ac97583bfcdbc4f161b927c998c87963124c212fc2ac7db61d578b27e4711b7af0c36e1652bfcfdb98fc7a67d551f1fd12ac5b81df6f778c49aab0935609f1393e5eaee1739242ec14bfe2519efdfc392f7b288fefcf6755a3684974572aee08a3f3d0c46232602db7680f01bb410ae4123b7b5d47b22d1d9c7567fe32dd81f44df34741a7baf8c03c34e517eb690dc70b34c69888b4802d"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@exit_looper], 0xb4, 0x0, &(0x7f0000000140)="cb7d616a51c341a585dbbc8897c62e5e283f2627b24d4551a60b9092ac97583bfcdbc4f161b927c998c87963124c212fc2ac7db61d578b27e4711b7af0c36e1652bfcfdb98fc7a67d551f1fd12ac5b81df6f778c49aab0935609f1393e5eaee1739242ec14bfe2519efdfc392f7b288fefcf6755a3684974572aee08a3f3d0c46232602db7680f01bb410ae4123b7b5d47b22d1d9c7567fe32dd81f44df34741a7baf8c03c34e517eb690dc70b34c69888b4802d"}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r1, &(0x7f0000000100), 0x10) (async) [ 954.273440] FAULT_INJECTION: forcing a failure. [ 954.273440] name failslab, interval 1, probability 0, space 0, times 0 [ 954.286753] FAULT_INJECTION: forcing a failure. [ 954.286753] name failslab, interval 1, probability 0, space 0, times 0 [ 954.306743] CPU: 0 PID: 20956 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 954.314651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.324004] Call Trace: [ 954.326597] dump_stack+0x1b2/0x281 [ 954.330226] should_fail.cold+0x10a/0x149 [ 954.334378] should_failslab+0xd6/0x130 [ 954.338357] kmem_cache_alloc+0x28e/0x3c0 [ 954.342509] getname_flags+0xc8/0x550 [ 954.346311] SyS_mkdirat+0x83/0x270 [ 954.349940] ? SyS_mknod+0x30/0x30 [ 954.353483] ? fput_many+0xe/0x140 [ 954.357020] ? do_syscall_64+0x4c/0x640 [ 954.360994] ? SyS_mknod+0x30/0x30 [ 954.364530] do_syscall_64+0x1d5/0x640 [ 954.368425] entry_SYSCALL_64_after_hwframe+0x46/0xbb 08:26:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x2, 0x4) (async) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x0, 0x4, 0x4, "8ba997ba59e45d88538f1d63854a3f5295f8d7ebf6962200563decbc1f7c3b1cf61a553934b9eae2110538c3c506526b703b9133a91a77ad273260c1ffe19662d4548afba9fc5ea19fe1e3430dbd886eca7d4f7480bb448ef98cb7b60fd1b3482a33a5c325b435044758d5ec0816b0058cdbf3cc14728ffd26180eb33c4292e42c24f00d580304351a65a3eaec7e91695200aa8d119861dda3bcdda45ef1c9c17311b3793942e64ab42095e2893581000d7ad6462d05"}, 0xc6) 08:26:23 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@exit_looper], 0xb4, 0x0, &(0x7f0000000140)="cb7d616a51c341a585dbbc8897c62e5e283f2627b24d4551a60b9092ac97583bfcdbc4f161b927c998c87963124c212fc2ac7db61d578b27e4711b7af0c36e1652bfcfdb98fc7a67d551f1fd12ac5b81df6f778c49aab0935609f1393e5eaee1739242ec14bfe2519efdfc392f7b288fefcf6755a3684974572aee08a3f3d0c46232602db7680f01bb410ae4123b7b5d47b22d1d9c7567fe32dd81f44df34741a7baf8c03c34e517eb690dc70b34c69888b4802d"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@exit_looper], 0xb4, 0x0, &(0x7f0000000140)="cb7d616a51c341a585dbbc8897c62e5e283f2627b24d4551a60b9092ac97583bfcdbc4f161b927c998c87963124c212fc2ac7db61d578b27e4711b7af0c36e1652bfcfdb98fc7a67d551f1fd12ac5b81df6f778c49aab0935609f1393e5eaee1739242ec14bfe2519efdfc392f7b288fefcf6755a3684974572aee08a3f3d0c46232602db7680f01bb410ae4123b7b5d47b22d1d9c7567fe32dd81f44df34741a7baf8c03c34e517eb690dc70b34c69888b4802d"}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r1, &(0x7f0000000100), 0x10) (async) [ 954.373621] RIP: 0033:0x7f551d0451f7 [ 954.377328] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 954.385034] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 954.392302] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 954.399579] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 954.406851] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 954.414117] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 954.435029] CPU: 0 PID: 20961 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 954.442978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.452331] Call Trace: [ 954.455061] dump_stack+0x1b2/0x281 [ 954.458699] should_fail.cold+0x10a/0x149 [ 954.462868] should_failslab+0xd6/0x130 [ 954.466858] kmem_cache_alloc+0x28e/0x3c0 [ 954.471013] getname_flags+0xc8/0x550 [ 954.474821] SyS_mkdirat+0x83/0x270 [ 954.478452] ? SyS_mknod+0x30/0x30 [ 954.481997] ? fput_many+0xe/0x140 [ 954.485560] ? do_syscall_64+0x4c/0x640 [ 954.489538] ? SyS_mknod+0x30/0x30 [ 954.493090] do_syscall_64+0x1d5/0x640 [ 954.496989] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 954.502187] RIP: 0033:0x7f10053891f7 [ 954.505894] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 954.513603] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 954.520873] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 954.528144] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 08:26:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 36) 08:26:23 executing program 1: getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) write$nbd(r0, 0x0, 0x0) 08:26:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRESDEC, @ANYRESHEX=r2, @ANYRES64=r1, @ANYRES32=r3, @ANYBLOB="2d4fb07b6a3ad9cf424ab93ddb77ea7259e52aaf5deb5de555978ad94770ddfb195af9e6aafbfedebe1e3824b91e3850d76a03a89e4721c0860efe2f19668d4175e7af4c3018a0b43c2df1f8d1f4cb3e5c9f7bc70c28b8adecea030000d5b7dfd7c94ce408a42bf9711a2fcadb9abf4a653f40713287d0d86e2db6f504c1381fead2dd7f69d1df7ff23cc99db78d9799b43715dff9a62bb6df3d005061f53e5f611c02f3b56c8d87308bdc72d9cb0db3d69de8cd758cf593515131ba00db5186e2d1fc7408037795b847dca17566470366edb0de7ca003397db1f2bf1e03c583375f0e4c8cd69f103f56f5af61710952638a02d591fbaabd467eaa5d95a45287859ec6e2ef3aea855915859035e94df0f1ed0b2694a85c0cc3efe716a35191fddbc036bd12", @ANYRESHEX=r0, @ANYRESDEC=r3], 0x10) 08:26:23 executing program 2: ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000040)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100), 0x22301, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 08:26:23 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 954.535415] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 954.542682] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:23 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 36) 08:26:23 executing program 1: getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) write$nbd(r0, 0x0, 0x0) getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:23 executing program 2: ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000040)) (async) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100), 0x22301, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) (async) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) [ 954.627983] FAULT_INJECTION: forcing a failure. [ 954.627983] name failslab, interval 1, probability 0, space 0, times 0 [ 954.641558] FAULT_INJECTION: forcing a failure. [ 954.641558] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 954.653373] CPU: 1 PID: 21021 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 954.661255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.670610] Call Trace: [ 954.673201] dump_stack+0x1b2/0x281 [ 954.676842] should_fail.cold+0x10a/0x149 [ 954.680998] __alloc_pages_nodemask+0x22c/0x2720 [ 954.685756] ? kobject_uevent_env+0x274/0xf30 [ 954.690264] ? __lock_acquire+0x5fc/0x3f20 [ 954.694511] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 954.699370] ? blkdev_ioctl+0xf4/0x1830 [ 954.703344] ? blkpg_ioctl+0x8d0/0x8d0 [ 954.707229] ? trace_hardirqs_on+0x10/0x10 [ 954.711464] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 954.716568] cache_grow_begin+0x91/0x700 [ 954.720626] ? fs_reclaim_release+0xd0/0x110 [ 954.725119] ? check_preemption_disabled+0x35/0x240 [ 954.730227] cache_alloc_refill+0x273/0x350 [ 954.734559] kmem_cache_alloc+0x333/0x3c0 [ 954.738718] getname_flags+0xc8/0x550 [ 954.742525] SyS_mkdirat+0x83/0x270 [ 954.746154] ? SyS_mknod+0x30/0x30 [ 954.749706] ? fput_many+0xe/0x140 [ 954.753252] ? do_syscall_64+0x4c/0x640 [ 954.757226] ? SyS_mknod+0x30/0x30 [ 954.760776] do_syscall_64+0x1d5/0x640 [ 954.764684] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 954.769869] RIP: 0033:0x7f551d0451f7 08:26:24 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="674c66980000000000000000"], 0x10) 08:26:24 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="674c66980000000000000000"], 0x10) 08:26:24 executing program 1: getsockopt$WPAN_WANTLQI(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) (async) write$nbd(r0, 0x0, 0x0) 08:26:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRESDEC, @ANYRESHEX=r2, @ANYRES64=r1, @ANYRES32=r3, @ANYBLOB="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", @ANYRESHEX=r0, @ANYRESDEC=r3], 0x10) [ 954.773575] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 954.781284] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 954.788565] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 954.795838] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 954.803110] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 954.810390] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 954.847348] CPU: 1 PID: 21023 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 954.855255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.864610] Call Trace: [ 954.867204] dump_stack+0x1b2/0x281 [ 954.870840] should_fail.cold+0x10a/0x149 [ 954.874998] should_failslab+0xd6/0x130 [ 954.878982] kmem_cache_alloc+0x28e/0x3c0 [ 954.883136] getname_flags+0xc8/0x550 [ 954.886943] SyS_mkdirat+0x83/0x270 [ 954.890577] ? SyS_mknod+0x30/0x30 [ 954.894119] ? fput_many+0xe/0x140 [ 954.897666] ? do_syscall_64+0x4c/0x640 [ 954.901638] ? SyS_mknod+0x30/0x30 [ 954.905185] do_syscall_64+0x1d5/0x640 [ 954.909077] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 954.914267] RIP: 0033:0x7f10053891f7 [ 954.917974] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 954.920502] XFS (loop4): unknown mount option [logbsize=]. [ 954.925680] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 954.925686] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 954.925691] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 954.925696] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 954.925702] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 37) 08:26:24 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="674c66980000000000000000"], 0x10) 08:26:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x0, 0x1}) 08:26:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRESDEC, @ANYRESHEX=r2, @ANYRES64=r1, @ANYRES32=r3, @ANYBLOB="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", @ANYRESHEX=r0, @ANYRESDEC=r3], 0x10) 08:26:24 executing program 2: ioctl$SNDCTL_SEQ_NRSYNTHS(0xffffffffffffffff, 0x8004510a, &(0x7f0000000040)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100), 0x22301, 0x0) ioctl$SNDCTL_SEQ_PANIC(r0, 0x5111) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) socket$nl_rdma(0x10, 0x3, 0x14) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (rerun: 32) 08:26:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 37) [ 955.073651] FAULT_INJECTION: forcing a failure. [ 955.073651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 955.085476] CPU: 0 PID: 21079 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 955.088246] FAULT_INJECTION: forcing a failure. [ 955.088246] name failslab, interval 1, probability 0, space 0, times 0 [ 955.093355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.093360] Call Trace: [ 955.093377] dump_stack+0x1b2/0x281 08:26:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x0, 0x1}) 08:26:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000000)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x0, 0x1}) 08:26:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 08:26:24 executing program 3: getitimer(0x1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WRITEPROTECT(0xffffffffffffffff, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0xc0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) r3 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYRES64=0x0], 0x10) [ 955.093391] should_fail.cold+0x10a/0x149 [ 955.093405] __alloc_pages_nodemask+0x22c/0x2720 [ 955.093417] ? kobject_uevent_env+0x274/0xf30 [ 955.093433] ? __lock_acquire+0x5fc/0x3f20 [ 955.093447] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 955.093461] ? blkdev_ioctl+0xf4/0x1830 [ 955.093471] ? blkpg_ioctl+0x8d0/0x8d0 [ 955.093487] ? trace_hardirqs_on+0x10/0x10 [ 955.154751] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 955.159862] cache_grow_begin+0x91/0x700 [ 955.163925] ? fs_reclaim_release+0xd0/0x110 [ 955.168330] ? check_preemption_disabled+0x35/0x240 08:26:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) (async) 08:26:24 executing program 3: getitimer(0x1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WRITEPROTECT(0xffffffffffffffff, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0xc0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) r3 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYRES64=0x0], 0x10) getitimer(0x1, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$UFFDIO_WRITEPROTECT(0xffffffffffffffff, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0xc0, 0x0) (async) ioctl$RTC_UIE_ON(r2, 0x7003) (async) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) (async) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) (async) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYRES64=0x0], 0x10) (async) [ 955.173341] cache_alloc_refill+0x273/0x350 [ 955.177657] kmem_cache_alloc+0x333/0x3c0 [ 955.181803] getname_flags+0xc8/0x550 [ 955.185605] SyS_mkdirat+0x83/0x270 [ 955.189232] ? SyS_mknod+0x30/0x30 [ 955.192767] ? fput_many+0xe/0x140 [ 955.196305] ? do_syscall_64+0x4c/0x640 [ 955.200272] ? SyS_mknod+0x30/0x30 [ 955.203807] do_syscall_64+0x1d5/0x640 [ 955.207705] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 955.212896] RIP: 0033:0x7f10053891f7 [ 955.216609] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 955.224331] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 955.231602] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 955.238874] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 955.246137] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 955.253401] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 955.275736] CPU: 1 PID: 21086 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 955.283653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.293008] Call Trace: [ 955.295601] dump_stack+0x1b2/0x281 [ 955.299243] should_fail.cold+0x10a/0x149 [ 955.303393] should_failslab+0xd6/0x130 [ 955.307370] kmem_cache_alloc+0x28e/0x3c0 [ 955.311522] __d_alloc+0x2a/0xa20 [ 955.314975] ? d_lookup+0x172/0x220 [ 955.318604] d_alloc+0x46/0x240 [ 955.321890] __lookup_hash+0x101/0x270 [ 955.325783] filename_create+0x156/0x3f0 [ 955.329850] ? kern_path_mountpoint+0x40/0x40 [ 955.334356] SyS_mkdirat+0x95/0x270 [ 955.337986] ? SyS_mknod+0x30/0x30 [ 955.341530] ? fput_many+0xe/0x140 [ 955.345070] ? do_syscall_64+0x4c/0x640 [ 955.349048] ? SyS_mknod+0x30/0x30 [ 955.352589] do_syscall_64+0x1d5/0x640 [ 955.356480] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 955.361674] RIP: 0033:0x7f551d0451f7 [ 955.365384] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 955.365542] XFS (loop0): unknown mount option [logbsize=]. [ 955.373097] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 955.373103] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 955.373108] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 955.373112] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 955.373116] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 38) 08:26:24 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000000)) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:24 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x40080) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0xde) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x2, &(0x7f0000000080)={r2, r3+60000000}) 08:26:24 executing program 3: getitimer(0x1, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WRITEPROTECT(0xffffffffffffffff, 0xc018aa06, &(0x7f0000000000)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async, rerun: 64) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0xc0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) r3 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYRES64=0x0], 0x10) 08:26:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 08:26:24 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 38) 08:26:24 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x40080) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0xde) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) (async) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x2, &(0x7f0000000080)={r2, r3+60000000}) 08:26:24 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x946, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x20000000) write$nbd(r0, &(0x7f0000000100), 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xec6d}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8800}, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x1407, 0x8, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20}, 0x8004) [ 955.502791] FAULT_INJECTION: forcing a failure. [ 955.502791] name failslab, interval 1, probability 0, space 0, times 0 08:26:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 955.545377] CPU: 0 PID: 21143 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 955.553280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.553329] FAULT_INJECTION: forcing a failure. [ 955.553329] name failslab, interval 1, probability 0, space 0, times 0 [ 955.562630] Call Trace: [ 955.562648] dump_stack+0x1b2/0x281 [ 955.562664] should_fail.cold+0x10a/0x149 [ 955.562676] should_failslab+0xd6/0x130 [ 955.562688] kmem_cache_alloc+0x28e/0x3c0 [ 955.562698] ? ext4_sync_fs+0x7e0/0x7e0 [ 955.562705] ext4_alloc_inode+0x1a/0x640 [ 955.562714] ? ext4_sync_fs+0x7e0/0x7e0 [ 955.562723] alloc_inode+0x5d/0x170 [ 955.562732] new_inode+0x1d/0xf0 [ 955.562742] __ext4_new_inode+0x360/0x4eb0 [ 955.562751] ? kmem_cache_free+0x7c/0x2b0 [ 955.562758] ? putname+0xcd/0x110 [ 955.562766] ? SyS_mkdirat+0x95/0x270 [ 955.562774] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 955.562789] ? ext4_free_inode+0x1460/0x1460 [ 955.562806] ? lock_downgrade+0x740/0x740 [ 955.562820] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 955.645980] ? dquot_initialize_needed+0x240/0x240 [ 955.650915] ext4_mkdir+0x2e4/0xbd0 [ 955.654551] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 955.659216] ? security_inode_mkdir+0xca/0x100 [ 955.663785] vfs_mkdir+0x463/0x6e0 [ 955.667314] SyS_mkdirat+0x1fd/0x270 [ 955.671018] ? SyS_mknod+0x30/0x30 [ 955.674548] ? fput_many+0xe/0x140 [ 955.678084] ? do_syscall_64+0x4c/0x640 [ 955.682042] ? SyS_mknod+0x30/0x30 [ 955.685578] do_syscall_64+0x1d5/0x640 [ 955.689455] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 955.694701] RIP: 0033:0x7f551d0451f7 [ 955.698396] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 955.706095] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 955.713361] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 955.720629] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 955.727888] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 955.735141] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 955.742410] CPU: 1 PID: 21147 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 955.750295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.759649] Call Trace: [ 955.762239] dump_stack+0x1b2/0x281 [ 955.765874] should_fail.cold+0x10a/0x149 [ 955.770212] should_failslab+0xd6/0x130 [ 955.774187] __kmalloc+0x2c1/0x400 [ 955.777723] ? ext4_find_extent+0x879/0xbc0 [ 955.782054] ext4_find_extent+0x879/0xbc0 [ 955.786208] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 955.791666] ext4_ext_map_blocks+0x19a/0x6b10 [ 955.796165] ? __lock_acquire+0x5fc/0x3f20 [ 955.800402] ? __lock_acquire+0x5fc/0x3f20 [ 955.804647] ? mark_buffer_dirty+0x95/0x480 [ 955.808970] ? trace_hardirqs_on+0x10/0x10 [ 955.813207] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 955.818576] ? ext4_find_delalloc_cluster+0x180/0x180 [ 955.823772] ? trace_hardirqs_on+0x10/0x10 [ 955.828005] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 955.832855] ? ext4_es_lookup_extent+0x321/0xac0 [ 955.837620] ? lock_acquire+0x170/0x3f0 [ 955.841598] ? lock_acquire+0x170/0x3f0 08:26:25 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000000)) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 955.845575] ? ext4_map_blocks+0x29f/0x1730 [ 955.849895] ext4_map_blocks+0xb19/0x1730 [ 955.854039] ? ext4_issue_zeroout+0x150/0x150 [ 955.858535] ? __ext4_new_inode+0x27c/0x4eb0 [ 955.862949] ext4_getblk+0x98/0x3f0 [ 955.866578] ? ext4_iomap_begin+0x7f0/0x7f0 [ 955.870903] ext4_bread+0x6c/0x1a0 [ 955.874442] ? ext4_getblk+0x3f0/0x3f0 [ 955.878324] ? dquot_initialize_needed+0x240/0x240 [ 955.883262] ext4_append+0x143/0x350 [ 955.886976] ext4_mkdir+0x4c9/0xbd0 [ 955.890619] ? ext4_init_dot_dotdot+0x5a0/0x5a0 08:26:25 executing program 5: r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1407, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='gD\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00'], 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, 0x1403, 0x200, 0x70bd27, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'macvlan1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'virt_wifi0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) [ 955.895293] ? security_inode_mkdir+0xca/0x100 [ 955.899879] vfs_mkdir+0x463/0x6e0 [ 955.903421] SyS_mkdirat+0x1fd/0x270 [ 955.907138] ? SyS_mknod+0x30/0x30 [ 955.910684] ? fput_many+0xe/0x140 [ 955.914227] ? do_syscall_64+0x4c/0x640 [ 955.918202] ? SyS_mknod+0x30/0x30 [ 955.921749] do_syscall_64+0x1d5/0x640 [ 955.925653] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 955.930874] RIP: 0033:0x7f10053891f7 [ 955.934581] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 08:26:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 08:26:25 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x40080) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0xde) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x2, &(0x7f0000000080)={r2, r3+60000000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x40080) (async) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0xde) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) (async) clock_gettime(0x0, &(0x7f0000000040)) (async) clock_settime(0x2, &(0x7f0000000080)={r2, r3+60000000}) (async) 08:26:25 executing program 5: r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1407, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='gD\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00'], 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, 0x1403, 0x200, 0x70bd27, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'macvlan1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'virt_wifi0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1407, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='gD\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00'], 0x10) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, 0x1403, 0x200, 0x70bd27, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'macvlan1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'virt_wifi0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) (async) 08:26:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x946, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x20000000) write$nbd(r0, &(0x7f0000000100), 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xec6d}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8800}, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x1407, 0x8, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20}, 0x8004) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x946, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x20000000) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xec6d}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8800}, 0x80) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x1407, 0x8, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20}, 0x8004) (async) 08:26:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 39) [ 955.942296] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 955.949564] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 955.956830] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 955.964095] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 955.971348] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 955.991380] XFS (loop0): unknown mount option [logbsize=]. 08:26:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 39) 08:26:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 08:26:25 executing program 5: r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1407, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='gD\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00'], 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, 0x1403, 0x200, 0x70bd27, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'macvlan1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth0_to_bond\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'virt_wifi0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) 08:26:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd28, 0x946, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x20000000) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x5}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xec6d}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8800}, 0x80) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, 0x1407, 0x8, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20}, 0x8004) [ 956.038088] FAULT_INJECTION: forcing a failure. [ 956.038088] name failslab, interval 1, probability 0, space 0, times 0 [ 956.077215] FAULT_INJECTION: forcing a failure. [ 956.077215] name failslab, interval 1, probability 0, space 0, times 0 [ 956.090021] CPU: 1 PID: 21220 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 956.097909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.107261] Call Trace: [ 956.109937] dump_stack+0x1b2/0x281 [ 956.113577] should_fail.cold+0x10a/0x149 [ 956.117733] should_failslab+0xd6/0x130 [ 956.121707] kmem_cache_alloc+0x40/0x3c0 [ 956.125770] __es_insert_extent+0x338/0x1360 [ 956.130178] ? __es_shrink+0x8c0/0x8c0 [ 956.134063] ? lock_acquire+0x170/0x3f0 [ 956.138037] ? ext4_es_insert_extent+0x11f/0x530 [ 956.142798] ext4_es_insert_extent+0x1b9/0x530 [ 956.147383] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 956.153179] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 956.158629] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 956.164425] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 956.169013] ? __lock_acquire+0x5fc/0x3f20 [ 956.173251] ? __lock_acquire+0x5fc/0x3f20 [ 956.177490] ? mark_buffer_dirty+0x95/0x480 [ 956.181817] ? trace_hardirqs_on+0x10/0x10 08:26:25 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xe9}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ipvlan1\x00'}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f00000001c0), 0x44000) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) 08:26:25 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) [ 956.186063] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 956.191424] ? ext4_find_delalloc_cluster+0x180/0x180 [ 956.196614] ? trace_hardirqs_on+0x10/0x10 [ 956.200849] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 956.205699] ? ext4_es_lookup_extent+0x321/0xac0 [ 956.210456] ? lock_acquire+0x170/0x3f0 [ 956.214432] ? lock_acquire+0x170/0x3f0 [ 956.218401] ? ext4_map_blocks+0x29f/0x1730 [ 956.222734] ext4_map_blocks+0xb19/0x1730 [ 956.226886] ? ext4_issue_zeroout+0x150/0x150 [ 956.231373] ? __ext4_new_inode+0x27c/0x4eb0 [ 956.235784] ext4_getblk+0x98/0x3f0 [ 956.239414] ? ext4_iomap_begin+0x7f0/0x7f0 [ 956.243738] ext4_bread+0x6c/0x1a0 [ 956.247443] ? ext4_getblk+0x3f0/0x3f0 [ 956.251320] ? dquot_initialize_needed+0x240/0x240 [ 956.256239] ext4_append+0x143/0x350 [ 956.259944] ext4_mkdir+0x4c9/0xbd0 [ 956.263567] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 956.268247] ? security_inode_mkdir+0xca/0x100 [ 956.272832] vfs_mkdir+0x463/0x6e0 [ 956.276369] SyS_mkdirat+0x1fd/0x270 [ 956.280082] ? SyS_mknod+0x30/0x30 [ 956.283617] ? fput_many+0xe/0x140 [ 956.287156] ? do_syscall_64+0x4c/0x640 [ 956.291116] ? SyS_mknod+0x30/0x30 [ 956.294637] do_syscall_64+0x1d5/0x640 [ 956.298509] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 956.303680] RIP: 0033:0x7f10053891f7 [ 956.307369] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 956.315056] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 956.322393] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 956.329643] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 956.336897] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 956.344148] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 956.351414] CPU: 0 PID: 21195 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 956.359289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.368638] Call Trace: [ 956.371223] dump_stack+0x1b2/0x281 [ 956.374854] should_fail.cold+0x10a/0x149 [ 956.379002] should_failslab+0xd6/0x130 [ 956.382973] __kmalloc+0x2c1/0x400 08:26:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 956.384377] XFS (loop0): unknown mount option [logbsize=]. [ 956.386504] ? ext4_find_extent+0x879/0xbc0 [ 956.386514] ? trace_hardirqs_on+0x10/0x10 [ 956.386528] ext4_find_extent+0x879/0xbc0 [ 956.404802] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 956.410255] ext4_ext_map_blocks+0x19a/0x6b10 [ 956.414755] ? __lock_acquire+0x5fc/0x3f20 [ 956.418991] ? finish_task_switch+0x178/0x610 [ 956.423486] ? finish_task_switch+0x14d/0x610 [ 956.427978] ? switch_mm_irqs_off+0x601/0xeb0 [ 956.432476] ? ext4_find_delalloc_cluster+0x180/0x180 [ 956.437668] ? trace_hardirqs_on+0x10/0x10 [ 956.441909] ? io_schedule_timeout+0x140/0x140 [ 956.446496] ? ___preempt_schedule+0x16/0x18 [ 956.450912] ? preempt_schedule_common+0x45/0xc0 [ 956.455669] ? lock_acquire+0x170/0x3f0 [ 956.459648] ? ext4_map_blocks+0x29f/0x1730 [ 956.463974] ext4_map_blocks+0xb19/0x1730 [ 956.468128] ? ext4_issue_zeroout+0x150/0x150 [ 956.472626] ? __ext4_new_inode+0x27c/0x4eb0 [ 956.477039] ext4_getblk+0x98/0x3f0 [ 956.480668] ? ext4_iomap_begin+0x7f0/0x7f0 [ 956.484996] ext4_bread+0x6c/0x1a0 [ 956.488546] ? ext4_getblk+0x3f0/0x3f0 [ 956.492690] ? dquot_initialize_needed+0x240/0x240 [ 956.497627] ext4_append+0x143/0x350 [ 956.501349] ext4_mkdir+0x4c9/0xbd0 [ 956.504978] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 956.509647] ? security_inode_mkdir+0xca/0x100 [ 956.514223] vfs_mkdir+0x463/0x6e0 [ 956.517747] SyS_mkdirat+0x1fd/0x270 [ 956.521440] ? SyS_mknod+0x30/0x30 [ 956.524964] ? fput_many+0xe/0x140 [ 956.528491] ? do_syscall_64+0x4c/0x640 [ 956.532448] ? SyS_mknod+0x30/0x30 [ 956.536000] do_syscall_64+0x1d5/0x640 [ 956.539881] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 956.545058] RIP: 0033:0x7f551d0451f7 [ 956.548747] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 956.556432] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 956.563679] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 956.570925] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 956.578175] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 956.585510] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 956.605485] XFS (loop4): unknown mount option [logbsize=]. 08:26:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 40) 08:26:25 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:25 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) (async) 08:26:25 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:25 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xe9}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ipvlan1\x00'}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) (async) openat$mice(0xffffffffffffff9c, &(0x7f00000001c0), 0x44000) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) 08:26:25 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 40) 08:26:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) (async) write$nbd(r0, &(0x7f0000000100), 0x10) [ 956.683488] FAULT_INJECTION: forcing a failure. [ 956.683488] name failslab, interval 1, probability 0, space 0, times 0 [ 956.713024] CPU: 1 PID: 21275 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 956.720933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.730284] Call Trace: [ 956.732878] dump_stack+0x1b2/0x281 [ 956.736511] should_fail.cold+0x10a/0x149 [ 956.740668] should_failslab+0xd6/0x130 [ 956.744645] __kmalloc+0x2c1/0x400 [ 956.748183] ? ext4_find_extent+0x879/0xbc0 [ 956.752508] ext4_find_extent+0x879/0xbc0 [ 956.756655] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 956.762106] ext4_ext_map_blocks+0x19a/0x6b10 [ 956.766604] ? __lock_acquire+0x5fc/0x3f20 [ 956.770842] ? mark_buffer_dirty+0x95/0x480 [ 956.775160] ? trace_hardirqs_on+0x10/0x10 [ 956.779393] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 956.784774] ? ext4_find_delalloc_cluster+0x180/0x180 [ 956.789965] ? trace_hardirqs_on+0x10/0x10 [ 956.794199] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 956.799079] ? ext4_es_lookup_extent+0x321/0xac0 [ 956.803840] ? lock_acquire+0x170/0x3f0 [ 956.807817] ? lock_acquire+0x170/0x3f0 [ 956.811784] ? ext4_map_blocks+0x623/0x1730 [ 956.816109] ext4_map_blocks+0x675/0x1730 [ 956.820257] ? ext4_issue_zeroout+0x150/0x150 [ 956.824762] ? __ext4_new_inode+0x27c/0x4eb0 [ 956.829175] ext4_getblk+0x98/0x3f0 [ 956.832807] ? ext4_iomap_begin+0x7f0/0x7f0 [ 956.837136] ext4_bread+0x6c/0x1a0 [ 956.840672] ? ext4_getblk+0x3f0/0x3f0 [ 956.844555] ? dquot_initialize_needed+0x240/0x240 [ 956.849486] ext4_append+0x143/0x350 [ 956.853197] ext4_mkdir+0x4c9/0xbd0 [ 956.856842] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 956.861507] ? security_inode_mkdir+0xca/0x100 [ 956.866088] vfs_mkdir+0x463/0x6e0 [ 956.869635] SyS_mkdirat+0x1fd/0x270 [ 956.873350] ? SyS_mknod+0x30/0x30 [ 956.876885] ? fput_many+0xe/0x140 [ 956.880418] ? do_syscall_64+0x4c/0x640 [ 956.884386] ? SyS_mknod+0x30/0x30 [ 956.887921] do_syscall_64+0x1d5/0x640 [ 956.891808] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 956.896988] RIP: 0033:0x7f551d0451f7 [ 956.900701] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 956.908400] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 956.915663] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 956.922930] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 08:26:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4) (async) 08:26:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) 08:26:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="674466980100"/16], 0x10) 08:26:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="674466980100"/16], 0x10) 08:26:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="674466980100"/16], 0x10) [ 956.930190] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 956.937451] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 956.956633] FAULT_INJECTION: forcing a failure. [ 956.956633] name failslab, interval 1, probability 0, space 0, times 0 [ 956.979390] CPU: 1 PID: 21290 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 956.987275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.996627] Call Trace: [ 956.999213] dump_stack+0x1b2/0x281 [ 957.002842] should_fail.cold+0x10a/0x149 [ 957.007259] ? is_bpf_text_address+0x91/0x150 [ 957.011757] should_failslab+0xd6/0x130 [ 957.015754] kmem_cache_alloc+0x40/0x3c0 [ 957.019817] __debug_object_init+0x578/0x7a0 [ 957.024226] ? debug_object_destroy+0x240/0x240 [ 957.028892] ? __lockdep_init_map+0x100/0x560 [ 957.033385] __init_work+0x3f/0x50 [ 957.036927] ext4_alloc_inode+0x46c/0x640 [ 957.041073] ? ext4_sync_fs+0x7e0/0x7e0 [ 957.045042] alloc_inode+0x5d/0x170 [ 957.048660] new_inode+0x1d/0xf0 [ 957.052009] __ext4_new_inode+0x360/0x4eb0 [ 957.056222] ? kmem_cache_free+0x7c/0x2b0 [ 957.060364] ? putname+0xcd/0x110 [ 957.063795] ? SyS_mkdirat+0x95/0x270 [ 957.067570] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 957.072921] ? ext4_free_inode+0x1460/0x1460 [ 957.077307] ? lock_downgrade+0x740/0x740 [ 957.081433] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 957.086511] ? dquot_initialize_needed+0x240/0x240 [ 957.091435] ext4_mkdir+0x2e4/0xbd0 [ 957.095051] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 957.099700] ? security_inode_mkdir+0xca/0x100 [ 957.104263] vfs_mkdir+0x463/0x6e0 [ 957.107783] SyS_mkdirat+0x1fd/0x270 [ 957.111478] ? SyS_mknod+0x30/0x30 [ 957.115103] ? fput_many+0xe/0x140 [ 957.118628] ? do_syscall_64+0x4c/0x640 [ 957.122575] ? SyS_mknod+0x30/0x30 [ 957.126090] do_syscall_64+0x1d5/0x640 [ 957.129965] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 957.135136] RIP: 0033:0x7f10053891f7 [ 957.138827] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 957.146509] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 957.153762] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 957.161014] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 957.168258] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 957.175503] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 41) 08:26:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) 08:26:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698000000002a5dff99132d8024714d7634ff59940b7d68ebbb5f1cf3ea666623fb66c322567077ccaf7fb07b31d4387b99def7fe56b616100fd2717d624d4cd891bd4d30a45e284fa762d2e88037291df7d65a56c44be561d3b6e251507f7eebc47e7b8ed1fc8634b27fe38077"], 0x10) 08:26:26 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x10) memfd_create(&(0x7f0000000180)='\\@]\x00\xeb\xffp\x05_\xe0\x8c\xdc}f\xd8\xb3\xc4\xec\x94\x02\x00\x00\x00\x00\x00\x00\x00\xe8\x7fU\xa6$x8\xd2\x8d\xbd\xf4\x1e\x88i\t+\xb8\xa3\x80\xad\r\x82\x93\xe9\xb6|GW\xa1-A\xf1\xac\xe6P\xb2W\xb63Tt\x13\xca\xb6\xbf\x00\xe2\xf5\xf5\x10Q,h\xe6\x9c\x11\xa0T\xbf\xd4\xa9Ww\x02\xe9]^\xff\x91f\x17\xc4^B\xa1\x1d\xbc\xa5\xaa\xaa\x0f\x86\xba', 0x0) 08:26:26 executing program 1: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xe9}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ipvlan1\x00'}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f00000001c0), 0x44000) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xe9}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ipvlan1\x00'}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) write$nbd(r1, 0x0, 0x0) (async) openat$mice(0xffffffffffffff9c, &(0x7f00000001c0), 0x44000) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) (async) 08:26:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 41) [ 957.184339] XFS (loop0): unknown mount option [logbsize=]. [ 957.249013] FAULT_INJECTION: forcing a failure. [ 957.249013] name failslab, interval 1, probability 0, space 0, times 0 [ 957.260547] CPU: 1 PID: 21338 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 957.268438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.277794] Call Trace: [ 957.280382] dump_stack+0x1b2/0x281 [ 957.284015] should_fail.cold+0x10a/0x149 [ 957.288167] should_failslab+0xd6/0x130 [ 957.292143] kmem_cache_alloc+0x40/0x3c0 [ 957.296202] __es_insert_extent+0x338/0x1360 [ 957.300608] ? __es_shrink+0x8c0/0x8c0 [ 957.304489] ? lock_acquire+0x170/0x3f0 [ 957.308462] ? ext4_es_insert_extent+0x11f/0x530 [ 957.313221] ext4_es_insert_extent+0x1b9/0x530 [ 957.317805] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 957.323605] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 957.329061] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 957.334862] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 957.339446] ? __lock_acquire+0x5fc/0x3f20 [ 957.343684] ? __lock_acquire+0x5fc/0x3f20 [ 957.347923] ? mark_buffer_dirty+0x95/0x480 [ 957.352245] ? trace_hardirqs_on+0x10/0x10 [ 957.356482] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 957.361854] ? ext4_find_delalloc_cluster+0x180/0x180 [ 957.367045] ? trace_hardirqs_on+0x10/0x10 [ 957.371276] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 957.376133] ? ext4_es_lookup_extent+0x321/0xac0 [ 957.380892] ? lock_acquire+0x170/0x3f0 [ 957.384870] ? lock_acquire+0x170/0x3f0 [ 957.388840] ? ext4_map_blocks+0x29f/0x1730 [ 957.393168] ext4_map_blocks+0xb19/0x1730 [ 957.397319] ? ext4_issue_zeroout+0x150/0x150 [ 957.401810] ? __ext4_new_inode+0x27c/0x4eb0 [ 957.406240] ext4_getblk+0x98/0x3f0 [ 957.409867] ? ext4_iomap_begin+0x7f0/0x7f0 [ 957.414196] ext4_bread+0x6c/0x1a0 [ 957.417734] ? ext4_getblk+0x3f0/0x3f0 [ 957.421621] ? dquot_initialize_needed+0x240/0x240 [ 957.426554] ext4_append+0x143/0x350 [ 957.430278] ext4_mkdir+0x4c9/0xbd0 [ 957.433917] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 957.438594] ? security_inode_mkdir+0xca/0x100 [ 957.443182] vfs_mkdir+0x463/0x6e0 [ 957.446738] SyS_mkdirat+0x1fd/0x270 [ 957.450459] ? SyS_mknod+0x30/0x30 [ 957.454004] ? do_syscall_64+0x4c/0x640 [ 957.457976] ? SyS_mknod+0x30/0x30 [ 957.461525] do_syscall_64+0x1d5/0x640 [ 957.465414] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 957.470603] RIP: 0033:0x7f10053891f7 [ 957.474305] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 957.482009] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 957.489544] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c 08:26:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) 08:26:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) (async) 08:26:26 executing program 2: select(0x40, &(0x7f0000000040)={0x9, 0x1, 0x3, 0x1f, 0x2, 0x4, 0x89a4, 0x20}, &(0x7f0000000080)={0x400, 0x904, 0x5, 0x9, 0x9f, 0xc7, 0xfffffffffffffffc, 0xe2}, &(0x7f00000000c0)={0x8000000000000000, 0x7, 0x8, 0x80000000, 0x8000000000000000, 0x7, 0x2, 0x80000000}, &(0x7f0000000100)) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="54010079c87bcc170a04b34df6ca92302a43708f8b54122618075937f8f79f3b3664fe54bdc1b75b3b9ceaeb3045524d26f4f652d0498e56d5c6b6e66e46f3a7b5cc7383b01778cfbdaad993e37bce0249494b", @ANYRES16=0x0, @ANYBLOB="207b8df515a20b4b1f2bbd7000fbdbdf25010000001400010000000000000000000000000000000000050006000100000014000100fe8800000000000000000000000000010500050005000000050006"], 0x54}, 0x1, 0x0, 0x0, 0x20000001}, 0x8000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000180)={0x0, &(0x7f00000003c0)}) connect$netlink(0xffffffffffffffff, &(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x2000}, 0xc) 08:26:26 executing program 2: select(0x40, &(0x7f0000000040)={0x9, 0x1, 0x3, 0x1f, 0x2, 0x4, 0x89a4, 0x20}, &(0x7f0000000080)={0x400, 0x904, 0x5, 0x9, 0x9f, 0xc7, 0xfffffffffffffffc, 0xe2}, &(0x7f00000000c0)={0x8000000000000000, 0x7, 0x8, 0x80000000, 0x8000000000000000, 0x7, 0x2, 0x80000000}, &(0x7f0000000100)) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="54010079c87bcc170a04b34df6ca92302a43708f8b54122618075937f8f79f3b3664fe54bdc1b75b3b9ceaeb3045524d26f4f652d0498e56d5c6b6e66e46f3a7b5cc7383b01778cfbdaad993e37bce0249494b", @ANYRES16=0x0, @ANYBLOB="207b8df515a20b4b1f2bbd7000fbdbdf25010000001400010000000000000000000000000000000000050006000100000014000100fe8800000000000000000000000000010500050005000000050006"], 0x54}, 0x1, 0x0, 0x0, 0x20000001}, 0x8000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000180)={0x0, &(0x7f00000003c0)}) connect$netlink(0xffffffffffffffff, &(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x2000}, 0xc) select(0x40, &(0x7f0000000040)={0x9, 0x1, 0x3, 0x1f, 0x2, 0x4, 0x89a4, 0x20}, &(0x7f0000000080)={0x400, 0x904, 0x5, 0x9, 0x9f, 0xc7, 0xfffffffffffffffc, 0xe2}, &(0x7f00000000c0)={0x8000000000000000, 0x7, 0x8, 0x80000000, 0x8000000000000000, 0x7, 0x2, 0x80000000}, &(0x7f0000000100)) (async) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="54010079c87bcc170a04b34df6ca92302a43708f8b54122618075937f8f79f3b3664fe54bdc1b75b3b9ceaeb3045524d26f4f652d0498e56d5c6b6e66e46f3a7b5cc7383b01778cfbdaad993e37bce0249494b", @ANYRES16=0x0, @ANYBLOB="207b8df515a20b4b1f2bbd7000fbdbdf25010000001400010000000000000000000000000000000000050006000100000014000100fe8800000000000000000000000000010500050005000000050006"], 0x54}, 0x1, 0x0, 0x0, 0x20000001}, 0x8000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) (async) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000180)={0x0, &(0x7f00000003c0)}) (async) connect$netlink(0xffffffffffffffff, &(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x2000}, 0xc) (async) 08:26:26 executing program 2: select(0x40, &(0x7f0000000040)={0x9, 0x1, 0x3, 0x1f, 0x2, 0x4, 0x89a4, 0x20}, &(0x7f0000000080)={0x400, 0x904, 0x5, 0x9, 0x9f, 0xc7, 0xfffffffffffffffc, 0xe2}, &(0x7f00000000c0)={0x8000000000000000, 0x7, 0x8, 0x80000000, 0x8000000000000000, 0x7, 0x2, 0x80000000}, &(0x7f0000000100)) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="54010079c87bcc170a04b34df6ca92302a43708f8b54122618075937f8f79f3b3664fe54bdc1b75b3b9ceaeb3045524d26f4f652d0498e56d5c6b6e66e46f3a7b5cc7383b01778cfbdaad993e37bce0249494b", @ANYRES16=0x0, @ANYBLOB="207b8df515a20b4b1f2bbd7000fbdbdf25010000001400010000000000000000000000000000000000050006000100000014000100fe8800000000000000000000000000010500050005000000050006"], 0x54}, 0x1, 0x0, 0x0, 0x20000001}, 0x8000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan1\x00'}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000180)={0x0, &(0x7f00000003c0)}) connect$netlink(0xffffffffffffffff, &(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x2000}, 0xc) 08:26:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) [ 957.496810] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 957.504226] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 957.511492] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 957.537475] FAULT_INJECTION: forcing a failure. [ 957.537475] name failslab, interval 1, probability 0, space 0, times 0 [ 957.586429] CPU: 0 PID: 21344 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 957.594340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.603689] Call Trace: [ 957.606275] dump_stack+0x1b2/0x281 [ 957.609907] should_fail.cold+0x10a/0x149 [ 957.614059] should_failslab+0xd6/0x130 [ 957.618029] __kmalloc+0x2c1/0x400 [ 957.621562] ? ext4_find_extent+0x879/0xbc0 [ 957.625878] ext4_find_extent+0x879/0xbc0 [ 957.630025] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 957.635474] ext4_ext_map_blocks+0x19a/0x6b10 [ 957.640059] ? __lock_acquire+0x5fc/0x3f20 [ 957.642083] XFS (loop0): unknown mount option [logbsize=]. [ 957.644290] ? __lock_acquire+0x5fc/0x3f20 [ 957.654120] ? mark_buffer_dirty+0x95/0x480 [ 957.658538] ? trace_hardirqs_on+0x10/0x10 [ 957.662772] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 957.668123] ? ext4_find_delalloc_cluster+0x180/0x180 [ 957.673291] ? trace_hardirqs_on+0x10/0x10 [ 957.677511] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 957.682331] ? ext4_es_lookup_extent+0x321/0xac0 [ 957.687063] ? lock_acquire+0x170/0x3f0 [ 957.691046] ? lock_acquire+0x170/0x3f0 [ 957.695011] ? ext4_map_blocks+0x29f/0x1730 [ 957.699319] ext4_map_blocks+0xb19/0x1730 [ 957.703455] ? ext4_issue_zeroout+0x150/0x150 [ 957.707930] ? __ext4_new_inode+0x27c/0x4eb0 [ 957.712332] ext4_getblk+0x98/0x3f0 [ 957.715945] ? ext4_iomap_begin+0x7f0/0x7f0 [ 957.720346] ext4_bread+0x6c/0x1a0 [ 957.723866] ? ext4_getblk+0x3f0/0x3f0 [ 957.727729] ? dquot_initialize_needed+0x240/0x240 [ 957.732648] ext4_append+0x143/0x350 [ 957.736474] ext4_mkdir+0x4c9/0xbd0 [ 957.740090] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 957.744745] ? security_inode_mkdir+0xca/0x100 [ 957.749303] vfs_mkdir+0x463/0x6e0 [ 957.752836] SyS_mkdirat+0x1fd/0x270 [ 957.756537] ? SyS_mknod+0x30/0x30 [ 957.760059] ? fput_many+0xe/0x140 [ 957.763583] ? do_syscall_64+0x4c/0x640 [ 957.767533] ? SyS_mknod+0x30/0x30 [ 957.771059] do_syscall_64+0x1d5/0x640 [ 957.774937] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 957.780111] RIP: 0033:0x7f551d0451f7 [ 957.783805] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 957.791492] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 957.798746] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 957.805990] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 957.813234] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 957.820493] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 957.830729] XFS (loop4): unknown mount option [logbsize=]. 08:26:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 42) 08:26:27 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698000000002a5dff99132d8024714d7634ff59940b7d68ebbb5f1cf3ea666623fb66c322567077ccaf7fb07b31d4387b99def7fe56b616100fd2717d624d4cd891bd4d30a45e284fa762d2e88037291df7d65a56c44be561d3b6e251507f7eebc47e7b8ed1fc8634b27fe38077"], 0x10) 08:26:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x10) (async) memfd_create(&(0x7f0000000180)='\\@]\x00\xeb\xffp\x05_\xe0\x8c\xdc}f\xd8\xb3\xc4\xec\x94\x02\x00\x00\x00\x00\x00\x00\x00\xe8\x7fU\xa6$x8\xd2\x8d\xbd\xf4\x1e\x88i\t+\xb8\xa3\x80\xad\r\x82\x93\xe9\xb6|GW\xa1-A\xf1\xac\xe6P\xb2W\xb63Tt\x13\xca\xb6\xbf\x00\xe2\xf5\xf5\x10Q,h\xe6\x9c\x11\xa0T\xbf\xd4\xa9Ww\x02\xe9]^\xff\x91f\x17\xc4^B\xa1\x1d\xbc\xa5\xaa\xaa\x0f\x86\xba', 0x0) 08:26:27 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1000}, 0x890) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r3, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xaf}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x2, 0x8001, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xdc}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$IOCTL_GET_NUM_DEVICES(r4, 0x40046104, &(0x7f00000002c0)) 08:26:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (async) 08:26:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 42) 08:26:27 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x10) memfd_create(&(0x7f0000000180)='\\@]\x00\xeb\xffp\x05_\xe0\x8c\xdc}f\xd8\xb3\xc4\xec\x94\x02\x00\x00\x00\x00\x00\x00\x00\xe8\x7fU\xa6$x8\xd2\x8d\xbd\xf4\x1e\x88i\t+\xb8\xa3\x80\xad\r\x82\x93\xe9\xb6|GW\xa1-A\xf1\xac\xe6P\xb2W\xb63Tt\x13\xca\xb6\xbf\x00\xe2\xf5\xf5\x10Q,h\xe6\x9c\x11\xa0T\xbf\xd4\xa9Ww\x02\xe9]^\xff\x91f\x17\xc4^B\xa1\x1d\xbc\xa5\xaa\xaa\x0f\x86\xba', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r1, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x10) (async) memfd_create(&(0x7f0000000180)='\\@]\x00\xeb\xffp\x05_\xe0\x8c\xdc}f\xd8\xb3\xc4\xec\x94\x02\x00\x00\x00\x00\x00\x00\x00\xe8\x7fU\xa6$x8\xd2\x8d\xbd\xf4\x1e\x88i\t+\xb8\xa3\x80\xad\r\x82\x93\xe9\xb6|GW\xa1-A\xf1\xac\xe6P\xb2W\xb63Tt\x13\xca\xb6\xbf\x00\xe2\xf5\xf5\x10Q,h\xe6\x9c\x11\xa0T\xbf\xd4\xa9Ww\x02\xe9]^\xff\x91f\x17\xc4^B\xa1\x1d\xbc\xa5\xaa\xaa\x0f\x86\xba', 0x0) (async) 08:26:27 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446698000000002a5dff99132d8024714d7634ff59940b7d68ebbb5f1cf3ea666623fb66c322567077ccaf7fb07b31d4387b99def7fe56b616100fd2717d624d4cd891bd4d30a45e284fa762d2e88037291df7d65a56c44be561d3b6e251507f7eebc47e7b8ed1fc8634b27fe38077"], 0x10) 08:26:27 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1000}, 0x890) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r3, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xaf}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x2, 0x8001, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xdc}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$IOCTL_GET_NUM_DEVICES(r4, 0x40046104, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1000}, 0x890) (async) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r3, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xaf}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x2, 0x8001, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xdc}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$IOCTL_GET_NUM_DEVICES(r4, 0x40046104, &(0x7f00000002c0)) (async) 08:26:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) [ 957.935011] FAULT_INJECTION: forcing a failure. [ 957.935011] name failslab, interval 1, probability 0, space 0, times 0 [ 957.951815] CPU: 1 PID: 21413 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 957.959711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.969062] Call Trace: [ 957.971654] dump_stack+0x1b2/0x281 [ 957.975286] should_fail.cold+0x10a/0x149 [ 957.979440] should_failslab+0xd6/0x130 08:26:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@broadcast]}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 957.983418] kmem_cache_alloc+0x28e/0x3c0 [ 957.987569] ext4_mb_new_blocks+0x514/0x3db0 [ 957.991986] ? ext4_find_extent+0x6f7/0xbc0 [ 957.996304] ? ext4_ext_search_right+0x2bc/0xaa0 [ 958.001055] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 958.006076] ext4_ext_map_blocks+0x2845/0x6b10 [ 958.010668] ? __lock_acquire+0x5fc/0x3f20 [ 958.014903] ? mark_buffer_dirty+0x95/0x480 [ 958.019228] ? trace_hardirqs_on+0x10/0x10 [ 958.023461] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 958.028822] ? ext4_find_delalloc_cluster+0x180/0x180 08:26:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@broadcast]}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 958.034016] ? trace_hardirqs_on+0x10/0x10 [ 958.038250] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 958.043092] ? ext4_es_lookup_extent+0x321/0xac0 [ 958.047848] ? lock_acquire+0x170/0x3f0 [ 958.051836] ext4_map_blocks+0x675/0x1730 [ 958.055984] ? ext4_issue_zeroout+0x150/0x150 [ 958.060481] ? __ext4_new_inode+0x27c/0x4eb0 [ 958.064895] ext4_getblk+0x98/0x3f0 [ 958.068524] ? ext4_iomap_begin+0x7f0/0x7f0 [ 958.072853] ext4_bread+0x6c/0x1a0 [ 958.076387] ? ext4_getblk+0x3f0/0x3f0 [ 958.080268] ? dquot_initialize_needed+0x240/0x240 [ 958.085196] ext4_append+0x143/0x350 [ 958.088916] ext4_mkdir+0x4c9/0xbd0 [ 958.092542] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 958.097214] ? security_inode_mkdir+0xca/0x100 [ 958.101798] vfs_mkdir+0x463/0x6e0 [ 958.105339] SyS_mkdirat+0x1fd/0x270 [ 958.109049] ? SyS_mknod+0x30/0x30 [ 958.112586] ? fput_many+0xe/0x140 [ 958.116120] ? do_syscall_64+0x4c/0x640 [ 958.120090] ? SyS_mknod+0x30/0x30 [ 958.123638] do_syscall_64+0x1d5/0x640 [ 958.127533] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 958.132717] RIP: 0033:0x7f551d0451f7 [ 958.136450] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 958.144156] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 958.151419] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 958.158689] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 958.165959] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 958.173227] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 958.184718] FAULT_INJECTION: forcing a failure. [ 958.184718] name failslab, interval 1, probability 0, space 0, times 0 [ 958.196207] CPU: 0 PID: 21417 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 958.204086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.213438] Call Trace: [ 958.216029] dump_stack+0x1b2/0x281 [ 958.219662] should_fail.cold+0x10a/0x149 [ 958.223812] should_failslab+0xd6/0x130 [ 958.227788] kmem_cache_alloc+0x40/0x3c0 [ 958.231851] __es_insert_extent+0x338/0x1360 [ 958.236255] ? __es_shrink+0x8c0/0x8c0 [ 958.240140] ? lock_acquire+0x170/0x3f0 [ 958.244111] ? ext4_es_insert_extent+0x11f/0x530 [ 958.248876] ext4_es_insert_extent+0x1b9/0x530 [ 958.253466] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 958.259262] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 958.264727] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 958.270535] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 958.275122] ? __lock_acquire+0x5fc/0x3f20 [ 958.279363] ? __lock_acquire+0x5fc/0x3f20 [ 958.283601] ? mark_buffer_dirty+0x95/0x480 [ 958.287920] ? trace_hardirqs_on+0x10/0x10 [ 958.292154] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 958.297514] ? ext4_find_delalloc_cluster+0x180/0x180 [ 958.302704] ? trace_hardirqs_on+0x10/0x10 [ 958.306937] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 958.311781] ? ext4_es_lookup_extent+0x321/0xac0 [ 958.316539] ? lock_acquire+0x170/0x3f0 [ 958.320514] ? lock_acquire+0x170/0x3f0 [ 958.324477] ? ext4_map_blocks+0x29f/0x1730 [ 958.328792] ext4_map_blocks+0xb19/0x1730 [ 958.333030] ? ext4_issue_zeroout+0x150/0x150 [ 958.337509] ? __ext4_new_inode+0x27c/0x4eb0 [ 958.342010] ext4_getblk+0x98/0x3f0 [ 958.345613] ? ext4_iomap_begin+0x7f0/0x7f0 [ 958.349927] ext4_bread+0x6c/0x1a0 [ 958.353455] ? ext4_getblk+0x3f0/0x3f0 [ 958.357320] ? dquot_initialize_needed+0x240/0x240 [ 958.362238] ext4_append+0x143/0x350 [ 958.365948] ext4_mkdir+0x4c9/0xbd0 [ 958.369557] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 958.374209] ? security_inode_mkdir+0xca/0x100 [ 958.378775] vfs_mkdir+0x463/0x6e0 [ 958.382296] SyS_mkdirat+0x1fd/0x270 [ 958.385995] ? SyS_mknod+0x30/0x30 [ 958.389511] ? fput_many+0xe/0x140 [ 958.393030] ? do_syscall_64+0x4c/0x640 [ 958.396988] ? SyS_mknod+0x30/0x30 [ 958.400505] do_syscall_64+0x1d5/0x640 [ 958.404388] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 958.409563] RIP: 0033:0x7f10053891f7 [ 958.413252] RSP: 002b:00007f1003cfef88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 958.420989] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f10053891f7 [ 958.428250] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c 08:26:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 43) 08:26:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@broadcast]}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:27 executing program 3: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:27 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x7) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:27 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1000}, 0x890) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r3, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0xaf}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x6, 0x2, 0x8001, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xdc}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$IOCTL_GET_NUM_DEVICES(r4, 0x40046104, &(0x7f00000002c0)) 08:26:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 43) [ 958.435497] RBP: 00007f1003cff1d0 R08: 0000000000000000 R09: 00007f1003cff1d0 [ 958.442743] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 958.450004] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 958.460360] XFS (loop0): unknown mount option [logbsize=]. 08:26:27 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x7) (async) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:27 executing program 3: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:27 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x47b22701b8bcb622, 0x4) write$nbd(0xffffffffffffffff, 0x0, 0xf) 08:26:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) [ 958.556602] FAULT_INJECTION: forcing a failure. [ 958.556602] name failslab, interval 1, probability 0, space 0, times 0 [ 958.573265] FAULT_INJECTION: forcing a failure. [ 958.573265] name failslab, interval 1, probability 0, space 0, times 0 [ 958.603681] CPU: 0 PID: 21479 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 958.611572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.620923] Call Trace: [ 958.623598] dump_stack+0x1b2/0x281 [ 958.627225] should_fail.cold+0x10a/0x149 [ 958.631363] should_failslab+0xd6/0x130 [ 958.635332] __kmalloc+0x2c1/0x400 [ 958.638871] ? ext4_find_extent+0x879/0xbc0 [ 958.643188] ext4_find_extent+0x879/0xbc0 [ 958.647337] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 958.652790] ext4_ext_map_blocks+0x19a/0x6b10 [ 958.657296] ? __lock_acquire+0x5fc/0x3f20 [ 958.661535] ? mark_buffer_dirty+0x95/0x480 [ 958.665863] ? trace_hardirqs_on+0x10/0x10 [ 958.670098] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 958.675461] ? ext4_find_delalloc_cluster+0x180/0x180 [ 958.680649] ? trace_hardirqs_on+0x10/0x10 [ 958.684982] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 958.689829] ? ext4_es_lookup_extent+0x321/0xac0 [ 958.694587] ? lock_acquire+0x170/0x3f0 [ 958.698560] ? lock_acquire+0x170/0x3f0 [ 958.702530] ? ext4_map_blocks+0x623/0x1730 [ 958.706859] ext4_map_blocks+0x675/0x1730 [ 958.711009] ? ext4_issue_zeroout+0x150/0x150 [ 958.715497] ? __ext4_new_inode+0x27c/0x4eb0 [ 958.719908] ext4_getblk+0x98/0x3f0 [ 958.723527] ? ext4_iomap_begin+0x7f0/0x7f0 [ 958.727845] ext4_bread+0x6c/0x1a0 [ 958.731378] ? ext4_getblk+0x3f0/0x3f0 [ 958.735250] ? dquot_initialize_needed+0x240/0x240 [ 958.740172] ext4_append+0x143/0x350 [ 958.743883] ext4_mkdir+0x4c9/0xbd0 [ 958.747511] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 958.752177] ? security_inode_mkdir+0xca/0x100 [ 958.756754] vfs_mkdir+0x463/0x6e0 [ 958.760303] SyS_mkdirat+0x1fd/0x270 [ 958.764011] ? SyS_mknod+0x30/0x30 [ 958.767546] ? fput_many+0xe/0x140 [ 958.771086] ? do_syscall_64+0x4c/0x640 [ 958.775051] ? SyS_mknod+0x30/0x30 [ 958.779107] do_syscall_64+0x1d5/0x640 [ 958.782996] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 958.788180] RIP: 0033:0x7f551d0451f7 [ 958.791885] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 958.799629] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 08:26:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x7) (async) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:28 executing program 3: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) [ 958.806893] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 958.814146] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 958.821407] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 [ 958.828666] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 958.835939] CPU: 1 PID: 21484 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 958.843822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.853172] Call Trace: [ 958.855758] dump_stack+0x1b2/0x281 [ 958.859398] should_fail.cold+0x10a/0x149 [ 958.863547] should_failslab+0xd6/0x130 [ 958.867520] __kmalloc_track_caller+0x2bc/0x400 [ 958.872187] ? strndup_user+0x5b/0xf0 [ 958.875989] memdup_user+0x22/0xa0 [ 958.879528] strndup_user+0x5b/0xf0 [ 958.883152] ? copy_mnt_ns+0xa30/0xa30 [ 958.887041] SyS_mount+0x39/0x120 [ 958.890489] ? copy_mnt_ns+0xa30/0xa30 [ 958.894377] do_syscall_64+0x1d5/0x640 [ 958.898265] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 958.903446] RIP: 0033:0x7f100538b61a [ 958.907150] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 958.914856] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 958.922121] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 958.929387] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 958.936656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 958.943930] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 44) 08:26:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) 08:26:28 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0xfffffffd, 0x0, 0x1, 0x0, "ca1c8314d289e1077a107edd09f8d94626f5809bfa24760f3279fb53976d33a9c2b487089b4056136d5dec739144393343b0da6ab136"}, 0x46) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 08:26:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000040)=0x13b) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000080)) 08:26:28 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async, rerun: 32) r0 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x47b22701b8bcb622, 0x4) (async) write$nbd(0xffffffffffffffff, 0x0, 0xf) 08:26:28 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 44) 08:26:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000040)=0x13b) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000080)) 08:26:28 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0xfffffffd, 0x0, 0x1, 0x0, "ca1c8314d289e1077a107edd09f8d94626f5809bfa24760f3279fb53976d33a9c2b487089b4056136d5dec739144393343b0da6ab136"}, 0x46) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 08:26:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) [ 959.062111] FAULT_INJECTION: forcing a failure. [ 959.062111] name failslab, interval 1, probability 0, space 0, times 0 [ 959.064276] FAULT_INJECTION: forcing a failure. [ 959.064276] name failslab, interval 1, probability 0, space 0, times 0 [ 959.086657] CPU: 0 PID: 21535 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 959.094557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.103920] Call Trace: [ 959.106508] dump_stack+0x1b2/0x281 [ 959.110142] should_fail.cold+0x10a/0x149 [ 959.114286] should_failslab+0xd6/0x130 [ 959.118264] kmem_cache_alloc+0x28e/0x3c0 [ 959.122410] ext4_mb_new_blocks+0x514/0x3db0 [ 959.126824] ? ext4_find_extent+0x6f7/0xbc0 [ 959.131142] ? ext4_ext_search_right+0x2bc/0xaa0 [ 959.135899] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 959.140916] ext4_ext_map_blocks+0x2845/0x6b10 [ 959.145502] ? __lock_acquire+0x5fc/0x3f20 [ 959.149748] ? mark_buffer_dirty+0x95/0x480 [ 959.154065] ? trace_hardirqs_on+0x10/0x10 [ 959.158299] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 959.163742] ? ext4_find_delalloc_cluster+0x180/0x180 [ 959.168933] ? trace_hardirqs_on+0x10/0x10 [ 959.173171] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 959.178017] ? ext4_es_lookup_extent+0x321/0xac0 [ 959.182776] ? lock_acquire+0x170/0x3f0 [ 959.186760] ext4_map_blocks+0x675/0x1730 [ 959.190915] ? ext4_issue_zeroout+0x150/0x150 [ 959.195404] ? __ext4_new_inode+0x27c/0x4eb0 [ 959.199816] ext4_getblk+0x98/0x3f0 [ 959.203439] ? ext4_iomap_begin+0x7f0/0x7f0 [ 959.207756] ext4_bread+0x6c/0x1a0 [ 959.211287] ? ext4_getblk+0x3f0/0x3f0 [ 959.215166] ? dquot_initialize_needed+0x240/0x240 [ 959.220084] ext4_append+0x143/0x350 [ 959.223797] ext4_mkdir+0x4c9/0xbd0 [ 959.227424] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 959.232092] ? security_inode_mkdir+0xca/0x100 [ 959.236671] vfs_mkdir+0x463/0x6e0 [ 959.240304] SyS_mkdirat+0x1fd/0x270 [ 959.244020] ? SyS_mknod+0x30/0x30 [ 959.247555] ? fput_many+0xe/0x140 [ 959.251089] ? do_syscall_64+0x4c/0x640 [ 959.255047] ? SyS_mknod+0x30/0x30 [ 959.258576] do_syscall_64+0x1d5/0x640 [ 959.262456] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 959.267634] RIP: 0033:0x7f551d0451f7 [ 959.271326] RSP: 002b:00007f551b9baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 959.279021] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d0451f7 [ 959.286269] RDX: 00000000000001ff RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 959.293529] RBP: 00007f551b9bb1d0 R08: 0000000000000000 R09: 00007f551b9bb1d0 [ 959.300787] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000140 08:26:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000100)={@any, 0x2, 0x8, 0x3f, 0x7, 0x400, "c318a789e245fa743939fade9b261d8a678a6c135bbf272afa2c1f9f6689ce251813e6ec7ceb2a61ec5bbf9d397b006231db57b75f1ace403cc374732e78cc7f695c674a6dd7c512601e8df072b569e8ca34dcc9d7a70b97b2b4624f78e3d2aa097cc15a76b66a9ff03b9bd6527db9901f829754da06fc3db4e65b7e65e560e7"}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) 08:26:28 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)={0x67446698, 0xfffffffd, 0x0, 0x1, 0x0, "ca1c8314d289e1077a107edd09f8d94626f5809bfa24760f3279fb53976d33a9c2b487089b4056136d5dec739144393343b0da6ab136"}, 0x46) (async) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 08:26:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000100), 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000040)=0x13b) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_GETTIME(r3, 0x80045113, &(0x7f0000000080)) [ 959.308038] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 959.315330] CPU: 1 PID: 21534 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 959.323212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.332561] Call Trace: [ 959.335149] dump_stack+0x1b2/0x281 [ 959.338775] should_fail.cold+0x10a/0x149 [ 959.342921] should_failslab+0xd6/0x130 [ 959.346901] __kmalloc_track_caller+0x2bc/0x400 [ 959.351658] ? strndup_user+0x5b/0xf0 [ 959.355459] memdup_user+0x22/0xa0 [ 959.359011] strndup_user+0x5b/0xf0 [ 959.362637] ? copy_mnt_ns+0xa30/0xa30 [ 959.366527] SyS_mount+0x39/0x120 [ 959.369981] ? copy_mnt_ns+0xa30/0xa30 [ 959.373874] do_syscall_64+0x1d5/0x640 [ 959.377765] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 959.382945] RIP: 0033:0x7f100538b61a [ 959.386646] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 959.394363] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 959.401631] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 08:26:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 45) 08:26:28 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446640663eb59ba53131816ba2f724d4f634973fd76f"], 0x10) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000040)={"a1dcf1a32578ff5f6a81329f36b3bbb7fbd446e93a32c7adf18c5df8b2cb", 0x101, 0x4, 0xae, [0x73e411ab, 0xffffffff, 0x4b, 0x8, 0x1, 0x8, 0x1, 0x80, 0x20, 0x100, 0x1000, 0x3f, 0xd713, 0x4, 0x10000, 0x1, 0xbff, 0x13]}) 08:26:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000100)={@any, 0x2, 0x8, 0x3f, 0x7, 0x400, "c318a789e245fa743939fade9b261d8a678a6c135bbf272afa2c1f9f6689ce251813e6ec7ceb2a61ec5bbf9d397b006231db57b75f1ace403cc374732e78cc7f695c674a6dd7c512601e8df072b569e8ca34dcc9d7a70b97b2b4624f78e3d2aa097cc15a76b66a9ff03b9bd6527db9901f829754da06fc3db4e65b7e65e560e7"}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) 08:26:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000280)={0x90, 0x0, &(0x7f0000000140)=[@exit_looper, @release={0x40046306, 0x1}, @decrefs={0x40046307, 0x1}, @register_looper, @increfs={0x40046304, 0x2}, @increfs={0x40046304, 0x2}, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000002c0)=ANY=[@ANYBLOB="852a62730b2100000200000000000000000002000064e4000000000000000000000085616466000000000a00002d00000000000000fb5ffa5491cd76f5d5cdfb1aa177ee9fdbac9c0d50876feeeb66e6f8392e815b236f3d1aa92ac59ad13476630d5a7bc18ebdb46fe7bcf6bdafbc409648d82efd19be500f0ecda29d30cad9cf8d925f4072ba"], &(0x7f0000000000)={0x0, 0x18, 0x30}}, 0x40}, @increfs_done, @increfs={0x40046304, 0x2}], 0x5b, 0x0, &(0x7f0000000200)="b978df42cd3dafc9dc480b498bc4d939b4c806d2c1c481f7c48f95e621147c513d26b5cc483eda4337e453770c59f73dfb0bc2e37b57c099e8545027be48e468e0f12a55865c081bc60698c87093f1d719f5ebe38a1635aa63ed85"}) socket$netlink(0x10, 0x3, 0xf) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:28 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async, rerun: 64) r0 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r0) (async) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x47b22701b8bcb622, 0x4) (async) write$nbd(0xffffffffffffffff, 0x0, 0xf) [ 959.408899] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 959.416164] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 959.423427] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:28 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 45) 08:26:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000280)={0x90, 0x0, &(0x7f0000000140)=[@exit_looper, @release={0x40046306, 0x1}, @decrefs={0x40046307, 0x1}, @register_looper, @increfs={0x40046304, 0x2}, @increfs={0x40046304, 0x2}, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000002c0)=ANY=[@ANYBLOB="852a62730b2100000200000000000000000002000064e4000000000000000000000085616466000000000a00002d00000000000000fb5ffa5491cd76f5d5cdfb1aa177ee9fdbac9c0d50876feeeb66e6f8392e815b236f3d1aa92ac59ad13476630d5a7bc18ebdb46fe7bcf6bdafbc409648d82efd19be500f0ecda29d30cad9cf8d925f4072ba"], &(0x7f0000000000)={0x0, 0x18, 0x30}}, 0x40}, @increfs_done, @increfs={0x40046304, 0x2}], 0x5b, 0x0, &(0x7f0000000200)="b978df42cd3dafc9dc480b498bc4d939b4c806d2c1c481f7c48f95e621147c513d26b5cc483eda4337e453770c59f73dfb0bc2e37b57c099e8545027be48e468e0f12a55865c081bc60698c87093f1d719f5ebe38a1635aa63ed85"}) (async) socket$netlink(0x10, 0x3, 0xf) (async) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:28 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446640663eb59ba53131816ba2f724d4f634973fd76f"], 0x10) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000040)={"a1dcf1a32578ff5f6a81329f36b3bbb7fbd446e93a32c7adf18c5df8b2cb", 0x101, 0x4, 0xae, [0x73e411ab, 0xffffffff, 0x4b, 0x8, 0x1, 0x8, 0x1, 0x80, 0x20, 0x100, 0x1000, 0x3f, 0xd713, 0x4, 0x10000, 0x1, 0xbff, 0x13]}) 08:26:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000100)={@any, 0x2, 0x8, 0x3f, 0x7, 0x400, "c318a789e245fa743939fade9b261d8a678a6c135bbf272afa2c1f9f6689ce251813e6ec7ceb2a61ec5bbf9d397b006231db57b75f1ace403cc374732e78cc7f695c674a6dd7c512601e8df072b569e8ca34dcc9d7a70b97b2b4624f78e3d2aa097cc15a76b66a9ff03b9bd6527db9901f829754da06fc3db4e65b7e65e560e7"}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) [ 959.524445] FAULT_INJECTION: forcing a failure. [ 959.524445] name failslab, interval 1, probability 0, space 0, times 0 [ 959.554001] FAULT_INJECTION: forcing a failure. [ 959.554001] name failslab, interval 1, probability 0, space 0, times 0 [ 959.580066] CPU: 1 PID: 21587 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 959.587974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.597333] Call Trace: [ 959.599922] dump_stack+0x1b2/0x281 [ 959.603554] should_fail.cold+0x10a/0x149 [ 959.607713] should_failslab+0xd6/0x130 [ 959.611703] __kmalloc_track_caller+0x2bc/0x400 [ 959.616379] ? strndup_user+0x5b/0xf0 [ 959.620198] memdup_user+0x22/0xa0 [ 959.623742] strndup_user+0x5b/0xf0 08:26:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) setns(0xffffffffffffffff, 0x20000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="6c0000c4", @ANYRES16=0x0, @ANYBLOB="000429bd7000fbdbdf2508000000060002000100000005000600010000000c001600070000000000000006000e00ff0f000006001c0008000000050007000200000006001b004e210000080011000100000014000800776c616e3100"/102], 0x6c}, 0x1, 0x0, 0x0, 0x240008e0}, 0x44801) [ 959.627382] ? copy_mnt_ns+0xa30/0xa30 [ 959.631270] SyS_mount+0x39/0x120 [ 959.634895] ? copy_mnt_ns+0xa30/0xa30 [ 959.638784] do_syscall_64+0x1d5/0x640 [ 959.642682] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 959.647872] RIP: 0033:0x7f551d04761a [ 959.651662] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 959.659373] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 959.666644] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) setns(0xffffffffffffffff, 0x20000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="6c0000c4", @ANYRES16=0x0, @ANYBLOB="000429bd7000fbdbdf2508000000060002000100000005000600010000000c001600070000000000000006000e00ff0f000006001c0008000000050007000200000006001b004e210000080011000100000014000800776c616e3100"/102], 0x6c}, 0x1, 0x0, 0x0, 0x240008e0}, 0x44801) [ 959.673918] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 959.681534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 959.688807] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 959.705223] CPU: 1 PID: 21597 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 959.713119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.722472] Call Trace: [ 959.725070] dump_stack+0x1b2/0x281 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) setns(0xffffffffffffffff, 0x20000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="6c0000c4", @ANYRES16=0x0, @ANYBLOB="000429bd7000fbdbdf2508000000060002000100000005000600010000000c001600070000000000000006000e00ff0f000006001c0008000000050007000200000006001b004e210000080011000100000014000800776c616e3100"/102], 0x6c}, 0x1, 0x0, 0x0, 0x240008e0}, 0x44801) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) setns(0xffffffffffffffff, 0x20000) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@unspec, 0xc) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="6c0000c4", @ANYRES16=0x0, @ANYBLOB="000429bd7000fbdbdf2508000000060002000100000005000600010000000c001600070000000000000006000e00ff0f000006001c0008000000050007000200000006001b004e210000080011000100000014000800776c616e3100"/102], 0x6c}, 0x1, 0x0, 0x0, 0x240008e0}, 0x44801) (async) [ 959.728705] should_fail.cold+0x10a/0x149 [ 959.732854] should_failslab+0xd6/0x130 [ 959.736831] __kmalloc_track_caller+0x2bc/0x400 [ 959.741501] ? strndup_user+0x5b/0xf0 [ 959.745390] memdup_user+0x22/0xa0 [ 959.748930] strndup_user+0x5b/0xf0 [ 959.752569] ? copy_mnt_ns+0xa30/0xa30 [ 959.756506] SyS_mount+0x39/0x120 [ 959.759954] ? copy_mnt_ns+0xa30/0xa30 [ 959.763839] do_syscall_64+0x1d5/0x640 [ 959.767824] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 959.773011] RIP: 0033:0x7f100538b61a [ 959.776718] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 959.784424] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 959.791698] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 959.798969] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 959.806235] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 959.813505] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 46) 08:26:29 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="67446640663eb59ba53131816ba2f724d4f634973fd76f"], 0x10) (async) read$sequencer(0xffffffffffffffff, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000040)={"a1dcf1a32578ff5f6a81329f36b3bbb7fbd446e93a32c7adf18c5df8b2cb", 0x101, 0x4, 0xae, [0x73e411ab, 0xffffffff, 0x4b, 0x8, 0x1, 0x8, 0x1, 0x80, 0x20, 0x100, 0x1000, 0x3f, 0xd713, 0x4, 0x10000, 0x1, 0xbff, 0x13]}) 08:26:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="0000007ce20ae1065698c9000100de1ebc3a29da5ecdbe3ad71fdf5893d68184f0bc49d250723b38865caa234fd9041987adeeb63755fe0b98d2e910779a980b9196cef5dbc9c4e9038a57715da4e37adf043dc9a9188a9af84e89771790bb8d72fc7539"]) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x232100, 0x0) 08:26:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000280)={0x90, 0x0, &(0x7f0000000140)=[@exit_looper, @release={0x40046306, 0x1}, @decrefs={0x40046307, 0x1}, @register_looper, @increfs={0x40046304, 0x2}, @increfs={0x40046304, 0x2}, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000002c0)=ANY=[@ANYBLOB="852a62730b2100000200000000000000000002000064e4000000000000000000000085616466000000000a00002d00000000000000fb5ffa5491cd76f5d5cdfb1aa177ee9fdbac9c0d50876feeeb66e6f8392e815b236f3d1aa92ac59ad13476630d5a7bc18ebdb46fe7bcf6bdafbc409648d82efd19be500f0ecda29d30cad9cf8d925f4072ba"], &(0x7f0000000000)={0x0, 0x18, 0x30}}, 0x40}, @increfs_done, @increfs={0x40046304, 0x2}], 0x5b, 0x0, &(0x7f0000000200)="b978df42cd3dafc9dc480b498bc4d939b4c806d2c1c481f7c48f95e621147c513d26b5cc483eda4337e453770c59f73dfb0bc2e37b57c099e8545027be48e468e0f12a55865c081bc60698c87093f1d719f5ebe38a1635aa63ed85"}) (async) socket$netlink(0x10, 0x3, 0xf) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000100)={0x18, 0x0, &(0x7f0000000000)=[@decrefs={0x40046307, 0x1}, @request_death], 0x6e, 0x0, &(0x7f0000000040)="5ac883e0c260c8276dafa864194db8d71beb1e2b3209a420ac271a83cb7faf85948c20418e51abdfdb2433d7f6dfad19603ff7aa8ac3583f2070c8865c2bbb1b4e7d3d39719dc3ae24ad2eb88f3014f413d882552c8da170f855597464bdc46c056ba9c064af404405aef99b2b60"}) 08:26:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 46) 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000100)={0x18, 0x0, &(0x7f0000000000)=[@decrefs={0x40046307, 0x1}, @request_death], 0x6e, 0x0, &(0x7f0000000040)="5ac883e0c260c8276dafa864194db8d71beb1e2b3209a420ac271a83cb7faf85948c20418e51abdfdb2433d7f6dfad19603ff7aa8ac3583f2070c8865c2bbb1b4e7d3d39719dc3ae24ad2eb88f3014f413d882552c8da170f855597464bdc46c056ba9c064af404405aef99b2b60"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000100)={0x18, 0x0, &(0x7f0000000000)=[@decrefs={0x40046307, 0x1}, @request_death], 0x6e, 0x0, &(0x7f0000000040)="5ac883e0c260c8276dafa864194db8d71beb1e2b3209a420ac271a83cb7faf85948c20418e51abdfdb2433d7f6dfad19603ff7aa8ac3583f2070c8865c2bbb1b4e7d3d39719dc3ae24ad2eb88f3014f413d882552c8da170f855597464bdc46c056ba9c064af404405aef99b2b60"}) (async) 08:26:29 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000000)={0x67446698, 0x0, 0x1, 0x0, 0x0, "b6a7321c4e5abe14d325946993ce1e74b71a77fb10a450"}, 0x27) [ 959.926811] FAULT_INJECTION: forcing a failure. [ 959.926811] name failslab, interval 1, probability 0, space 0, times 0 [ 959.944579] FAULT_INJECTION: forcing a failure. [ 959.944579] name failslab, interval 1, probability 0, space 0, times 0 [ 959.951420] CPU: 1 PID: 21651 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 959.963655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.973007] Call Trace: [ 959.975596] dump_stack+0x1b2/0x281 [ 959.979231] should_fail.cold+0x10a/0x149 [ 959.983384] should_failslab+0xd6/0x130 [ 959.987365] __kmalloc_track_caller+0x2bc/0x400 [ 959.992036] ? strndup_user+0x5b/0xf0 [ 959.995841] memdup_user+0x22/0xa0 [ 959.999375] strndup_user+0x5b/0xf0 [ 960.002990] ? copy_mnt_ns+0xa30/0xa30 [ 960.006874] SyS_mount+0x68/0x120 [ 960.010374] ? copy_mnt_ns+0xa30/0xa30 [ 960.014257] do_syscall_64+0x1d5/0x640 [ 960.018150] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 960.023331] RIP: 0033:0x7f551d04761a [ 960.027029] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 960.034739] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 960.042008] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 960.049280] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 960.056553] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 960.063814] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000100)={0x18, 0x0, &(0x7f0000000000)=[@decrefs={0x40046307, 0x1}, @request_death], 0x6e, 0x0, &(0x7f0000000040)="5ac883e0c260c8276dafa864194db8d71beb1e2b3209a420ac271a83cb7faf85948c20418e51abdfdb2433d7f6dfad19603ff7aa8ac3583f2070c8865c2bbb1b4e7d3d39719dc3ae24ad2eb88f3014f413d882552c8da170f855597464bdc46c056ba9c064af404405aef99b2b60"}) [ 960.071091] CPU: 0 PID: 21661 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 960.078973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.088323] Call Trace: [ 960.090916] dump_stack+0x1b2/0x281 [ 960.094549] should_fail.cold+0x10a/0x149 [ 960.098702] should_failslab+0xd6/0x130 [ 960.102681] kmem_cache_alloc+0x28e/0x3c0 [ 960.106823] getname_flags+0xc8/0x550 [ 960.110625] ? __do_page_fault+0x159/0xad0 [ 960.114870] user_path_at_empty+0x2a/0x50 [ 960.119021] do_mount+0x118/0x2a10 [ 960.122565] ? __do_page_fault+0x159/0xad0 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) [ 960.126824] ? retint_kernel+0x2d/0x2d [ 960.130715] ? copy_mount_string+0x40/0x40 [ 960.134953] ? memset+0x20/0x40 [ 960.138231] ? copy_mount_options+0x1fa/0x2f0 [ 960.142729] ? copy_mnt_ns+0xa30/0xa30 [ 960.146617] SyS_mount+0xa8/0x120 [ 960.150072] ? copy_mnt_ns+0xa30/0xa30 [ 960.153962] do_syscall_64+0x1d5/0x640 [ 960.157861] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 960.163043] RIP: 0033:0x7f100538b61a [ 960.166746] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) 08:26:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4068, 0xfffffff6) ioctl$SNDCTL_MIDI_INFO(r1, 0xc074510c, &(0x7f0000000180)={"5b0841d3ac09d9b927759a39c51c839395eda9cde36bf65852564bfc02e4", 0x4800000, 0x8, 0x101, [0x7, 0x2, 0x2, 0x8, 0x9, 0x80, 0x32fe1bfe, 0xfbee, 0x4, 0x3, 0x8, 0x9, 0x7, 0x5, 0x1f, 0x2, 0xa, 0x3]}) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xffffffffffffff4a, &(0x7f0000000100)={&(0x7f0000000280)={0x20, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x0, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_team\x00'}, @SMC_PNETID_NAME={0x0, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x0, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_bridge\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000804) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$nbd(r0, &(0x7f0000000040)=ANY=[], 0x49) 08:26:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 47) 08:26:29 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000000)={0x67446698, 0x0, 0x1, 0x0, 0x0, "b6a7321c4e5abe14d325946993ce1e74b71a77fb10a450"}, 0x27) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(0xffffffffffffffff, &(0x7f0000000000)={0x67446698, 0x0, 0x1, 0x0, 0x0, "b6a7321c4e5abe14d325946993ce1e74b71a77fb10a450"}, 0x27) (async) 08:26:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="0000007ce20ae1065698c9000100de1ebc3a29da5ecdbe3ad71fdf5893d68184f0bc49d250723b38865caa234fd9041987adeeb63755fe0b98d2e910779a980b9196cef5dbc9c4e9038a57715da4e37adf043dc9a9188a9af84e89771790bb8d72fc7539"]) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x232100, 0x0) [ 960.174460] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 960.181731] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 960.188999] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 960.196282] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 960.203641] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4068, 0xfffffff6) ioctl$SNDCTL_MIDI_INFO(r1, 0xc074510c, &(0x7f0000000180)={"5b0841d3ac09d9b927759a39c51c839395eda9cde36bf65852564bfc02e4", 0x4800000, 0x8, 0x101, [0x7, 0x2, 0x2, 0x8, 0x9, 0x80, 0x32fe1bfe, 0xfbee, 0x4, 0x3, 0x8, 0x9, 0x7, 0x5, 0x1f, 0x2, 0xa, 0x3]}) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xffffffffffffff4a, &(0x7f0000000100)={&(0x7f0000000280)={0x20, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x0, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_team\x00'}, @SMC_PNETID_NAME={0x0, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x0, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_bridge\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000804) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$nbd(r0, &(0x7f0000000040)=ANY=[], 0x49) 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) [ 960.307282] FAULT_INJECTION: forcing a failure. [ 960.307282] name failslab, interval 1, probability 0, space 0, times 0 [ 960.328734] CPU: 0 PID: 21699 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 960.336642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.345994] Call Trace: [ 960.348588] dump_stack+0x1b2/0x281 [ 960.352234] should_fail.cold+0x10a/0x149 [ 960.356387] should_failslab+0xd6/0x130 [ 960.360363] kmem_cache_alloc+0x28e/0x3c0 [ 960.364529] getname_flags+0xc8/0x550 [ 960.368326] ? __do_page_fault+0x159/0xad0 [ 960.372564] user_path_at_empty+0x2a/0x50 [ 960.376713] do_mount+0x118/0x2a10 [ 960.380260] ? __do_page_fault+0x159/0xad0 [ 960.384522] ? retint_kernel+0x2d/0x2d [ 960.388411] ? copy_mount_string+0x40/0x40 [ 960.392646] ? memset+0x20/0x40 [ 960.395922] ? copy_mount_options+0x1fa/0x2f0 [ 960.400414] ? copy_mnt_ns+0xa30/0xa30 [ 960.404299] SyS_mount+0xa8/0x120 [ 960.407732] ? copy_mnt_ns+0xa30/0xa30 [ 960.411606] do_syscall_64+0x1d5/0x640 [ 960.415472] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 960.420640] RIP: 0033:0x7f551d04761a [ 960.424330] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 960.432013] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 960.439259] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 960.446505] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 08:26:29 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 47) 08:26:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="0000007ce20ae1065698c9000100de1ebc3a29da5ecdbe3ad71fdf5893d68184f0bc49d250723b38865caa234fd9041987adeeb63755fe0b98d2e910779a980b9196cef5dbc9c4e9038a57715da4e37adf043dc9a9188a9af84e89771790bb8d72fc7539"]) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x232100, 0x0) 08:26:29 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000000)={0x67446698, 0x0, 0x1, 0x0, 0x0, "b6a7321c4e5abe14d325946993ce1e74b71a77fb10a450"}, 0x27) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(0xffffffffffffffff, &(0x7f0000000000)={0x67446698, 0x0, 0x1, 0x0, 0x0, "b6a7321c4e5abe14d325946993ce1e74b71a77fb10a450"}, 0x27) (async) 08:26:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4068, 0xfffffff6) ioctl$SNDCTL_MIDI_INFO(r1, 0xc074510c, &(0x7f0000000180)={"5b0841d3ac09d9b927759a39c51c839395eda9cde36bf65852564bfc02e4", 0x4800000, 0x8, 0x101, [0x7, 0x2, 0x2, 0x8, 0x9, 0x80, 0x32fe1bfe, 0xfbee, 0x4, 0x3, 0x8, 0x9, 0x7, 0x5, 0x1f, 0x2, 0xa, 0x3]}) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xffffffffffffff4a, &(0x7f0000000100)={&(0x7f0000000280)={0x20, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x0, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_hsr\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_team\x00'}, @SMC_PNETID_NAME={0x0, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x0, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x0, 0x2, 'veth0_to_bridge\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000804) (async) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) write$nbd(r0, &(0x7f0000000040)=ANY=[], 0x49) (rerun: 64) 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x4) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x202401) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x9, 0x5, 0xc, 0x18, 0x1, 0x4, 0x0, 0xbc, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 960.453763] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 960.461020] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 48) 08:26:29 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000040)={0x67446698, 0x1, 0x1, 0x0, 0x1, "74bfbcc467b09d4d9f87979e8881d388a6a27fb117e62565bbd256c8092974d3ec682ce1fdd5"}, 0x36) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe}, 0x10) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f0000000080)=0x7a) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000480)={r1}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_NRMIDIS(r4, 0x8004510b, &(0x7f0000000640)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20001090}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x60, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xd}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x2004c800}, 0x8084084) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x5}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x89}, @jmp={0x5, 0x1, 0x4, 0x0, 0x4, 0x80, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x8}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x9f, &(0x7f0000000240)=""/159, 0x40f00, 0x8, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f0000000300)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x8, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r1, r1, r1, r1, r1, r1]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r6, r1, 0x12}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x18a, 0x1}) 08:26:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r1, 0xc074510c, &(0x7f0000000140)={"9c9f03c13aa90cbda72ab36a6ae6ba6d93d437b1722c64d3828268231941", 0x3, 0x40, 0x10001, [0x228, 0x832a, 0x1f, 0x7f, 0x4, 0x10000, 0x84, 0x2, 0x7, 0x5a800000, 0x200, 0x9, 0x8, 0x0, 0x3, 0x268, 0x800, 0x7]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x2, 0x200, 0x2}) 08:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x4) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x202401) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x9, 0x5, 0xc, 0x18, 0x1, 0x4, 0x0, 0xbc, 0x1}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socket$netlink(0x10, 0x3, 0x4) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x202401) (async) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x9, 0x5, 0xc, 0x18, 0x1, 0x4, 0x0, 0xbc, 0x1}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) [ 960.578808] FAULT_INJECTION: forcing a failure. [ 960.578808] name failslab, interval 1, probability 0, space 0, times 0 08:26:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 960.639337] FAULT_INJECTION: forcing a failure. [ 960.639337] name failslab, interval 1, probability 0, space 0, times 0 [ 960.657971] CPU: 1 PID: 21732 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 960.665885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.675235] Call Trace: [ 960.677828] dump_stack+0x1b2/0x281 [ 960.681461] should_fail.cold+0x10a/0x149 [ 960.685613] should_failslab+0xd6/0x130 [ 960.689589] kmem_cache_alloc+0x28e/0x3c0 [ 960.693743] getname_flags+0xc8/0x550 [ 960.697549] ? __do_page_fault+0x159/0xad0 [ 960.701785] user_path_at_empty+0x2a/0x50 [ 960.705933] do_mount+0x118/0x2a10 [ 960.709481] ? __do_page_fault+0x159/0xad0 [ 960.713717] ? retint_kernel+0x2d/0x2d [ 960.717602] ? copy_mount_string+0x40/0x40 [ 960.721838] ? memset+0x20/0x40 [ 960.725117] ? copy_mount_options+0x1fa/0x2f0 [ 960.729611] ? copy_mnt_ns+0xa30/0xa30 [ 960.733499] SyS_mount+0xa8/0x120 08:26:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r1, 0xc074510c, &(0x7f0000000140)={"9c9f03c13aa90cbda72ab36a6ae6ba6d93d437b1722c64d3828268231941", 0x3, 0x40, 0x10001, [0x228, 0x832a, 0x1f, 0x7f, 0x4, 0x10000, 0x84, 0x2, 0x7, 0x5a800000, 0x200, 0x9, 0x8, 0x0, 0x3, 0x268, 0x800, 0x7]}) (async) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x2, 0x200, 0x2}) 08:26:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r1, 0xc074510c, &(0x7f0000000140)={"9c9f03c13aa90cbda72ab36a6ae6ba6d93d437b1722c64d3828268231941", 0x3, 0x40, 0x10001, [0x228, 0x832a, 0x1f, 0x7f, 0x4, 0x10000, 0x84, 0x2, 0x7, 0x5a800000, 0x200, 0x9, 0x8, 0x0, 0x3, 0x268, 0x800, 0x7]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x2, 0x200, 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) ioctl$SNDCTL_MIDI_INFO(r1, 0xc074510c, &(0x7f0000000140)={"9c9f03c13aa90cbda72ab36a6ae6ba6d93d437b1722c64d3828268231941", 0x3, 0x40, 0x10001, [0x228, 0x832a, 0x1f, 0x7f, 0x4, 0x10000, 0x84, 0x2, 0x7, 0x5a800000, 0x200, 0x9, 0x8, 0x0, 0x3, 0x268, 0x800, 0x7]}) (async) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x2, 0x200, 0x2}) (async) [ 960.736945] ? copy_mnt_ns+0xa30/0xa30 [ 960.740865] do_syscall_64+0x1d5/0x640 [ 960.744767] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 960.749956] RIP: 0033:0x7f100538b61a [ 960.753664] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 960.761468] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 960.768769] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 960.776125] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 960.783394] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 960.790674] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 960.810392] CPU: 1 PID: 21741 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 960.818293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.827649] Call Trace: [ 960.830238] dump_stack+0x1b2/0x281 [ 960.833876] should_fail.cold+0x10a/0x149 [ 960.838029] should_failslab+0xd6/0x130 [ 960.842011] kmem_cache_alloc+0x28e/0x3c0 [ 960.846173] alloc_vfsmnt+0x23/0x7f0 [ 960.849979] ? _raw_read_unlock+0x29/0x40 [ 960.854134] vfs_kern_mount.part.0+0x27/0x470 [ 960.858665] do_mount+0xe65/0x2a10 [ 960.862220] ? __do_page_fault+0x159/0xad0 [ 960.866463] ? retint_kernel+0x2d/0x2d [ 960.870361] ? copy_mount_string+0x40/0x40 [ 960.874609] ? memset+0x20/0x40 [ 960.877892] ? copy_mount_options+0x1fa/0x2f0 [ 960.882387] ? copy_mnt_ns+0xa30/0xa30 [ 960.886273] SyS_mount+0xa8/0x120 [ 960.889725] ? copy_mnt_ns+0xa30/0xa30 [ 960.893608] do_syscall_64+0x1d5/0x640 [ 960.897483] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 960.902659] RIP: 0033:0x7f551d04761a [ 960.906353] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 960.914052] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 960.921307] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 960.928560] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 960.935808] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 960.943061] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 48) 08:26:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xd3) 08:26:30 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, &(0x7f0000000040)={0x67446698, 0x1, 0x1, 0x0, 0x1, "74bfbcc467b09d4d9f87979e8881d388a6a27fb117e62565bbd256c8092974d3ec682ce1fdd5"}, 0x36) (async, rerun: 32) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe}, 0x10) (rerun: 32) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f0000000080)=0x7a) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) (async) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000480)={r1}) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), r1) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_NRMIDIS(r4, 0x8004510b, &(0x7f0000000640)) (async) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20001090}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x60, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xd}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x2004c800}, 0x8084084) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x5}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x89}, @jmp={0x5, 0x1, 0x4, 0x0, 0x4, 0x80, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x8}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x9f, &(0x7f0000000240)=""/159, 0x40f00, 0x8, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f0000000300)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x8, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r1, r1, r1, r1, r1, r1]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r6, r1, 0x12}, 0x10) (async, rerun: 32) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x18a, 0x1}) (rerun: 32) 08:26:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x4) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x202401) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x9, 0x5, 0xc, 0x18, 0x1, 0x4, 0x0, 0xbc, 0x1}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 49) 08:26:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 08:26:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xd3) [ 961.055184] FAULT_INJECTION: forcing a failure. [ 961.055184] name failslab, interval 1, probability 0, space 0, times 0 08:26:30 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000040)={0x67446698, 0x1, 0x1, 0x0, 0x1, "74bfbcc467b09d4d9f87979e8881d388a6a27fb117e62565bbd256c8092974d3ec682ce1fdd5"}, 0x36) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe}, 0x10) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f0000000080)=0x7a) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000480)={r1}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_NRMIDIS(r4, 0x8004510b, &(0x7f0000000640)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20001090}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x60, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xd}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x2004c800}, 0x8084084) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x5}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x89}, @jmp={0x5, 0x1, 0x4, 0x0, 0x4, 0x80, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x8}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x9f, &(0x7f0000000240)=""/159, 0x40f00, 0x8, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f0000000300)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x8, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r1, r1, r1, r1, r1, r1]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r6, r1, 0x12}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x18a, 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, &(0x7f0000000040)={0x67446698, 0x1, 0x1, 0x0, 0x1, "74bfbcc467b09d4d9f87979e8881d388a6a27fb117e62565bbd256c8092974d3ec682ce1fdd5"}, 0x36) (async) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0xfffe}, 0x10) (async) ioctl$SNDCTL_TMR_TEMPO(r1, 0xc0045405, &(0x7f0000000080)=0x7a) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) (async) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000480)={r1}) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000500), r1) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r4, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_NRMIDIS(r4, 0x8004510b, &(0x7f0000000640)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r5, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20001090}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x60, r3, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r5}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xd}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x2004c800}, 0x8084084) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x5}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x89}, @jmp={0x5, 0x1, 0x4, 0x0, 0x4, 0x80, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @alu={0x7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x8}]}, &(0x7f0000000200)='GPL\x00', 0x2, 0x9f, &(0x7f0000000240)=""/159, 0x40f00, 0x8, '\x00', 0x0, 0xf, r1, 0x8, &(0x7f0000000300)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x8, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r1, r1, r1, r1, r1, r1]}, 0x80) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r6, r1, 0x12}, 0x10) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x18a, 0x1}) (async) 08:26:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) (async) [ 961.107136] FAULT_INJECTION: forcing a failure. [ 961.107136] name failslab, interval 1, probability 0, space 0, times 0 [ 961.141953] CPU: 0 PID: 21789 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 08:26:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) [ 961.149859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.159211] Call Trace: [ 961.161808] dump_stack+0x1b2/0x281 [ 961.165438] should_fail.cold+0x10a/0x149 [ 961.169590] should_failslab+0xd6/0x130 [ 961.173567] kmem_cache_alloc+0x28e/0x3c0 [ 961.177721] getname_flags+0xc8/0x550 [ 961.181524] ? __do_page_fault+0x159/0xad0 [ 961.185766] user_path_at_empty+0x2a/0x50 [ 961.189922] do_mount+0x118/0x2a10 [ 961.193468] ? __do_page_fault+0x159/0xad0 [ 961.197698] ? retint_kernel+0x2d/0x2d [ 961.201581] ? copy_mount_string+0x40/0x40 [ 961.205819] ? memset+0x20/0x40 [ 961.209093] ? copy_mount_options+0x1fa/0x2f0 [ 961.213576] ? copy_mnt_ns+0xa30/0xa30 [ 961.217450] SyS_mount+0xa8/0x120 [ 961.220894] ? copy_mnt_ns+0xa30/0xa30 [ 961.224776] do_syscall_64+0x1d5/0x640 [ 961.228664] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 961.233846] RIP: 0033:0x7f100538b61a [ 961.237550] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 961.245244] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 961.252499] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 961.259772] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 961.267040] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 961.274305] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 961.293127] CPU: 1 PID: 21798 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 961.301026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.310385] Call Trace: [ 961.312978] dump_stack+0x1b2/0x281 [ 961.316611] should_fail.cold+0x10a/0x149 [ 961.320765] should_failslab+0xd6/0x130 [ 961.324741] kmem_cache_alloc+0x28e/0x3c0 [ 961.328893] alloc_vfsmnt+0x23/0x7f0 [ 961.332606] ? _raw_read_unlock+0x29/0x40 [ 961.336761] vfs_kern_mount.part.0+0x27/0x470 [ 961.341260] do_mount+0xe65/0x2a10 [ 961.344805] ? __do_page_fault+0x159/0xad0 [ 961.349044] ? retint_kernel+0x2d/0x2d [ 961.352931] ? copy_mount_string+0x40/0x40 [ 961.357168] ? memset+0x20/0x40 [ 961.360450] ? copy_mount_options+0x1fa/0x2f0 [ 961.364946] ? copy_mnt_ns+0xa30/0xa30 [ 961.368830] SyS_mount+0xa8/0x120 [ 961.372288] ? copy_mnt_ns+0xa30/0xa30 [ 961.376177] do_syscall_64+0x1d5/0x640 [ 961.380074] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 961.385259] RIP: 0033:0x7f551d04761a [ 961.388967] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 961.396676] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a 08:26:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 49) 08:26:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xd3) 08:26:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) 08:26:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 08:26:30 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$nbd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698000000000300047938f8d1bd92080d17cb6c61f8f7c7eb46ddb731daed42e8c4999773198fae45be5afbb93706e71cac340ebcbe5f326f4131b4baaf7baf89f8b2c872fdb25fc179696b045fbc5c42687fc28f92d7db5121a00656edc8d18fad75f6d7b4d6286cfde03828146ae7ddcdbd25fee9ddcad2ce782e9578e1243555e2bfd25860"], 0x34) [ 961.403948] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 961.411217] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 961.418486] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 961.425753] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 50) [ 961.516048] FAULT_INJECTION: forcing a failure. [ 961.516048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 961.527958] CPU: 1 PID: 21860 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 961.535934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.545290] Call Trace: [ 961.547877] dump_stack+0x1b2/0x281 [ 961.551508] should_fail.cold+0x10a/0x149 [ 961.555756] __alloc_pages_nodemask+0x22c/0x2720 [ 961.560516] ? __save_stack_trace+0x63/0x160 08:26:30 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x2000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) 08:26:30 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x2000000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x2000000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) (async) [ 961.564928] ? __lock_acquire+0x5fc/0x3f20 [ 961.569165] ? cmp_ex_sort+0xb0/0xb0 [ 961.572883] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 961.577720] ? search_extable+0x6f/0x80 [ 961.581692] ? trim_init_extable+0x280/0x280 [ 961.586097] ? copy_mount_options+0x194/0x2f0 [ 961.590594] ? fixup_exception+0x93/0xd0 [ 961.594656] ? no_context+0x9c/0x7c0 [ 961.598373] ? force_sig_info_fault.constprop.0+0x260/0x260 [ 961.604082] ? bad_area_access_error+0x1f8/0x3e0 [ 961.608840] cache_grow_begin+0x91/0x700 08:26:30 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x2000000) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00'}) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) 08:26:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb0, 0x1403, 0x4, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_hsr\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'erspan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'vlan0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) userfaultfd(0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) write$nbd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698000000000000000000ca73000f98f337beff3efb30070b31c4c3ad93b71d90c280756199dba68f1c615259337b44a7ba478cd35dc3afecc824e5277f00000000000000d344f0924d736ad55b3485f21ae05d7f57c6f5b7bd8aaf270463eeb66c8b63b09a08c9b203537db163dc653f0026fa08ad744841fa490d53a6a2163fb4692d8c0b1ba578c42c1d5bac24ed8f7c1139148b4d30980632430ed023b69c7968421059a9fa5257e50754316510be48621540cbf83a81c4e886fe19137a1ba7d9ffdd95b3aef2980d2229ba4817cd172d0fe181a7384656ac199689b86c278a73a500"/241], 0xf1) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000080)=0xa2) [ 961.612899] ? fs_reclaim_release+0xd0/0x110 [ 961.617305] ? check_preemption_disabled+0x35/0x240 [ 961.622324] cache_alloc_refill+0x273/0x350 [ 961.626657] kmem_cache_alloc+0x333/0x3c0 [ 961.630810] getname_flags+0xc8/0x550 [ 961.634613] ? __do_page_fault+0x159/0xad0 [ 961.638849] user_path_at_empty+0x2a/0x50 [ 961.642996] do_mount+0x118/0x2a10 [ 961.646717] ? __do_page_fault+0x159/0xad0 [ 961.650950] ? retint_kernel+0x2d/0x2d [ 961.654840] ? copy_mount_string+0x40/0x40 [ 961.659075] ? memset+0x20/0x40 [ 961.662356] ? copy_mount_options+0x1fa/0x2f0 08:26:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb0, 0x1403, 0x4, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_hsr\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'erspan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'vlan0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) (async) userfaultfd(0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) write$nbd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698000000000000000000ca73000f98f337beff3efb30070b31c4c3ad93b71d90c280756199dba68f1c615259337b44a7ba478cd35dc3afecc824e5277f00000000000000d344f0924d736ad55b3485f21ae05d7f57c6f5b7bd8aaf270463eeb66c8b63b09a08c9b203537db163dc653f0026fa08ad744841fa490d53a6a2163fb4692d8c0b1ba578c42c1d5bac24ed8f7c1139148b4d30980632430ed023b69c7968421059a9fa5257e50754316510be48621540cbf83a81c4e886fe19137a1ba7d9ffdd95b3aef2980d2229ba4817cd172d0fe181a7384656ac199689b86c278a73a500"/241], 0xf1) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) (async) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000080)=0xa2) [ 961.666846] ? copy_mnt_ns+0xa30/0xa30 [ 961.670742] SyS_mount+0xa8/0x120 [ 961.674189] ? copy_mnt_ns+0xa30/0xa30 [ 961.678075] do_syscall_64+0x1d5/0x640 [ 961.681965] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 961.687150] RIP: 0033:0x7f100538b61a [ 961.690854] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 961.698562] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 961.705830] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 08:26:31 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, 0x0, 0x0) (async) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) (async) getsockopt$WPAN_WANTLQI(r1, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) (async) [ 961.713096] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 961.720361] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 961.727627] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 961.745896] FAULT_INJECTION: forcing a failure. [ 961.745896] name failslab, interval 1, probability 0, space 0, times 0 [ 961.775047] CPU: 1 PID: 21862 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 961.782953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 961.792300] Call Trace: [ 961.794890] dump_stack+0x1b2/0x281 [ 961.798523] should_fail.cold+0x10a/0x149 [ 961.802672] should_failslab+0xd6/0x130 [ 961.806647] kmem_cache_alloc+0x28e/0x3c0 [ 961.810795] alloc_vfsmnt+0x23/0x7f0 [ 961.814516] ? _raw_read_unlock+0x3b/0x40 [ 961.818665] vfs_kern_mount.part.0+0x27/0x470 [ 961.823158] do_mount+0xe65/0x2a10 [ 961.826695] ? __do_page_fault+0x159/0xad0 [ 961.830929] ? retint_kernel+0x2d/0x2d [ 961.834822] ? copy_mount_string+0x40/0x40 [ 961.839058] ? memset+0x20/0x40 [ 961.842343] ? copy_mount_options+0x1fa/0x2f0 [ 961.846831] ? copy_mnt_ns+0xa30/0xa30 [ 961.850715] SyS_mount+0xa8/0x120 [ 961.854161] ? copy_mnt_ns+0xa30/0xa30 [ 961.858047] do_syscall_64+0x1d5/0x640 [ 961.861937] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 961.867203] RIP: 0033:0x7f551d04761a [ 961.870907] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 961.878611] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 961.885876] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 961.893137] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 961.900404] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 961.907673] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 961.915597] XFS (loop0): unknown mount option [logbsize=]. 08:26:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 51) 08:26:31 executing program 1: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x1410, 0x20, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000002}, 0x280c0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$nbd(r0, 0x0, 0x0) 08:26:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000000037b2e2f66696c6530004c69fb102c9481e5a914ede5aa2dac2ee81edfc7bc44eb7a651b17b31e29df3f7dbfc1f137db8dd6eb9fd5f2188c24add6e2000000000000007f0417958a5969abcb49d5df46b9012e06abc17a8fc54d7303dabd3bd2a3caab870573eb9f8989e952e447172b5896ba8787a2953d753197b1157c2b4974c43af7cb374d6a1d63388a1dbeca6ce2df1821a313134d284af41306fff786dfe7b64c90f9767d7be2c254131e8308f54ade5942d04375b266e4e57ac9263d3b31ebd1e4287399432c18945669c6107aac5ad78e94f4"]) 08:26:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async, rerun: 64) write$nbd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698000000000300047938f8d1bd92080d17cb6c61f8f7c7eb46ddb731daed42e8c4999773198fae45be5afbb93706e71cac340ebcbe5f326f4131b4baaf7baf89f8b2c872fdb25fc179696b045fbc5c42687fc28f92d7db5121a00656edc8d18fad75f6d7b4d6286cfde03828146ae7ddcdbd25fee9ddcad2ce782e9578e1243555e2bfd25860"], 0x34) (rerun: 64) 08:26:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 50) 08:26:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb0, 0x1403, 0x4, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_hsr\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'erspan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'vlan0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) userfaultfd(0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) write$nbd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698000000000000000000ca73000f98f337beff3efb30070b31c4c3ad93b71d90c280756199dba68f1c615259337b44a7ba478cd35dc3afecc824e5277f00000000000000d344f0924d736ad55b3485f21ae05d7f57c6f5b7bd8aaf270463eeb66c8b63b09a08c9b203537db163dc653f0026fa08ad744841fa490d53a6a2163fb4692d8c0b1ba578c42c1d5bac24ed8f7c1139148b4d30980632430ed023b69c7968421059a9fa5257e50754316510be48621540cbf83a81c4e886fe19137a1ba7d9ffdd95b3aef2980d2229ba4817cd172d0fe181a7384656ac199689b86c278a73a500"/241], 0xf1) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000080)=0xa2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xb0, 0x1403, 0x4, 0x70bd2b, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_hsr\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'erspan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'vlan0\x00'}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) (async) userfaultfd(0x800) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) write$nbd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698000000000000000000ca73000f98f337beff3efb30070b31c4c3ad93b71d90c280756199dba68f1c615259337b44a7ba478cd35dc3afecc824e5277f00000000000000d344f0924d736ad55b3485f21ae05d7f57c6f5b7bd8aaf270463eeb66c8b63b09a08c9b203537db163dc653f0026fa08ad744841fa490d53a6a2163fb4692d8c0b1ba578c42c1d5bac24ed8f7c1139148b4d30980632430ed023b69c7968421059a9fa5257e50754316510be48621540cbf83a81c4e886fe19137a1ba7d9ffdd95b3aef2980d2229ba4817cd172d0fe181a7384656ac199689b86c278a73a500"/241], 0xf1) (async) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) (async) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x940, 0x0) (async) ioctl$SNDCTL_TMR_TEMPO(r2, 0xc0045405, &(0x7f0000000080)=0xa2) (async) 08:26:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000000037b2e2f66696c6530004c69fb102c9481e5a914ede5aa2dac2ee81edfc7bc44eb7a651b17b31e29df3f7dbfc1f137db8dd6eb9fd5f2188c24add6e2000000000000007f0417958a5969abcb49d5df46b9012e06abc17a8fc54d7303dabd3bd2a3caab870573eb9f8989e952e447172b5896ba8787a2953d753197b1157c2b4974c43af7cb374d6a1d63388a1dbeca6ce2df1821a313134d284af41306fff786dfe7b64c90f9767d7be2c254131e8308f54ade5942d04375b266e4e57ac9263d3b31ebd1e4287399432c18945669c6107aac5ad78e94f4"]) 08:26:31 executing program 1: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x1410, 0x20, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000002}, 0x280c0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) write$nbd(r0, 0x0, 0x0) [ 962.034633] FAULT_INJECTION: forcing a failure. [ 962.034633] name failslab, interval 1, probability 0, space 0, times 0 [ 962.065266] FAULT_INJECTION: forcing a failure. [ 962.065266] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 962.081362] CPU: 0 PID: 21921 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 962.089259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.098612] Call Trace: [ 962.101200] dump_stack+0x1b2/0x281 [ 962.104835] should_fail.cold+0x10a/0x149 [ 962.108986] should_failslab+0xd6/0x130 [ 962.112959] __kmalloc_track_caller+0x2bc/0x400 [ 962.117628] ? kstrdup_const+0x35/0x60 [ 962.121513] ? lock_downgrade+0x740/0x740 [ 962.125654] kstrdup+0x36/0x70 [ 962.128837] kstrdup_const+0x35/0x60 [ 962.132543] alloc_vfsmnt+0xe0/0x7f0 [ 962.136251] ? _raw_read_unlock+0x29/0x40 [ 962.140394] vfs_kern_mount.part.0+0x27/0x470 [ 962.144881] do_mount+0xe65/0x2a10 [ 962.148412] ? __do_page_fault+0x159/0xad0 [ 962.152643] ? retint_kernel+0x2d/0x2d [ 962.156536] ? copy_mount_string+0x40/0x40 [ 962.160773] ? memset+0x20/0x40 [ 962.164048] ? copy_mount_options+0x1fa/0x2f0 [ 962.168534] ? copy_mnt_ns+0xa30/0xa30 [ 962.172415] SyS_mount+0xa8/0x120 [ 962.175863] ? copy_mnt_ns+0xa30/0xa30 [ 962.179753] do_syscall_64+0x1d5/0x640 [ 962.183643] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 962.188824] RIP: 0033:0x7f100538b61a [ 962.192529] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 962.200231] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 962.207494] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 962.214763] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 962.222109] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 08:26:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) write$nbd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698000000000300047938f8d1bd92080d17cb6c61f8f7c7eb46ddb731daed42e8c4999773198fae45be5afbb93706e71cac340ebcbe5f326f4131b4baaf7baf89f8b2c872fdb25fc179696b045fbc5c42687fc28f92d7db5121a00656edc8d18fad75f6d7b4d6286cfde03828146ae7ddcdbd25fee9ddcad2ce782e9578e1243555e2bfd25860"], 0x34) 08:26:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:31 executing program 1: sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x1410, 0x20, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000002}, 0x280c0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$nbd(r0, 0x0, 0x0) 08:26:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (rerun: 32) write$nbd(r0, &(0x7f0000000100), 0x10) [ 962.229372] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 962.252081] CPU: 1 PID: 21926 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 962.259984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.269332] Call Trace: [ 962.271927] dump_stack+0x1b2/0x281 [ 962.275568] should_fail.cold+0x10a/0x149 [ 962.279728] __alloc_pages_nodemask+0x22c/0x2720 [ 962.284489] ? trace_hardirqs_on+0x10/0x10 [ 962.288727] ? pcpu_alloc+0xbe0/0xf50 [ 962.292617] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 962.297483] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 962.302934] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 962.307951] alloc_pages_current+0x155/0x260 [ 962.312359] ? __lockdep_init_map+0x100/0x560 [ 962.316855] get_zeroed_page+0x19/0x50 [ 962.320737] mount_fs+0x1c7/0x2a0 [ 962.324193] vfs_kern_mount.part.0+0x5b/0x470 [ 962.328691] do_mount+0xe65/0x2a10 [ 962.332237] ? __do_page_fault+0x159/0xad0 [ 962.336468] ? retint_kernel+0x2d/0x2d [ 962.340354] ? copy_mount_string+0x40/0x40 [ 962.344589] ? memset+0x20/0x40 [ 962.347866] ? copy_mount_options+0x1fa/0x2f0 [ 962.352390] ? copy_mnt_ns+0xa30/0xa30 [ 962.356280] SyS_mount+0xa8/0x120 [ 962.359728] ? copy_mnt_ns+0xa30/0xa30 [ 962.363618] do_syscall_64+0x1d5/0x640 [ 962.367510] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 962.372691] RIP: 0033:0x7f551d04761a [ 962.376391] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:26:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 52) [ 962.384098] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 962.391368] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 962.398640] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 962.405914] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 962.413269] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:31 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 51) 08:26:31 executing program 1: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000000037b2e2f66696c6530004c69fb102c9481e5a914ede5aa2dac2ee81edfc7bc44eb7a651b17b31e29df3f7dbfc1f137db8dd6eb9fd5f2188c24add6e2000000000000007f0417958a5969abcb49d5df46b9012e06abc17a8fc54d7303dabd3bd2a3caab870573eb9f8989e952e447172b5896ba8787a2953d753197b1157c2b4974c43af7cb374d6a1d63388a1dbeca6ce2df1821a313134d284af41306fff786dfe7b64c90f9767d7be2c254131e8308f54ade5942d04375b266e4e57ac9263d3b31ebd1e4287399432c18945669c6107aac5ad78e94f4"]) 08:26:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="82446698000000000000000000f97100"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000000)) 08:26:31 executing program 1: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) [ 962.535800] FAULT_INJECTION: forcing a failure. [ 962.535800] name failslab, interval 1, probability 0, space 0, times 0 [ 962.560007] FAULT_INJECTION: forcing a failure. [ 962.560007] name failslab, interval 1, probability 0, space 0, times 0 [ 962.576628] CPU: 1 PID: 21989 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 08:26:31 executing program 1: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="82446698000000000000000000f97100"], 0x10) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000000)) 08:26:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_LINK={0x8, 0x1, r1}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_LINK={0x8, 0x1, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40880}, 0x8000) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000000)) [ 962.584529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.593886] Call Trace: [ 962.596474] dump_stack+0x1b2/0x281 [ 962.600112] should_fail.cold+0x10a/0x149 [ 962.604264] should_failslab+0xd6/0x130 [ 962.608237] kmem_cache_alloc+0x28e/0x3c0 [ 962.612383] alloc_vfsmnt+0x23/0x7f0 [ 962.616095] ? _raw_read_unlock+0x29/0x40 [ 962.620245] vfs_kern_mount.part.0+0x27/0x470 [ 962.624747] do_mount+0xe65/0x2a10 [ 962.628290] ? __do_page_fault+0x159/0xad0 [ 962.632524] ? retint_kernel+0x2d/0x2d [ 962.636412] ? copy_mount_string+0x40/0x40 [ 962.640655] ? memset+0x20/0x40 [ 962.644029] ? copy_mount_options+0x1fa/0x2f0 [ 962.648534] ? copy_mnt_ns+0xa30/0xa30 [ 962.652434] SyS_mount+0xa8/0x120 [ 962.655887] ? copy_mnt_ns+0xa30/0xa30 [ 962.659788] do_syscall_64+0x1d5/0x640 [ 962.663683] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 962.668871] RIP: 0033:0x7f100538b61a [ 962.672577] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:26:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_LINK={0x8, 0x1, r1}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_LINK={0x8, 0x1, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40880}, 0x8000) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000000)) [ 962.680306] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 962.687574] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 962.694842] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 962.702196] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 962.709467] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 962.718512] CPU: 1 PID: 21993 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 962.726486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.735840] Call Trace: [ 962.738430] dump_stack+0x1b2/0x281 [ 962.742079] should_fail.cold+0x10a/0x149 [ 962.746232] should_failslab+0xd6/0x130 [ 962.750210] kmem_cache_alloc+0x28e/0x3c0 [ 962.754361] getname_kernel+0x4e/0x340 [ 962.758251] kern_path+0x1b/0x40 [ 962.761705] lookup_bdev+0xc6/0x1c0 [ 962.765331] ? bd_acquire+0x440/0x440 [ 962.769130] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 962.774583] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 962.779600] blkdev_get_by_path+0x1b/0xa0 [ 962.783749] mount_bdev+0x4c/0x360 [ 962.787288] ? xfs_parseargs+0x1130/0x1130 [ 962.791528] mount_fs+0x92/0x2a0 [ 962.794905] vfs_kern_mount.part.0+0x5b/0x470 [ 962.799406] do_mount+0xe65/0x2a10 [ 962.802962] ? __do_page_fault+0x159/0xad0 [ 962.807196] ? retint_kernel+0x2d/0x2d [ 962.811091] ? copy_mount_string+0x40/0x40 [ 962.815331] ? memset+0x20/0x40 [ 962.818611] ? copy_mount_options+0x1fa/0x2f0 [ 962.823104] ? copy_mnt_ns+0xa30/0xa30 [ 962.827002] SyS_mount+0xa8/0x120 [ 962.830448] ? copy_mnt_ns+0xa30/0xa30 08:26:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="82446698000000000000000000f97100"], 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="82446698000000000000000000f97100"], 0x10) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r1, 0x40046210, &(0x7f0000000000)) (async) [ 962.834335] do_syscall_64+0x1d5/0x640 [ 962.838224] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 962.843407] RIP: 0033:0x7f551d04761a [ 962.847111] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 962.854819] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 962.862088] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 962.869362] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 962.876724] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 962.883993] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 53) 08:26:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 52) 08:26:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) (async, rerun: 64) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_LINK={0x8, 0x1, r1}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_LINK={0x8, 0x1, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40880}, 0x8000) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000000)) 08:26:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x9, &(0x7f0000001c00)=[{@none}, {}, {}, {}, {@none}, {@fixed}, {@none}, {@none}, {}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="5544669800003707000000000000000052189749d788489e72878300000000611f8def27b765d4649c3cb354a8605d24f812b6ac06fa7c6f5cfffd7b8a1d24945892ec00000000000000020a0e0a3b99403a385d1acc40b86775f979a5d151ee75210afafa8752b1a3122764d36608361d275880ed1a45625b44febf4a2f50025ac6dd9367200f7abec2fd8fd2d1729ff66409478f3161a8bb55c89a069ca8a474251f2ade828f3184fd10f0434e8c4424a85e79d603c5f0f89f8857a9c28bf13b2662fd49a4ba2e2a4d0f36c63a3aaf7e91b3b01f4e68c275c27633a76810635de2ebfb5125dfe54b7fda0f53f5318b11b6860f53685154fb0a9e0f53cdfce69d4f8b102f7a2c99a9f1b389399cd2"], 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000080)=0x75f) 08:26:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x3, 0x4, 0x1, "97685221b2219ec034c7e3766e8d86404ff3c52755bca50aaedae7986853add89d34c38edfc55ccc75d8c981e3b5fd878236be7115272334fc4a76ca18d331c0ab47ad84f1b45b5c51fe1fe61e4f0781781ddcecc6ba2e5a6659d1e98dd8942e9c65181589ca59f28484b7b8b9dbfabe0f3615e41f725be84a5405f5f2567440f12db91730ba75e0a6111d59e3db443d8963b7260e7837aa5dcd084da7a274437b33b6547ce3f2c94b"}, 0xb9) write$nbd(r0, &(0x7f0000000100), 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x8500, 0x0) r3 = socket$netlink(0x10, 0x3, 0x7) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 08:26:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 64) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x3, 0x4, 0x1, "97685221b2219ec034c7e3766e8d86404ff3c52755bca50aaedae7986853add89d34c38edfc55ccc75d8c981e3b5fd878236be7115272334fc4a76ca18d331c0ab47ad84f1b45b5c51fe1fe61e4f0781781ddcecc6ba2e5a6659d1e98dd8942e9c65181589ca59f28484b7b8b9dbfabe0f3615e41f725be84a5405f5f2567440f12db91730ba75e0a6111d59e3db443d8963b7260e7837aa5dcd084da7a274437b33b6547ce3f2c94b"}, 0xb9) (async, rerun: 32) write$nbd(r0, &(0x7f0000000100), 0x10) (async) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x8500, 0x0) r3 = socket$netlink(0x10, 0x3, 0x7) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 08:26:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, 0x0, 0x0) (async) 08:26:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x9, &(0x7f0000001c00)=[{@none}, {}, {}, {}, {@none}, {@fixed}, {@none}, {@none}, {}]}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000080)=0x75f) [ 963.044854] FAULT_INJECTION: forcing a failure. [ 963.044854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 963.060035] FAULT_INJECTION: forcing a failure. [ 963.060035] name failslab, interval 1, probability 0, space 0, times 0 08:26:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x21d) [ 963.098523] CPU: 1 PID: 22050 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 963.106433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.115792] Call Trace: [ 963.118382] dump_stack+0x1b2/0x281 [ 963.122012] should_fail.cold+0x10a/0x149 [ 963.126165] should_failslab+0xd6/0x130 [ 963.130143] kmem_cache_alloc_trace+0x29a/0x3d0 [ 963.134818] ? set_bdev_super+0x110/0x110 [ 963.138969] sget_userns+0x102/0xc10 [ 963.142685] ? set_bdev_super+0x110/0x110 08:26:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x9, &(0x7f0000001c00)=[{@none}, {}, {}, {}, {@none}, {@fixed}, {@none}, {@none}, {}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x10) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000080)=0x75f) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x9, &(0x7f0000001c00)=[{@none}, {}, {}, {}, {@none}, {@fixed}, {@none}, {@none}, {}]}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x10) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000080)=0x75f) (async) [ 963.146839] ? ns_test_super+0x50/0x50 [ 963.150729] ? set_bdev_super+0x110/0x110 [ 963.154884] ? ns_test_super+0x50/0x50 [ 963.158774] sget+0xd1/0x110 [ 963.161798] mount_bdev+0xcd/0x360 [ 963.165336] ? xfs_parseargs+0x1130/0x1130 [ 963.169572] mount_fs+0x92/0x2a0 [ 963.172940] vfs_kern_mount.part.0+0x5b/0x470 [ 963.177442] do_mount+0xe65/0x2a10 [ 963.180987] ? __do_page_fault+0x159/0xad0 [ 963.185220] ? retint_kernel+0x2d/0x2d [ 963.189108] ? copy_mount_string+0x40/0x40 [ 963.193347] ? memset+0x20/0x40 08:26:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000010000000000000000000"], 0x10) [ 963.196631] ? copy_mount_options+0x1fa/0x2f0 [ 963.201125] ? copy_mnt_ns+0xa30/0xa30 [ 963.205014] SyS_mount+0xa8/0x120 [ 963.208471] ? copy_mnt_ns+0xa30/0xa30 [ 963.212359] do_syscall_64+0x1d5/0x640 [ 963.216248] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 963.221436] RIP: 0033:0x7f551d04761a [ 963.225141] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 963.232848] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 963.240115] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 963.247385] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 963.254655] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 963.261925] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 963.271412] CPU: 1 PID: 22051 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 963.279298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.288657] Call Trace: [ 963.291248] dump_stack+0x1b2/0x281 [ 963.294884] should_fail.cold+0x10a/0x149 [ 963.299044] __alloc_pages_nodemask+0x22c/0x2720 [ 963.303809] ? trace_hardirqs_on+0x10/0x10 [ 963.308055] ? pcpu_alloc+0xbe0/0xf50 [ 963.311863] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 963.316719] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 963.322182] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 963.327208] alloc_pages_current+0x155/0x260 [ 963.331625] ? __lockdep_init_map+0x100/0x560 [ 963.336127] get_zeroed_page+0x19/0x50 [ 963.340020] mount_fs+0x1c7/0x2a0 [ 963.343486] vfs_kern_mount.part.0+0x5b/0x470 [ 963.347986] do_mount+0xe65/0x2a10 [ 963.351529] ? __do_page_fault+0x159/0xad0 [ 963.355770] ? retint_kernel+0x2d/0x2d [ 963.359661] ? copy_mount_string+0x40/0x40 [ 963.363901] ? memset+0x20/0x40 [ 963.367186] ? copy_mount_options+0x1fa/0x2f0 [ 963.371678] ? copy_mnt_ns+0xa30/0xa30 [ 963.375565] SyS_mount+0xa8/0x120 [ 963.379054] ? copy_mnt_ns+0xa30/0xa30 [ 963.382942] do_syscall_64+0x1d5/0x640 [ 963.386840] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 963.392035] RIP: 0033:0x7f100538b61a [ 963.395743] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 963.403447] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 963.410698] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 963.417954] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 963.425211] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 963.432461] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 54) 08:26:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000010000000000000000000"], 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000010000000000000000000"], 0x10) (async) 08:26:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x21d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) (async) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x21d) (async) 08:26:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 08:26:32 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 64) write$nbd(r1, &(0x7f0000000000)={0x67446698, 0x0, 0x3, 0x4, 0x1, "97685221b2219ec034c7e3766e8d86404ff3c52755bca50aaedae7986853add89d34c38edfc55ccc75d8c981e3b5fd878236be7115272334fc4a76ca18d331c0ab47ad84f1b45b5c51fe1fe61e4f0781781ddcecc6ba2e5a6659d1e98dd8942e9c65181589ca59f28484b7b8b9dbfabe0f3615e41f725be84a5405f5f2567440f12db91730ba75e0a6111d59e3db443d8963b7260e7837aa5dcd084da7a274437b33b6547ce3f2c94b"}, 0xb9) (rerun: 64) write$nbd(r0, &(0x7f0000000100), 0x10) (async, rerun: 32) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x8500, 0x0) (async, rerun: 32) r3 = socket$netlink(0x10, 0x3, 0x7) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 08:26:32 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 53) 08:26:32 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x8c, r0, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4718}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'geneve0\x00'}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_bond\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8044043}, 0x44000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 08:26:32 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="67446698000010000000000000000000"], 0x10) [ 963.547938] FAULT_INJECTION: forcing a failure. [ 963.547938] name failslab, interval 1, probability 0, space 0, times 0 [ 963.578221] FAULT_INJECTION: forcing a failure. [ 963.578221] name failslab, interval 1, probability 0, space 0, times 0 [ 963.590261] CPU: 1 PID: 22116 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 963.598163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.607530] Call Trace: [ 963.610124] dump_stack+0x1b2/0x281 [ 963.613763] should_fail.cold+0x10a/0x149 [ 963.617912] should_failslab+0xd6/0x130 [ 963.621887] kmem_cache_alloc_trace+0x29a/0x3d0 [ 963.626559] ? set_bdev_super+0x110/0x110 [ 963.630707] sget_userns+0x102/0xc10 [ 963.634419] ? set_bdev_super+0x110/0x110 [ 963.638571] ? ns_test_super+0x50/0x50 [ 963.642462] ? set_bdev_super+0x110/0x110 [ 963.646612] ? ns_test_super+0x50/0x50 [ 963.650509] sget+0xd1/0x110 [ 963.653535] mount_bdev+0xcd/0x360 [ 963.657080] ? xfs_parseargs+0x1130/0x1130 [ 963.661318] mount_fs+0x92/0x2a0 [ 963.664692] vfs_kern_mount.part.0+0x5b/0x470 [ 963.669213] do_mount+0xe65/0x2a10 [ 963.672761] ? __do_page_fault+0x159/0xad0 [ 963.676997] ? retint_kernel+0x2d/0x2d [ 963.680888] ? copy_mount_string+0x40/0x40 [ 963.685126] ? memset+0x20/0x40 [ 963.688409] ? copy_mount_options+0x1fa/0x2f0 [ 963.692904] ? copy_mnt_ns+0xa30/0xa30 [ 963.696797] SyS_mount+0xa8/0x120 [ 963.700243] ? copy_mnt_ns+0xa30/0xa30 [ 963.704235] do_syscall_64+0x1d5/0x640 [ 963.708141] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 963.713323] RIP: 0033:0x7f551d04761a [ 963.717019] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 963.724722] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 963.731975] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 963.739226] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 963.746484] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 963.753735] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 963.761006] CPU: 0 PID: 22113 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 963.768889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.778242] Call Trace: [ 963.780827] dump_stack+0x1b2/0x281 [ 963.784442] should_fail.cold+0x10a/0x149 [ 963.788586] should_failslab+0xd6/0x130 [ 963.792544] kmem_cache_alloc+0x28e/0x3c0 [ 963.796674] getname_kernel+0x4e/0x340 [ 963.800544] kern_path+0x1b/0x40 [ 963.803905] lookup_bdev+0xc6/0x1c0 [ 963.807512] ? bd_acquire+0x440/0x440 [ 963.811294] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 963.816727] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 963.821726] blkdev_get_by_path+0x1b/0xa0 [ 963.825856] mount_bdev+0x4c/0x360 [ 963.829381] ? xfs_parseargs+0x1130/0x1130 [ 963.833597] mount_fs+0x92/0x2a0 [ 963.836946] vfs_kern_mount.part.0+0x5b/0x470 [ 963.841422] do_mount+0xe65/0x2a10 [ 963.844945] ? __do_page_fault+0x159/0xad0 [ 963.849161] ? retint_kernel+0x2d/0x2d [ 963.853031] ? copy_mount_string+0x40/0x40 [ 963.857246] ? memset+0x20/0x40 [ 963.860508] ? copy_mount_options+0x1fa/0x2f0 [ 963.864986] ? copy_mnt_ns+0xa30/0xa30 [ 963.868856] SyS_mount+0xa8/0x120 [ 963.872287] ? copy_mnt_ns+0xa30/0xa30 [ 963.876154] do_syscall_64+0x1d5/0x640 [ 963.880025] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 963.885194] RIP: 0033:0x7f100538b61a [ 963.888881] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:26:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3}, 0x10) 08:26:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x21d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) (async) ioctl$SNDCTL_TMR_TIMEBASE(0xffffffffffffffff, 0xc0045401, &(0x7f0000000040)=0x21d) (async) 08:26:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r2 = socket$kcm(0x29, 0x7, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r1, r3}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r5, 0x40045109, &(0x7f0000000080)=0x3f) 08:26:33 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x8c, r0, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4718}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'geneve0\x00'}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_bond\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8044043}, 0x44000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 963.896573] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 963.903819] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 963.911068] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 963.918316] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 963.925566] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 55) 08:26:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3}, 0x10) 08:26:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r2 = socket$kcm(0x29, 0x7, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r1, r3}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r5, 0x40045109, &(0x7f0000000080)=0x3f) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) socket$kcm(0x29, 0x7, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r1, r3}) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_RESETSAMPLES(r5, 0x40045109, &(0x7f0000000080)=0x3f) (async) 08:26:33 executing program 1: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x8c, r0, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4718}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'geneve0\x00'}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_bond\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8044043}, 0x44000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x8c, r0, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4718}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'geneve0\x00'}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_bond\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8044043}, 0x44000) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) 08:26:33 executing program 2: ioctl$SNDCTL_SYNTH_ID(0xffffffffffffffff, 0xc08c5114, &(0x7f0000000280)={"2c1b8afbd4799337ae95785bebeb3a6a0af8e7675bc4afe5119e604407ca", 0x0, 0x1, 0x1, 0x4, 0x0, 0x7, 0x9, 0x2, [0x101, 0x3, 0x80, 0x6b2, 0x1, 0x5, 0xfff, 0x40, 0x8, 0x8, 0xfffffffe, 0x7fff, 0x7, 0x7, 0x5646, 0x289, 0x7, 0x9, 0x1]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x94, r2, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'caif0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'erspan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_team\x00'}]}, 0x94}, 0x1, 0x0, 0x0, 0x8050}, 0x40051) socket$isdn(0x22, 0x3, 0x23) 08:26:33 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 54) 08:26:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x3}, 0x10) [ 964.150428] FAULT_INJECTION: forcing a failure. [ 964.150428] name failslab, interval 1, probability 0, space 0, times 0 [ 964.157001] FAULT_INJECTION: forcing a failure. [ 964.157001] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 964.173424] CPU: 0 PID: 22179 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 964.181300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.190646] Call Trace: [ 964.193234] dump_stack+0x1b2/0x281 [ 964.196909] should_fail.cold+0x10a/0x149 [ 964.201058] ? get_page_from_freelist+0xaf6/0x25a0 [ 964.205993] __alloc_pages_nodemask+0x22c/0x2720 [ 964.210752] ? lock_downgrade+0x740/0x740 [ 964.214902] ? page_outside_zone_boundaries+0x1db/0x310 [ 964.220266] ? __lock_acquire+0x5fc/0x3f20 [ 964.224507] ? preempt_count_add+0xaf/0x170 [ 964.228819] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 964.233650] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 964.239081] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 964.244079] ? __alloc_pages_nodemask+0x1a6e/0x2720 [ 964.249084] cache_grow_begin+0x91/0x700 [ 964.253128] ? fs_reclaim_release+0xd0/0x110 [ 964.257518] ? check_preemption_disabled+0x35/0x240 [ 964.262538] cache_alloc_refill+0x273/0x350 [ 964.266863] kmem_cache_alloc+0x333/0x3c0 [ 964.271011] getname_kernel+0x4e/0x340 [ 964.274903] kern_path+0x1b/0x40 [ 964.278266] lookup_bdev+0xc6/0x1c0 [ 964.281893] ? bd_acquire+0x440/0x440 [ 964.285694] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 964.291151] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 964.296170] blkdev_get_by_path+0x1b/0xa0 [ 964.300317] mount_bdev+0x4c/0x360 [ 964.303852] ? xfs_parseargs+0x1130/0x1130 [ 964.308089] mount_fs+0x92/0x2a0 [ 964.311452] vfs_kern_mount.part.0+0x5b/0x470 [ 964.315943] do_mount+0xe65/0x2a10 [ 964.319483] ? __do_page_fault+0x159/0xad0 [ 964.323720] ? retint_kernel+0x2d/0x2d [ 964.327606] ? copy_mount_string+0x40/0x40 [ 964.331842] ? memset+0x20/0x40 [ 964.335114] ? copy_mount_options+0x1fa/0x2f0 [ 964.339601] ? copy_mnt_ns+0xa30/0xa30 [ 964.343487] SyS_mount+0xa8/0x120 [ 964.346932] ? copy_mnt_ns+0xa30/0xa30 [ 964.350814] do_syscall_64+0x1d5/0x640 [ 964.354696] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 964.359872] RIP: 0033:0x7f551d04761a [ 964.363576] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 964.371281] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 964.378545] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 964.385808] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 964.393158] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 08:26:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$SNDCTL_TMR_CONTINUE(r2, 0x5404) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000000)={r0}) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:33 executing program 2: ioctl$SNDCTL_SYNTH_ID(0xffffffffffffffff, 0xc08c5114, &(0x7f0000000280)={"2c1b8afbd4799337ae95785bebeb3a6a0af8e7675bc4afe5119e604407ca", 0x0, 0x1, 0x1, 0x4, 0x0, 0x7, 0x9, 0x2, [0x101, 0x3, 0x80, 0x6b2, 0x1, 0x5, 0xfff, 0x40, 0x8, 0x8, 0xfffffffe, 0x7fff, 0x7, 0x7, 0x5646, 0x289, 0x7, 0x9, 0x1]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x94, r2, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'caif0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'erspan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_team\x00'}]}, 0x94}, 0x1, 0x0, 0x0, 0x8050}, 0x40051) (async) socket$isdn(0x22, 0x3, 0x23) 08:26:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100), 0x10) r2 = socket$kcm(0x29, 0x7, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r1, r3}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r5, 0x40045109, &(0x7f0000000080)=0x3f) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) socket$kcm(0x29, 0x7, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/locks\x00', 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r1, r3}) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000140)={'vxcan1\x00'}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_RESETSAMPLES(r5, 0x40045109, &(0x7f0000000080)=0x3f) (async) 08:26:33 executing program 1: write$nbd(0xffffffffffffffff, 0x0, 0x0) [ 964.400427] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 964.455023] CPU: 1 PID: 22191 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 964.462944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.469439] XFS (loop4): unknown mount option [logbsize=]. [ 964.472294] Call Trace: [ 964.472310] dump_stack+0x1b2/0x281 [ 964.472325] should_fail.cold+0x10a/0x149 [ 964.488255] should_failslab+0xd6/0x130 [ 964.492241] __kmalloc_track_caller+0x2bc/0x400 [ 964.496907] ? kstrdup_const+0x35/0x60 [ 964.500791] ? lock_downgrade+0x740/0x740 08:26:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x4) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'team_slave_0\x00', 0x2000}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000000)={r2}) write$nbd(r0, &(0x7f0000000100), 0x10) [ 964.504943] kstrdup+0x36/0x70 [ 964.508143] kstrdup_const+0x35/0x60 [ 964.511856] alloc_vfsmnt+0xe0/0x7f0 [ 964.515571] ? _raw_read_unlock+0x29/0x40 [ 964.519719] vfs_kern_mount.part.0+0x27/0x470 [ 964.524301] do_mount+0xe65/0x2a10 [ 964.527841] ? __do_page_fault+0x159/0xad0 [ 964.532072] ? retint_kernel+0x2d/0x2d [ 964.535966] ? copy_mount_string+0x40/0x40 [ 964.540203] ? memset+0x20/0x40 [ 964.543487] ? copy_mount_options+0x1fa/0x2f0 [ 964.547981] ? copy_mnt_ns+0xa30/0xa30 [ 964.551870] SyS_mount+0xa8/0x120 [ 964.555322] ? copy_mnt_ns+0xa30/0xa30 [ 964.559207] do_syscall_64+0x1d5/0x640 [ 964.563096] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 964.568277] RIP: 0033:0x7f100538b61a [ 964.571966] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 964.579650] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 964.586905] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 964.594153] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 964.601409] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 964.608669] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 56) 08:26:33 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x4) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (rerun: 64) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'team_slave_0\x00', 0x2000}) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000000)={r2}) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:33 executing program 1: write$nbd(0xffffffffffffffff, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) (async) 08:26:33 executing program 2: ioctl$SNDCTL_SYNTH_ID(0xffffffffffffffff, 0xc08c5114, &(0x7f0000000280)={"2c1b8afbd4799337ae95785bebeb3a6a0af8e7675bc4afe5119e604407ca", 0x0, 0x1, 0x1, 0x4, 0x0, 0x7, 0x9, 0x2, [0x101, 0x3, 0x80, 0x6b2, 0x1, 0x5, 0xfff, 0x40, 0x8, 0x8, 0xfffffffe, 0x7fff, 0x7, 0x7, 0x5646, 0x289, 0x7, 0x9, 0x1]}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x94, r2, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'caif0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'erspan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_team\x00'}]}, 0x94}, 0x1, 0x0, 0x0, 0x8050}, 0x40051) socket$isdn(0x22, 0x3, 0x23) 08:26:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$SNDCTL_TMR_CONTINUE(r2, 0x5404) (async) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000000)={r0}) (async) write$nbd(r1, &(0x7f0000000100), 0x10) 08:26:33 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 55) 08:26:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x4) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'team_slave_0\x00', 0x2000}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000000)={r2}) write$nbd(r0, &(0x7f0000000100), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r3) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x4) (async) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'team_slave_0\x00', 0x2000}) (async) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000000)={r2}) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) [ 964.759099] FAULT_INJECTION: forcing a failure. [ 964.759099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 964.762640] FAULT_INJECTION: forcing a failure. [ 964.762640] name failslab, interval 1, probability 0, space 0, times 0 [ 964.771006] CPU: 1 PID: 22251 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 964.771014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.771017] Call Trace: [ 964.771033] dump_stack+0x1b2/0x281 [ 964.771048] should_fail.cold+0x10a/0x149 [ 964.771059] ? get_page_from_freelist+0xaf6/0x25a0 [ 964.771071] __alloc_pages_nodemask+0x22c/0x2720 [ 964.771088] ? lock_downgrade+0x740/0x740 [ 964.771099] ? page_outside_zone_boundaries+0x1db/0x310 [ 964.829054] ? __lock_acquire+0x5fc/0x3f20 [ 964.833275] ? preempt_count_add+0xaf/0x170 [ 964.837592] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 964.842433] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 964.847880] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 964.852897] ? __alloc_pages_nodemask+0x1a6e/0x2720 [ 964.857909] cache_grow_begin+0x91/0x700 [ 964.861966] ? fs_reclaim_release+0xd0/0x110 [ 964.866371] ? check_preemption_disabled+0x35/0x240 [ 964.871394] cache_alloc_refill+0x273/0x350 [ 964.875718] kmem_cache_alloc+0x333/0x3c0 [ 964.879858] getname_kernel+0x4e/0x340 [ 964.883749] kern_path+0x1b/0x40 [ 964.887115] lookup_bdev+0xc6/0x1c0 [ 964.890733] ? bd_acquire+0x440/0x440 [ 964.894527] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 964.899968] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 964.904975] blkdev_get_by_path+0x1b/0xa0 [ 964.909110] mount_bdev+0x4c/0x360 [ 964.912637] ? xfs_parseargs+0x1130/0x1130 [ 964.916856] mount_fs+0x92/0x2a0 [ 964.920207] vfs_kern_mount.part.0+0x5b/0x470 [ 964.924687] do_mount+0xe65/0x2a10 [ 964.928211] ? __do_page_fault+0x159/0xad0 [ 964.932426] ? retint_kernel+0x2d/0x2d [ 964.936296] ? copy_mount_string+0x40/0x40 [ 964.940510] ? memset+0x20/0x40 [ 964.943774] ? copy_mount_options+0x1fa/0x2f0 [ 964.948250] ? copy_mnt_ns+0xa30/0xa30 [ 964.952121] SyS_mount+0xa8/0x120 [ 964.955557] ? copy_mnt_ns+0xa30/0xa30 [ 964.959426] do_syscall_64+0x1d5/0x640 [ 964.963301] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 964.968475] RIP: 0033:0x7f100538b61a [ 964.972164] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 964.979852] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 964.987100] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 964.994349] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 965.001599] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 965.008847] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 965.016113] CPU: 0 PID: 22254 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 965.023994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.033348] Call Trace: [ 965.035938] dump_stack+0x1b2/0x281 [ 965.038567] XFS (loop0): unknown mount option [logbsize=]. [ 965.039562] should_fail.cold+0x10a/0x149 [ 965.039578] should_failslab+0xd6/0x130 [ 965.039589] __kmalloc+0x2c1/0x400 08:26:34 executing program 1: write$nbd(0xffffffffffffffff, 0x0, 0x0) 08:26:34 executing program 3: ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000000)=0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040), 0x10) 08:26:34 executing program 3: ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000000)=0x1) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) write$nbd(r0, &(0x7f0000000040), 0x10) [ 965.039598] ? __list_lru_init+0x67/0x710 [ 965.039610] __list_lru_init+0x67/0x710 [ 965.039625] sget_userns+0x504/0xc10 [ 965.039633] ? set_bdev_super+0x110/0x110 [ 965.039645] ? ns_test_super+0x50/0x50 [ 965.039655] ? set_bdev_super+0x110/0x110 [ 965.081027] ? ns_test_super+0x50/0x50 [ 965.084931] sget+0xd1/0x110 [ 965.087950] mount_bdev+0xcd/0x360 [ 965.091483] ? xfs_parseargs+0x1130/0x1130 [ 965.095712] mount_fs+0x92/0x2a0 [ 965.099087] vfs_kern_mount.part.0+0x5b/0x470 [ 965.103585] do_mount+0xe65/0x2a10 08:26:34 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x302}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x2}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$sequencer(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="05c914029207b010801809000206207f010000009205b0027e0604009403afc1ff6e0566058702f7798e1ced28d18a2c8b9ae0164ff4889b5ccd5f7567c6516e51c8c9676271249ee322e92d9b68e3a92caee260960d0b21443b62d8c19edf8b0eeba65f5bffde8913b07c9420f783d3b872a528405e747328cb1b7344efda829c0467a83167a2f4b61f0ea522a42c04bcf1db9c28a4049bd8e3701580ba1c0ff43263f339c5b80d89814cfe2882e0c21f2c2e28d5b37f30e93833b5"], 0x28) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) write$nbd(r1, 0x0, 0x0) [ 965.107123] ? __do_page_fault+0x159/0xad0 [ 965.111352] ? retint_kernel+0x2d/0x2d [ 965.115237] ? copy_mount_string+0x40/0x40 [ 965.119471] ? memset+0x20/0x40 [ 965.122747] ? copy_mount_options+0x1fa/0x2f0 [ 965.127245] ? copy_mnt_ns+0xa30/0xa30 [ 965.131139] SyS_mount+0xa8/0x120 [ 965.134676] ? copy_mnt_ns+0xa30/0xa30 [ 965.138573] do_syscall_64+0x1d5/0x640 [ 965.142463] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 965.147647] RIP: 0033:0x7f551d04761a [ 965.151353] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:26:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$SNDCTL_TMR_CONTINUE(r2, 0x5404) (async) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r3, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000000)={r0}) (async, rerun: 32) write$nbd(r1, &(0x7f0000000100), 0x10) [ 965.159059] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 965.166327] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 965.173598] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 965.180862] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 965.188130] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 08:26:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 57) 08:26:34 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 56) 08:26:34 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x302}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x2}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$sequencer(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="05c914029207b010801809000206207f010000009205b0027e0604009403afc1ff6e0566058702f7798e1ced28d18a2c8b9ae0164ff4889b5ccd5f7567c6516e51c8c9676271249ee322e92d9b68e3a92caee260960d0b21443b62d8c19edf8b0eeba65f5bffde8913b07c9420f783d3b872a528405e747328cb1b7344efda829c0467a83167a2f4b61f0ea522a42c04bcf1db9c28a4049bd8e3701580ba1c0ff43263f339c5b80d89814cfe2882e0c21f2c2e28d5b37f30e93833b5"], 0x28) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, 0x0, 0x0) 08:26:34 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/509], 0xe4) 08:26:34 executing program 3: ioctl$SNDCTL_SYNTH_MEMAVL(0xffffffffffffffff, 0xc004510e, &(0x7f0000000000)=0x1) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000040), 0x10) 08:26:34 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="67446698000000008010aa4a06f4740f80f9e7c796e4a8ca37dafad1945a1523836d105239adff8a56e4f0b07728c8573a94b7f4b07b2dcde47c96a0e02454206cd6967ccf91f1116a4f24ffd5a5bb5b618f5ef30c6d65606984771b1d847849a236f2b0f477b4330af825537d49f5ffc20c40d84a5e650530d249bb90a36e582b6727d321653af9dc21ae49bf1d540e9af52d1cda6a2a5f0304c1f44ca9ddab385a719ac803bd5da33ba76a104941d25706f64b75d1ada70531610ba66225c57dcf2571a63f232f36d200000000000063587fb1e4a72ba34e001c0406883e40dd54fb804088d15cf1ce7d8229ad3dccfc9c05adde394860460e0e083ef324580e951cc4a4eae3e9faa9861404dd0c5075c81a8131f531ab8ff0f1a1def1ddf02caa0915cca1806782550804b988d4d8000000000000000000eef38b59a7e516d90a55ce0085b8b3eb1f435b8e1f7e772b19d5704387374a1887e22a8a6bc47603e1161f55a3c50b0128687475fdc433946c0a7bbc99259c6631a9a95789a1508e98c929e44deaf5b89802b1539fc79d9e94a3105b2209854d4ef4118cb3ae60ca30c92d51b0022b28b4138f7239a642fac2ea0e2396954d4debe82c86bd988676ea40be9244a93f0943aa5e9eecd7797eb3e470a9530d0c939a08a82d187222bb3b36f52ffc7caa40ca2fd4b5fa2575449e00"/509], 0xe4) 08:26:34 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) 08:26:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x1407, 0x100, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x58}}, 0x4044) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:34 executing program 1: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x302}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x2}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r2, &(0x7f0000000740)=""/4096, 0x1000) write$sequencer(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="05c914029207b010801809000206207f010000009205b0027e0604009403afc1ff6e0566058702f7798e1ced28d18a2c8b9ae0164ff4889b5ccd5f7567c6516e51c8c9676271249ee322e92d9b68e3a92caee260960d0b21443b62d8c19edf8b0eeba65f5bffde8913b07c9420f783d3b872a528405e747328cb1b7344efda829c0467a83167a2f4b61f0ea522a42c04bcf1db9c28a4049bd8e3701580ba1c0ff43263f339c5b80d89814cfe2882e0c21f2c2e28d5b37f30e93833b5"], 0x28) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async) write$nbd(r1, 0x0, 0x0) [ 965.362836] FAULT_INJECTION: forcing a failure. [ 965.362836] name failslab, interval 1, probability 0, space 0, times 0 [ 965.368520] FAULT_INJECTION: forcing a failure. [ 965.368520] name failslab, interval 1, probability 0, space 0, times 0 [ 965.413848] CPU: 0 PID: 22318 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 965.421751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.431184] Call Trace: [ 965.433770] dump_stack+0x1b2/0x281 [ 965.437405] should_fail.cold+0x10a/0x149 [ 965.441564] should_failslab+0xd6/0x130 [ 965.445541] __kmalloc+0x2c1/0x400 [ 965.449094] ? __list_lru_init+0x67/0x710 [ 965.453243] __list_lru_init+0x67/0x710 [ 965.457219] sget_userns+0x4e4/0xc10 [ 965.460929] ? set_bdev_super+0x110/0x110 [ 965.465079] ? ns_test_super+0x50/0x50 [ 965.468964] ? set_bdev_super+0x110/0x110 [ 965.473100] ? ns_test_super+0x50/0x50 [ 965.476977] sget+0xd1/0x110 [ 965.480001] mount_bdev+0xcd/0x360 [ 965.483540] ? xfs_parseargs+0x1130/0x1130 [ 965.487775] mount_fs+0x92/0x2a0 [ 965.491150] vfs_kern_mount.part.0+0x5b/0x470 [ 965.495634] do_mount+0xe65/0x2a10 [ 965.499175] ? __do_page_fault+0x159/0xad0 [ 965.503406] ? retint_kernel+0x2d/0x2d [ 965.507811] ? copy_mount_string+0x40/0x40 [ 965.512035] ? memset+0x20/0x40 [ 965.515303] ? copy_mount_options+0x1fa/0x2f0 [ 965.519786] ? copy_mnt_ns+0xa30/0xa30 [ 965.523663] SyS_mount+0xa8/0x120 [ 965.527115] ? copy_mnt_ns+0xa30/0xa30 [ 965.530999] do_syscall_64+0x1d5/0x640 [ 965.534890] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 965.540068] RIP: 0033:0x7f551d04761a [ 965.543857] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 965.551907] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a 08:26:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x1407, 0x100, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x58}}, 0x4044) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) write$nbd(r0, &(0x7f0000000100), 0x10) 08:26:34 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) read$sequencer(r0, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) ioctl$SNDCTL_SEQ_NRMIDIS(r0, 0x8004510b, &(0x7f0000000000)) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/509], 0xe4) [ 965.559170] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 965.566445] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 965.573711] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 965.580982] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 965.612378] CPU: 1 PID: 22323 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 965.620288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.629697] Call Trace: [ 965.632287] dump_stack+0x1b2/0x281 [ 965.635920] should_fail.cold+0x10a/0x149 [ 965.640067] should_failslab+0xd6/0x130 [ 965.644039] __kmalloc_track_caller+0x2bc/0x400 [ 965.648704] ? xfs_parseargs+0xbc/0x1130 [ 965.652765] kstrndup+0x4c/0xe0 [ 965.656038] xfs_parseargs+0xbc/0x1130 [ 965.659927] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 965.665027] ? suffix_kstrtoint.constprop.0+0x1d0/0x1d0 [ 965.670392] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 965.675836] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 965.680849] ? init_timer_key+0x68/0x300 [ 965.684917] xfs_fs_fill_super+0x53a/0x1380 [ 965.689369] mount_bdev+0x2b3/0x360 [ 965.692996] ? xfs_parseargs+0x1130/0x1130 [ 965.697231] mount_fs+0x92/0x2a0 [ 965.700599] vfs_kern_mount.part.0+0x5b/0x470 [ 965.705094] do_mount+0xe65/0x2a10 [ 965.708636] ? __do_page_fault+0x159/0xad0 [ 965.712866] ? retint_kernel+0x2d/0x2d [ 965.716755] ? copy_mount_string+0x40/0x40 [ 965.720996] ? memset+0x20/0x40 [ 965.724274] ? copy_mount_options+0x1fa/0x2f0 [ 965.728769] ? copy_mnt_ns+0xa30/0xa30 [ 965.732658] SyS_mount+0xa8/0x120 [ 965.736115] ? copy_mnt_ns+0xa30/0xa30 [ 965.740012] do_syscall_64+0x1d5/0x640 [ 965.743993] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 965.749178] RIP: 0033:0x7f100538b61a [ 965.752972] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:26:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 58) 08:26:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) (async) 08:26:35 executing program 0: syz_mount_image$xfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)={[{@logbsize}]}) (fail_nth: 57) 08:26:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) socketpair(0x22, 0x3, 0xffffff7f, &(0x7f0000000040)) syz_mount_image$befs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x81, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000100)="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", 0x1000, 0xbc7}, {&(0x7f0000001100)="848948afcfa85a1739256bd0c1dca6c624460069b0b7e48562fd71826d2aa5622cc85dac5f93537adb57b3da8e7aed34301eb1c764bb7c865523f75cfa45890caa352b0086bf39d6cf41c3e79fc21932ab601fa6c9cce3fe44a1ab2ddcd9e66dea9d7a1050c5f2f046fe9cab3ef1916a7b6798fffaafe3cf26fca55b5dee02b665a63a749c", 0x85, 0x3}, {&(0x7f00000011c0)="85e2c562a1d5c84f9a78586a6a3c6a9b66874653ee2d45194ea8200af9ae5c6a91f374a1878d3f03bf16eb2727d6ef3475fff24bff4e3533c37af1fb494fe167198dce8a377802e82fbf825006f89fd45f164e0702bd7f24c767dfb017d2fc123cdd663079454493b229e5f1025cf08a973f45da0d521695ca42f0d9376818aa72093e2791514fdef860cec4cd17e1e2e108290f92b4fe2f17718ff7eec2f8d3aeb5c9ee6f5b8b28241c231b1fd1f85e0320291fbb4cc3e777464acb39f53c09b35cadc70a1fae8f22482abb859eedab6a3f10bf962efb69cf58a0da39d55ac0a6", 0xe1, 0x4}], 0x4040, &(0x7f0000001340)=ANY=[@ANYBLOB="2c255e2c686173682c7375626a5f726f6c653d2f231c5c2b3a2c0800252c00"]) 08:26:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x28200, 0x0) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) write$nbd(r0, &(0x7f0000000100), 0x10) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={0x3}) 08:26:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) (rerun: 32) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x1407, 0x100, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x58}}, 0x4044) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) (async) write$nbd(r0, &(0x7f0000000100), 0x10) [ 965.760685] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 965.767978] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 965.775249] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 965.782516] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 965.789786] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 08:26:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x28200, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) (async, rerun: 32) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (rerun: 32) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) write$nbd(r0, &(0x7f0000000100), 0x10) (async) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={0x3}) 08:26:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) memfd_create(&(0x7f0000000040)='\x00', 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 965.940235] befs: Unrecognized mount option "%^" or missing value [ 965.966489] befs: (loop1): cannot parse mount options 08:26:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) (async, rerun: 32) socketpair(0x22, 0x3, 0xffffff7f, &(0x7f0000000040)) (async, rerun: 32) syz_mount_image$befs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x81, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000100)="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", 0x1000, 0xbc7}, {&(0x7f0000001100)="848948afcfa85a1739256bd0c1dca6c624460069b0b7e48562fd71826d2aa5622cc85dac5f93537adb57b3da8e7aed34301eb1c764bb7c865523f75cfa45890caa352b0086bf39d6cf41c3e79fc21932ab601fa6c9cce3fe44a1ab2ddcd9e66dea9d7a1050c5f2f046fe9cab3ef1916a7b6798fffaafe3cf26fca55b5dee02b665a63a749c", 0x85, 0x3}, {&(0x7f00000011c0)="85e2c562a1d5c84f9a78586a6a3c6a9b66874653ee2d45194ea8200af9ae5c6a91f374a1878d3f03bf16eb2727d6ef3475fff24bff4e3533c37af1fb494fe167198dce8a377802e82fbf825006f89fd45f164e0702bd7f24c767dfb017d2fc123cdd663079454493b229e5f1025cf08a973f45da0d521695ca42f0d9376818aa72093e2791514fdef860cec4cd17e1e2e108290f92b4fe2f17718ff7eec2f8d3aeb5c9ee6f5b8b28241c231b1fd1f85e0320291fbb4cc3e777464acb39f53c09b35cadc70a1fae8f22482abb859eedab6a3f10bf962efb69cf58a0da39d55ac0a6", 0xe1, 0x4}], 0x4040, &(0x7f0000001340)=ANY=[@ANYBLOB="2c255e2c686173682c7375626a5f726f6c653d2f231c5c2b3a2c0800252c00"]) 08:26:35 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8bdca76049df0889bc977137bac3eb2c00180000800000f46dd8c6d9ad5670155505bd2b23924ce459e468814658ae972eb3e1b00d1dced8cd7f6a90e068ece5e55f6d7de7337baae0ae4cf9fa7fdc68efab000000"], 0x10) [ 966.005740] FAULT_INJECTION: forcing a failure. [ 966.005740] name failslab, interval 1, probability 0, space 0, times 0 [ 966.014763] FAULT_INJECTION: forcing a failure. [ 966.014763] name failslab, interval 1, probability 0, space 0, times 0 [ 966.048518] CPU: 0 PID: 22382 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 966.056438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.065794] Call Trace: [ 966.068392] dump_stack+0x1b2/0x281 [ 966.072028] should_fail.cold+0x10a/0x149 [ 966.076289] should_failslab+0xd6/0x130 [ 966.080263] __kmalloc+0x2c1/0x400 [ 966.083803] ? register_shrinker+0x1ab/0x220 [ 966.088211] register_shrinker+0x1ab/0x220 [ 966.092450] sget_userns+0x9aa/0xc10 [ 966.096167] ? set_bdev_super+0x110/0x110 [ 966.100323] ? ns_test_super+0x50/0x50 [ 966.104206] ? set_bdev_super+0x110/0x110 [ 966.108347] ? ns_test_super+0x50/0x50 [ 966.112232] sget+0xd1/0x110 [ 966.115242] mount_bdev+0xcd/0x360 [ 966.118771] ? xfs_parseargs+0x1130/0x1130 [ 966.123001] mount_fs+0x92/0x2a0 [ 966.126391] vfs_kern_mount.part.0+0x5b/0x470 [ 966.130882] do_mount+0xe65/0x2a10 [ 966.134437] ? __do_page_fault+0x159/0xad0 [ 966.138662] ? retint_kernel+0x2d/0x2d [ 966.142538] ? copy_mount_string+0x40/0x40 [ 966.146767] ? memset+0x20/0x40 [ 966.150041] ? copy_mount_options+0x1fa/0x2f0 [ 966.154534] ? copy_mnt_ns+0xa30/0xa30 [ 966.158420] SyS_mount+0xa8/0x120 [ 966.161953] ? copy_mnt_ns+0xa30/0xa30 [ 966.165832] do_syscall_64+0x1d5/0x640 [ 966.169716] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 966.174904] RIP: 0033:0x7f551d04761a [ 966.178617] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 966.186323] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a 08:26:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) memfd_create(&(0x7f0000000040)='\x00', 0x1) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vxcan0\x00'}) [ 966.193590] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 966.200852] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 966.208134] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 966.215391] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 966.222672] CPU: 1 PID: 22384 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 966.230553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.239902] Call Trace: [ 966.242489] dump_stack+0x1b2/0x281 [ 966.246119] should_fail.cold+0x10a/0x149 [ 966.250272] should_failslab+0xd6/0x130 [ 966.254250] __kmalloc+0x2c1/0x400 [ 966.257788] ? register_shrinker+0x1ab/0x220 [ 966.262205] register_shrinker+0x1ab/0x220 [ 966.266459] sget_userns+0x9aa/0xc10 [ 966.270178] ? set_bdev_super+0x110/0x110 [ 966.271628] ------------[ cut here ]------------ [ 966.274324] ? ns_test_super+0x50/0x50 [ 966.279061] WARNING: CPU: 0 PID: 22382 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 966.282923] ? set_bdev_super+0x110/0x110 [ 966.290771] Kernel panic - not syncing: panic_on_warn set ... [ 966.290771] [ 966.294901] ? ns_test_super+0x50/0x50 [ 966.306099] sget+0xd1/0x110 [ 966.309103] mount_bdev+0xcd/0x360 [ 966.312625] ? xfs_parseargs+0x1130/0x1130 [ 966.316843] mount_fs+0x92/0x2a0 [ 966.320199] vfs_kern_mount.part.0+0x5b/0x470 [ 966.324678] do_mount+0xe65/0x2a10 [ 966.328228] ? __do_page_fault+0x159/0xad0 [ 966.332444] ? retint_kernel+0x2d/0x2d [ 966.336314] ? copy_mount_string+0x40/0x40 [ 966.340529] ? memset+0x20/0x40 [ 966.343788] ? copy_mount_options+0x1fa/0x2f0 [ 966.348263] ? copy_mnt_ns+0xa30/0xa30 [ 966.352134] SyS_mount+0xa8/0x120 [ 966.355566] ? copy_mnt_ns+0xa30/0xa30 [ 966.359436] do_syscall_64+0x1d5/0x640 [ 966.363306] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 966.368477] RIP: 0033:0x7f100538b61a [ 966.372167] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 966.379857] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 966.387106] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 966.394359] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 966.401606] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 966.408857] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 966.416150] CPU: 0 PID: 22382 Comm: syz-executor.4 Not tainted 4.14.277-syzkaller #0 [ 966.422734] befs: Unrecognized mount option "%^" or missing value [ 966.424066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.439622] Call Trace: [ 966.442206] dump_stack+0x1b2/0x281 [ 966.445832] panic+0x1f9/0x42d [ 966.449017] ? add_taint.cold+0x16/0x16 [ 966.452991] ? kill_block_super+0xbe/0xe0 [ 966.457135] ? __warn.cold+0x5/0x44 [ 966.460762] ? kill_block_super+0xbe/0xe0 [ 966.464904] __warn.cold+0x20/0x44 [ 966.465255] befs: (loop1): cannot parse mount options [ 966.468432] ? ist_end_non_atomic+0x10/0x10 [ 966.468444] ? kill_block_super+0xbe/0xe0 [ 966.468459] report_bug+0x208/0x250 [ 966.485668] do_error_trap+0x195/0x2d0 [ 966.489550] ? math_error+0x2d0/0x2d0 [ 966.493353] ? retint_kernel+0x2d/0x2d 08:26:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000700)='/proc/keys\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x28200, 0x0) (async) read$sequencer(r1, &(0x7f0000000740)=""/4096, 0x1000) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) (async) write$nbd(r0, &(0x7f0000000100), 0x10) (async) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000000)={0x3}) [ 966.497259] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 966.502108] invalid_op+0x1b/0x40 [ 966.505558] RIP: 0010:kill_block_super+0xbe/0xe0 [ 966.510297] RSP: 0018:ffff888079ebfbc8 EFLAGS: 00010246 [ 966.515653] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000861f000 [ 966.522915] RDX: 0000000000040000 RSI: ffffffff818759be RDI: ffff88808fecfcb0 [ 966.530178] RBP: ffff8880a660cec0 R08: ffffffff8b9d2758 R09: 0000000000000001 [ 966.537441] R10: 0000000000000000 R11: ffff8880a884a500 R12: ffff88808fecf800 [ 966.544708] R13: ffffffff89246dd0 R14: ffffffff88f45500 R15: dffffc0000000000 [ 966.551992] ? kill_block_super+0xbe/0xe0 [ 966.556148] ? kill_block_super+0xbe/0xe0 [ 966.560299] deactivate_locked_super+0x6c/0xd0 [ 966.564877] sget_userns+0x9c4/0xc10 [ 966.568586] ? set_bdev_super+0x110/0x110 [ 966.572730] ? ns_test_super+0x50/0x50 [ 966.576623] ? set_bdev_super+0x110/0x110 [ 966.580765] ? ns_test_super+0x50/0x50 [ 966.584647] sget+0xd1/0x110 [ 966.585861] ------------[ cut here ]------------ [ 966.587668] mount_bdev+0xcd/0x360 [ 966.587681] ? xfs_parseargs+0x1130/0x1130 [ 966.592473] WARNING: CPU: 1 PID: 22384 at fs/block_dev.c:1838 blkdev_put+0x42a/0x4c0 [ 966.595981] mount_fs+0x92/0x2a0 [ 966.600279] Modules linked in: [ 966.608146] vfs_kern_mount.part.0+0x5b/0x470 [ 966.614660] do_mount+0xe65/0x2a10 [ 966.619126] CPU: 1 PID: 22384 Comm: syz-executor.0 Not tainted 4.14.277-syzkaller #0 [ 966.622645] ? __do_page_fault+0x159/0xad0 [ 966.630494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.634717] ? retint_kernel+0x2d/0x2d [ 966.644050] task: ffff88808ce4c6c0 task.stack: ffff88809da18000 [ 966.644062] RIP: 0010:blkdev_put+0x42a/0x4c0 [ 966.647944] ? copy_mount_string+0x40/0x40 [ 966.653990] RSP: 0018:ffff88809da1fc88 EFLAGS: 00010246 [ 966.658391] ? memset+0x20/0x40 [ 966.667929] ? copy_mount_options+0x1fa/0x2f0 [ 966.671178] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90005c0a000 [ 966.671185] RDX: 0000000000040000 RSI: ffffffff8194056a RDI: ffffffff88e12744 [ 966.675660] ? copy_mnt_ns+0xa30/0xa30 [ 966.682903] RBP: ffff8880b193b040 R08: ffffffff8b9b7958 R09: 000000000004018a [ 966.690156] SyS_mount+0xa8/0x120 [ 966.694015] R10: ffff88808ce4cf70 R11: ffff88808ce4c6c0 R12: 0000000000000083 [ 966.701268] ? copy_mnt_ns+0xa30/0xa30 [ 966.704693] R13: ffff8880b193b058 R14: ffff8880b193b0e8 R15: ffff8880b193b158 [ 966.711946] do_syscall_64+0x1d5/0x640 [ 966.715806] FS: 00007f1003cff700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 [ 966.723058] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 966.726913] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 966.735116] RIP: 0033:0x7f551d04761a [ 966.740275] CR2: 00007ffeafa75897 CR3: 00000000a8f90000 CR4: 00000000003406e0 [ 966.746147] RSP: 002b:00007f551b9baf88 EFLAGS: 00000206 [ 966.749834] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 966.757077] ORIG_RAX: 00000000000000a5 [ 966.757085] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f551d04761a [ 966.762420] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 966.762425] Call Trace: [ 966.769855] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f551b9bafe0 [ 966.773813] mount_bdev+0x1e5/0x360 [ 966.781212] RBP: 00007f551b9bb020 R08: 00007f551b9bb020 R09: 0000000020000140 [ 966.788476] ? xfs_parseargs+0x1130/0x1130 [ 966.791037] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 966.798475] mount_fs+0x92/0x2a0 [ 966.802074] R13: 00000000200001c0 R14: 00007f551b9bafe0 R15: 0000000020000280 [ 966.809331] vfs_kern_mount.part.0+0x5b/0x470 [ 966.835868] do_mount+0xe65/0x2a10 [ 966.839398] ? __do_page_fault+0x159/0xad0 [ 966.843618] ? retint_kernel+0x2d/0x2d [ 966.847495] ? copy_mount_string+0x40/0x40 [ 966.851718] ? memset+0x20/0x40 [ 966.854982] ? copy_mount_options+0x1fa/0x2f0 [ 966.859464] ? copy_mnt_ns+0xa30/0xa30 [ 966.863355] SyS_mount+0xa8/0x120 [ 966.866792] ? copy_mnt_ns+0xa30/0xa30 [ 966.870713] do_syscall_64+0x1d5/0x640 [ 966.874591] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 966.879852] RIP: 0033:0x7f100538b61a [ 966.883546] RSP: 002b:00007f1003cfef88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 966.891238] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f100538b61a [ 966.898491] RDX: 0000000020000140 RSI: 00000000200001c0 RDI: 00007f1003cfefe0 [ 966.905742] RBP: 00007f1003cff020 R08: 00007f1003cff020 R09: 0000000020000140 [ 966.912995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000140 [ 966.920247] R13: 00000000200001c0 R14: 00007f1003cfefe0 R15: 0000000020000280 [ 966.927506] Code: ff ff 4c 89 f7 e8 07 f9 ea ff e9 bb fc ff ff e8 fd f8 ea ff e9 14 fd ff ff 4c 89 f7 e8 f0 f8 ea ff e9 3a fd ff ff e8 36 41 c1 ff <0f> 0b e9 a5 fc ff ff e8 2a 41 c1 ff 0f 0b e9 fc fc ff ff e8 3e [ 966.946713] ---[ end trace 2cc21762bb7b28df ]--- [ 966.951679] Kernel Offset: disabled [ 966.955358] Rebooting in 86400 seconds..