d686b357576d8e1151ba4fed7659bd4e4197dfe27323cee26a527efa922df37ae7ce89505005fa22d55672286e798513f78a8231d3cb92401a48214a9bb4ca847b809c8a9605bbc98ed1a126ae9d729dbe3a570f0d574b0b711b0fd820ed3494df41e511c9373523ba8b7f28660a80eb011e05d38a373cebba5ed4ee02e75b7835179d8e0b8d0ed73b5eb7d0d3fdbdd2e6193b913470977be414994efd99f385b6644723bb1d74b1288794987db66d063e73030e640f788540855894061518529ffc8b5a4fedee43e0889a66349732d3bcfddb8106998014b4499c8a934b1430a7f9587261c706fa1e26760cad875744ee830904499475014ecd6be1633dda0970449ac082e69d6396db1b87a64223dcf1d25f894aaa49ab49b889a85a7eb57c5ce6177a5b35c75f0f8cfce91726d7aaa82d881d4977417197ee66376edcf7e94a0f0f6c2fcf8e5d155b435652d99fa0967bde85a70de74f240d3c05e89c9748b4968db9adbd2040c7e46fa5d8b1fa90428460bd25b7699cd1c2b801a5983c79cbb8b3d17e1c794881586020f85dc7cb280230aef28eb53499d2ac513d0fba2e45880e340ca1e30f26c5546c3b2404f7cc22d05bbf2064b680e82cc3b9aa761e7610fad0f380dea2800be6748977211c36fb82f0b45f959c3db26cc02baa92652eb47f78b6f18d52b6d110b514d96bc6f73a089ab17a5b4d3245528661d38736115e31cb88254217a9aee4ed1c73c3c75dcc5686c3110f464a8ac7f78b197c6c9d4f9bd5859caa93a689fe126fcc411e327c90f7c361da22129c4ecc933c0824cc63cdf654f917f3bc966baa76306ca0a2d42d6b4584096856de2481cdb40175274ad236f3351e390974fbb25fa6ebd9e0947801dc7b9f8a9245de02d2cc2be15eccd4b0c31fd93ef344eb267b2bab34044ee9869c105c9390a2a2fcd5c3e2434cc48cc6b4ad5743063bf95befafad78699c981b8c58ac542a369d755970b8e339b2349993f4431f42001093ce3995773d7be48407306c990055f9e95ce5f05734d48a8d7dc336d0fbf4833fbee97d787f6945b3e84d6c726650200e4f085e212b3f5ec4b7262b83d5c7ded03cced9c6aa146c96da01aa829c0243ea0234c662c3e826a574b155f0cee4f1fc8fbded386a78d1a26e05b15fdc4314915e84fce9178aeff1bec95cf94988a8fb53eb80f7a7d568168bcafb65c02777cfe75139dce53d94b051e3e89f437265cac3f191f34886d41de13ce168f2931c5531142347bff80ed437a3dbaf178f2ff528aa76d40fe6ea1e270491712d5a7b59037315f64314ba19562b6d72efd4f9f4d6746479be2b4a34d39cfc7c504241e1f787f8620ff75545d8ac9974389adb76275400fb6799705a51fc9115e1fb01b62c0bb36130f04d62a18178eef16176f24724b1185964837c1c33f8cfa3a746c04f7817c2018d9e5255cb5c9338bbbd5b3253002b44fc9a1de41bddab6b028b977ab3ed50d7a4e56017b9a32b8e8376cd622351fd5e46d9db04094d93a33ba41ca721231bedeaf18793fc586831edf8296bc94bf3242024a06c19178e3f9b0e09cfdb219255d9a0f13ccde1a513a4149443aa1897a83bc457c26129332a0b6af0e43f5e2e43e35c5aba8cd088f2f0a58c21733255c44fefd23512c5ed4b655bc23131ce4238dcdd3f183ef74d079804f2897014b7cb717f009e5f93c45014", 0x1000, 0x3ff}, {&(0x7f0000003740)="3d69f2d606f14bf56988e360d8f687f932c178372bba169cae6852365fc83c4933792b873b8559cd227de1d73fb8af1977ea72fe152690945e4bdde52a37297476ff0a9c12366ffdf1815f2a6619a92bab5e34ae5c7a96022086c9d6301600", 0x5f, 0x6}], 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:55 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$negate(0xd, r1, 0x80, r5) keyctl$search(0xa, r5, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x2}, r4) 22:38:55 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) bind$netrom(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) 22:38:55 executing program 0: syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba6169927", 0x91, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529af247112", 0x26, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbfd58a37", 0x3d, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b07566578c90b5cdc1ef350a4393ebdf766b2707558a03d2c4082114f266785f6021755ba406282d18a77f73293254ea9d814bb3a41fc", 0xd7, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) 22:38:55 executing program 3: setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x81) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:55 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$negate(0xd, r1, 0x80, r5) keyctl$search(0xa, r5, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x2}, r4) 22:38:55 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={r1}) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$set_timeout(0xf, r2, 0x7) 22:38:55 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10bd435ffab8fc4080bde9b8a22219e264220020b59a2e07723af77eb118236ee98dfa9aa289d8261c73358fa590b6d81798e809c6b17db9caa0e63a5de1d3"}, 0x48, r1) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000)=0x100, 0x4) keyctl$revoke(0x3, r2) 22:38:55 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={r1}) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$set_timeout(0xf, r2, 0x7) 22:38:55 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$negate(0xd, r1, 0x80, r5) keyctl$search(0xa, r5, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x2}, r4) 22:38:55 executing program 3: setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x81) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r6, 0x890c, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0xffffffc0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 22:38:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x4, &(0x7f00000037c0)=[{&(0x7f00000015c0)="fa4e45e82311fae93e2e3770e0147bfb819c8ee015e6e08473ae643242ebe5fda70ba69716c609f733cc2aff7bc7f03939260e4e137bafbe98cee16b1b8422b739b37f54b08b4c2a021ec99e6be2f914fd3a9cd6f7b1d73746511d5c59d0bd0a3cbec8449657e4263cc062a6d51994caabe82e3689068a7995775511", 0x7c, 0x4}, {&(0x7f0000001740)="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", 0x1000, 0x8ba}, {&(0x7f0000002740)="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", 0x1000, 0x3ff}, {&(0x7f0000003740)="3d69f2d606f14bf56988e360d8f687f932c178372bba169cae6852365fc83c4933792b873b8559cd227de1d73fb8af1977ea72fe152690945e4bdde52a37297476ff0a9c12366ffdf1815f2a6619a92bab5e34ae5c7a96022086c9d6301600", 0x5f, 0x6}], 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x2558, 0x4, &(0x7f00000037c0)=[{&(0x7f00000015c0)="fa4e45e82311fae93e2e3770e0147bfb819c8ee015e6e08473ae643242ebe5fda70ba69716c609f733cc2aff7bc7f03939260e4e137bafbe98cee16b1b8422b739b37f54b08b4c2a021ec99e6be2f914fd3a9cd6f7b1d73746511d5c59d0bd0a3cbec8449657e4263cc062a6d51994caabe82e3689068a7995775511", 0x7c, 0x4}, {&(0x7f0000001740)="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", 0x1000, 0x8ba}, {&(0x7f0000002740)="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", 0x1000, 0x3ff}, {&(0x7f0000003740)="3d69f2d606f14bf56988e360d8f687f932c178372bba169cae6852365fc83c4933792b873b8559cd227de1d73fb8af1977ea72fe152690945e4bdde52a37297476ff0a9c12366ffdf1815f2a6619a92bab5e34ae5c7a96022086c9d6301600", 0x5f, 0x6}], 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:55 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={r1}) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$set_timeout(0xf, r2, 0x7) 22:38:55 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$negate(0xd, r1, 0x80, r5) 22:38:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r6, 0x890c, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0xffffffc0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 22:38:55 executing program 3: setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x81) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) [ 859.887585] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={r1}) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) 22:38:56 executing program 3: setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x81) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r6, 0x890c, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0xffffffc0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$negate(0xd, r1, 0x80, r5) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={r1}) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)) 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:56 executing program 3: setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r7 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r7) add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$negate(0xd, r1, 0x80, r5) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={r1}) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) 22:38:56 executing program 3: setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) r6 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r6) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$negate(0xd, r1, 0x80, r5) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) 22:38:56 executing program 3: setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x3, &(0x7f00000037c0)=[{&(0x7f00000015c0)="fa4e45e82311fae93e2e3770e0147bfb819c8ee015e6e08473ae643242ebe5fda70ba69716c609f733cc2aff7bc7f03939260e4e137bafbe98cee16b1b8422b739b37f54b08b4c2a021ec99e6be2f914fd3a9cd6f7b1d73746511d5c59d0bd0a3cbec8449657e4263cc062a6d51994caabe82e3689068a7995775511", 0x7c, 0x4}, {&(0x7f0000001740)="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", 0x1000, 0x8ba}, {&(0x7f0000002740)="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", 0x1000, 0x3ff}], 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) 22:38:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x81) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) 22:38:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x81) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) r7 = add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r8 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r8, r7, r9, 0x1) [ 860.314278] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x2, &(0x7f00000037c0)=[{&(0x7f00000015c0)="fa4e45e82311fae93e2e3770e0147bfb819c8ee015e6e08473ae643242ebe5fda70ba69716c609f733cc2aff7bc7f03939260e4e137bafbe98cee16b1b8422b739b37f54b08b4c2a021ec99e6be2f914fd3a9cd6f7b1d73746511d5c59d0bd0a3cbec8449657e4263cc062a6d51994caabe82e3689068a7995775511", 0x7c, 0x4}, {&(0x7f0000001740)="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", 0x1000, 0x8ba}], 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) connect$netrom(r3, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 22:38:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x81) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r6 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r6) r7 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r7) add_key$fscrypt_v1(&(0x7f0000000480), &(0x7f00000004c0)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "1665f909946e7b43fd811004ea74254f04824645a34c31c98a24c1f2f8cab662dc8dbdee9f0d32db696d708a0a83b9c49dc476195d519b68e45825f2545193f4", 0x27}, 0x48, r5) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x81) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) r6 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r6) 22:38:56 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) 22:38:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) [ 860.461138] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x1, &(0x7f00000037c0)=[{&(0x7f00000015c0)="fa4e45e82311fae93e2e3770e0147bfb819c8ee015e6e08473ae643242ebe5fda70ba69716c609f733cc2aff7bc7f03939260e4e137bafbe98cee16b1b8422b739b37f54b08b4c2a021ec99e6be2f914fd3a9cd6f7b1d73746511d5c59d0bd0a3cbec8449657e4263cc062a6d51994caabe82e3689068a7995775511", 0x7c, 0x4}], 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:56 executing program 2: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 22:38:56 executing program 2: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r3) keyctl$set_timeout(0xf, r3, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 22:38:56 executing program 3: openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) [ 860.577914] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:56 executing program 2: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r3) keyctl$set_timeout(0xf, r3, 0x1) 22:38:56 executing program 3: openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r3, 0x1) 22:38:56 executing program 3: openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:56 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) [ 860.732402] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:56 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) 22:38:56 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r3) keyctl$set_timeout(0xf, r3, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) 22:38:56 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r3) keyctl$set_timeout(0xf, r3, 0x1) 22:38:56 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:56 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, 0x0) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r3, 0x1) 22:38:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x1) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:57 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x1) 22:38:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{}, {0x5, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {0x0, 0xf1}, 0x0, 0x5, 0x1f}) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x1) 22:38:57 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {}, 0x0, 0x5, 0x1f}) 22:38:57 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) [ 861.326571] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x1) 22:38:57 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}, {}, 0x0, 0x0, 0x1f}) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}}) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 4: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 861.450185] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 3: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:57 executing program 4: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 861.577011] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:57 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:38:57 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 4: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:57 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:38:57 executing program 1: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 861.683315] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 861.707866] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:38:57 executing program 4: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:57 executing program 0: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x1) 22:38:57 executing program 1: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 4: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 1: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:57 executing program 1: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 0: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r2, 0x1) [ 861.816472] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 861.845033] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:38:57 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:57 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:57 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:57 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) [ 861.935126] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 861.970643] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:38:58 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 862.039520] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(0x0, &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) [ 862.175575] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 862.311006] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 0: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 2: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) [ 862.513023] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:58 executing program 0: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 2: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:58 executing program 0: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:58 executing program 2: connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) [ 862.644847] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x1) 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) 22:38:58 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400"}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x0) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 862.856391] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:58 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) [ 862.996140] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 862.997348] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 1: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x1) 22:38:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}]}) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) [ 863.199554] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 863.227070] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:38:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:38:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}]}) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) [ 863.480284] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:38:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 863.582125] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:38:59 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @empty, 'veth1_to_bridge\x00'}}, 0x1e) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) [ 863.655727] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 863.687381] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:38:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}]}) 22:38:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:59 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:38:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) [ 863.886626] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, 0x0, 0x0) 22:39:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}]}) 22:39:00 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 863.951980] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 864.080898] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:39:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) 22:39:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) [ 864.135253] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 864.151960] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 864.266721] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 1: accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r1) keyctl$unlink(0x9, r2, r0) keyctl$set_timeout(0xf, 0x0, 0x1) 22:39:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}]}) 22:39:00 executing program 2: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 22:39:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 864.381269] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 864.393996] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:39:00 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000600)='pkcs7_test\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="ec932d147ca9dd5535f087cf45e84717024e903e77754bd9362db1db87dd5e060f30f8973428ff9a58e00d6482163d5e692f49b830627537d3b96bc6fb7db4cb45c0d2002dbbda7418caa4a7fb12214161bbd806ec9b9157b237bd20c48ca80f4601decfb91a335de7c52145e416776baa4d225ccf7b6f83bb76d8ed21cdc8fceacea7ffdf5846810a5b1eac719cef8e1465100c529f24b10a071d2187858a26d8cd7ac36d994f6124ab3cac9b56ff10b2c99333a1bdae8c2ea06da826ac2a68ce34a0a543a0", 0xc6, r2) keyctl$unlink(0x9, r3, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10ad435ffab8fc405034383af77eb1181d6ee98dfa9aa2f4b9e63a5de1d30031000000000000000000000000000000000000e400", 0x1}, 0x48, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) keyctl$set_timeout(0xf, r4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000580)=0x3, &(0x7f00000005c0)=0x4) r5 = request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='fscrypt:', r1) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a43a43001d37b276125e94f43fbc410dd0da81762afa0c2845a0b7598fd69321b7839df5c57a6e798bd3522d66177c0cedba91938811a6a987c2e1c14087d3399f410d354213eb359deb2a7823d0f6e8e449c137d2a63f8462473b6084f7edf2c960c8fcb87708d7ebeeff454677f0fbfcead02e65b53d19f4397934f13445", 0x7f, r5) r6 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r6) 22:39:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) [ 864.441694] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 864.503754] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r6, 0x890c, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0xffffffc0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 22:39:00 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x98a00, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)) syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba6169927", 0x91, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529af247112", 0x26, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbfd58a37", 0x3d, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b07566578c90b5cdc1ef350a4393ebdf766b2707558a03d2c4082114f266785f6021755ba406282d18a77f73293254ea9d814bb3a41fc", 0xd7, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) 22:39:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 864.550402] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r6, 0x890c, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0xffffffc0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 22:39:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCDELRT(r6, 0x890c, &(0x7f00000001c0)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0xffffffc0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 864.643142] __ntfs_warning: 98 callbacks suppressed [ 864.643151] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 864.643166] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 864.665884] ntfs: (device loop1): parse_options(): Unrecognized mount option func. [ 864.676632] XFS (loop5): Invalid superblock magic number 22:39:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 864.703898] ntfs: (device loop1): parse_options(): Unrecognized mount option subj_user. [ 864.712530] ntfs: (device loop1): parse_options(): Unrecognized mount option . 22:39:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) pipe(&(0x7f0000000180)) 22:39:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) r5 = accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) bind$netrom(r5, &(0x7f0000000300)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x48) 22:39:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 864.879992] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @default, @null, @netrom, @remote, @netrom, @null]}, &(0x7f00000002c0)=0x48, 0x80000) 22:39:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) [ 864.936657] XFS (loop1): unknown mount option [euid<00000000000000060928]. 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x9c}) 22:39:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) connect$netrom(r4, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) [ 864.994421] XFS (loop5): Invalid superblock magic number [ 865.051768] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:01 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan1\x00'}}, 0x1e) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000000)={@id={0x2, 0x0, @d}}) 22:39:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) connect$netrom(r3, &(0x7f00000003c0)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 22:39:01 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan1\x00'}}, 0x1e) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000000)={@id={0x2, 0x0, @d}}) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) 22:39:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) [ 865.164993] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 865.174256] audit: type=1400 audit(1658615941.214:18): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="-" pid=302 comm="syz-executor.1" 22:39:01 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan1\x00'}}, 0x1e) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000000)={@id={0x2, 0x0, @d}}) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:39:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) [ 865.233067] audit: type=1400 audit(1658615941.264:19): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="-" pid=320 comm="syz-executor.1" [ 865.309835] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 865.337340] XFS (loop5): Invalid superblock magic number [ 865.339951] audit: type=1400 audit(1658615941.314:20): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="-" pid=331 comm="syz-executor.1" 22:39:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan1\x00'}}, 0x1e) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:39:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan1\x00'}}, 0x1e) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 865.507310] audit: type=1400 audit(1658615941.534:21): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="-" pid=357 comm="syz-executor.1" [ 865.519554] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) 22:39:01 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan1\x00'}}, 0x1e) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 865.556883] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 865.602969] XFS (loop5): Invalid superblock magic number 22:39:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) 22:39:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}]}) 22:39:01 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'vlan1\x00'}}, 0x1e) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 1: socket$pppoe(0x18, 0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="dc90239237cafdbc9617fff9dcdbf69628d6cc07aefa870db69a8fb94e9604bb96cc5f6ec6ed1638443670aaf56d2086997ab4df6540069026531be9b8ccf218b72383b33dfdba02588d4e90a9b93b4930f734", 0x53) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 865.692792] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 865.725807] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 865.727901] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:39:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}]}) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:01 executing program 1: socket$pppoe(0x18, 0x1, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:01 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) [ 865.822802] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 865.855528] audit: type=1400 audit(1658615941.884:22): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="-" pid=426 comm="syz-executor.1" 22:39:02 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) [ 865.950021] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 865.964024] audit: type=1400 audit(1658615941.994:23): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="-" pid=452 comm="syz-executor.1" [ 865.965791] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 22:39:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}]}) 22:39:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:02 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) [ 866.106817] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 866.120399] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}]}) 22:39:02 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) [ 866.201062] XFS (loop5): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:02 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:02 executing program 1: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:02 executing program 1: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:02 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) [ 866.338329] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 866.347188] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:39:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}]}) 22:39:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) 22:39:02 executing program 1: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f00000000c0)=@profile={'permprofile ', '-\x00'}, 0xe) 22:39:02 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) [ 866.520378] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 866.529147] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) 22:39:02 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) 22:39:02 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) 22:39:02 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, 0x0, 0x0) 22:39:02 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, 0x0, 0x0) [ 866.628475] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 866.644117] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 866.646319] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 866.663222] XFS (loop3): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}]}) 22:39:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}]}) 22:39:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000380)=0x81, 0x4) accept4$netrom(r1, 0x0, 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000000)=""/248, 0xf8, 0x10022, &(0x7f0000000100)={{0x3, @default, 0x1}, [@null, @default, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:39:02 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, 0x0, 0x0) [ 866.780498] XFS (loop3): unknown mount option [euid<00000000000000060928]. [ 866.795334] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:02 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, 0x0, 0x0) [ 866.829514] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}]}) 22:39:02 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000380), 0x4) [ 866.890856] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}]}) [ 866.933551] XFS (loop3): Invalid superblock magic number 22:39:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:03 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'ip6_vti0\x00'}}, 0x1e) syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) [ 866.991909] XFS (loop1): unknown mount option [euid<00000000000000060928]. [ 867.015702] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 22:39:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 867.071610] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x98a00, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000340)=ANY=[@ANYBLOB="801f00003c000000f1905cbdc88417664477b0a1244f8da52b8a2d5cd61519354637c2f5c3015f29ad39955e549653eb419ecb3302217157a356acad66eead53d74014961cc6ca090030e567f4016de83c19bf0b13b141e97ff3db27ec943d210201ba110a705967f1a60dbaa324a30b3da8b9ef8abf4add3e90e64919eecb1f0a146fb39e3b6f5b8704251611ff1677d3a814f83e05be17fe63523c151bde32bf1b3ac392f286c272ae2b986fa7a703905e9f3c6f7a8270a511"]) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba6169927", 0x91, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529af247112", 0x26, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbfd58a37", 0x3d, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b07566578c90b5cdc1ef350a4393ebdf766b2707558a03d2c4082114f266785f6021755ba406282d18a77f73293254ea9d814bb3a41fc", 0xd7, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000007c0)) 22:39:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) [ 867.123443] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 867.137227] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}]}) 22:39:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 22:39:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 867.241547] XFS (loop1): Invalid superblock magic number [ 867.256210] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 867.270006] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_type={'subj_type', 0x3d, 'ntfs\x00'}}]}) 22:39:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}]}) [ 867.288411] XFS (loop5): unknown mount option [euid<00000000000000060928]. [ 867.302344] XFS (loop2): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x98a00, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000340)=ANY=[@ANYBLOB="801f00003c000000f1905cbdc88417664477b0a1244f8da52b8a2d5cd61519354637c2f5c3015f29ad39955e549653eb419ecb3302217157a356acad66eead53d74014961cc6ca090030e567f4016de83c19bf0b13b141e97ff3db27ec943d210201ba110a705967f1a60dbaa324a30b3da8b9ef8abf4add3e90e64919eecb1f0a146fb39e3b6f5b8704251611ff1677d3a814f83e05be17fe63523c151bde32bf1b3ac392f286c272ae2b986fa7a703905e9f3c6f7a8270a511"]) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba6169927", 0x91, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529af247112", 0x26, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbfd58a37", 0x3d, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b07566578c90b5cdc1ef350a4393ebdf766b2707558a03d2c4082114f266785f6021755ba406282d18a77f73293254ea9d814bb3a41fc", 0xd7, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000007c0)) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000900)={0x0, 0x6}) 22:39:03 executing program 2: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000840)=ANY=[@ANYRES32=r3, @ANYRES16=r2, @ANYBLOB="100025bd7000fcdbdf250800000006001b004e24000008001800e0000001", @ANYRES8=r0, @ANYRES64=r3, @ANYBLOB="b1a1265ea494a93af4fe1320c1ec216530887511f11d7c9be95a3dcf20abca575faa0fadd4726a0b64c40f6074c34620b84805a2fdf2010b22be11ef563efe4f59", @ANYRESHEX=r3, @ANYRESDEC=r1, @ANYRESDEC=r3, @ANYBLOB="1a543099c6308ec73dc50000654ae2e7ea3746e5cf7f20d70b6b07164791978210e38baa30713ddc25a487be329b0d5f33c25fa80669e8c004dba7cf2ebdac47ea9b968e5591e0742d46adf209a7860d9da5ea92086c09ba36fb7a98453db6166311d84939727217965296d104b7bb51d84d4c0440c43e9628b93236f93a2a517c848d38bdb798e0341b19688ab93fb7710c"], 0x24}, 0x1, 0x0, 0x0, 0x840}, 0x20000000) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f00000007c0)={0x0, "3f10bd435ffab8fc4080bde9b8a22219e264220020b59a2e07723af77eb118236ee98dfa9aa289d8261c73358fa590b6d81798e809c6b17db9caa0e63a5de1d3", 0x80}, 0x48, r5) add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc3}, &(0x7f0000000480)={0x0, "d5ab7bfaed4b215985d1f24e80217da3b5e46e198bfbc9689ff4d71a9cbbfc4b2e16409d3c17e544289b2e06fbd928ee101a266ee7c3621d49230b41e55593a7", 0x40}, 0x48, r6) r7 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r7) request_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='],\x00', r7) keyctl$KEYCTL_MOVE(0x1e, r4, r4, r6, 0x0) keyctl$revoke(0x3, r6) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), r1) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r10, 0x65, 0x6, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r8, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r9, @ANYBLOB="010026bd7000fedbdf25080000005b70678956e5efe8e93236f104afcf6f8c43ba4c47bcfcda5c4f842c0439db191e8772d7bcc8d784a21935c25e2b6cf4f314119b9bc8b15b3c2593041ac62d7fd9590e1be9704571c9f064a68dc7fe002ef9e8dda427641a845ddec5007253f6846726d02ddc4940f2a3b5db0157130d6c4b5e2f538b602a56f5717d5173c867581527823af43498e128e06971b9d14afc6fa1728512f232baabf669824de4e327d7"], 0x14}, 0x1, 0x0, 0x0, 0x200400c0}, 0x11) 22:39:03 executing program 3: setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 867.423924] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 867.442247] XFS (loop4): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @random="3d458eca2aeb", 'batadv0\x00'}}, 0x1e) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @multicast, 'veth0_vlan\x00'}}) 22:39:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) 22:39:03 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) [ 867.474824] XFS (loop1): Invalid superblock magic number 22:39:03 executing program 3: setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) 22:39:03 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x98a00, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000340)=ANY=[@ANYBLOB="801f00003c000000f1905cbdc88417664477b0a1244f8da52b8a2d5cd61519354637c2f5c3015f29ad39955e549653eb419ecb3302217157a356acad66eead53d74014961cc6ca090030e567f4016de83c19bf0b13b141e97ff3db27ec943d210201ba110a705967f1a60dbaa324a30b3da8b9ef8abf4add3e90e64919eecb1f0a146fb39e3b6f5b8704251611ff1677d3a814f83e05be17fe63523c151bde32bf1b3ac392f286c272ae2b986fa7a703905e9f3c6f7a8270a511"]) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba6169927", 0x91, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529af247112", 0x26, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbfd58a37", 0x3d, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b07566578c90b5cdc1ef350a4393ebdf766b2707558a03d2c4082114f266785f6021755ba406282d18a77f73293254ea9d814bb3a41fc", 0xd7, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000007c0)) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000900)={0x0, 0x6}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000140)) 22:39:03 executing program 3: setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) 22:39:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}]}) 22:39:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}, {@subj_role={'subj_role', 0x3d, 'ntfs\x00'}}]}) [ 867.580185] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 867.611172] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:03 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) 22:39:03 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) 22:39:03 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) [ 867.712964] XFS (loop2): unknown mount option [euid<00000000000000060928]. [ 867.719751] XFS (loop4): unknown mount option [euid<00000000000000060928]. [ 867.752725] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 867.774073] XFS (loop1): Invalid superblock magic number 22:39:03 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) 22:39:03 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:03 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10bd435ffab8fc4080bde9b8a22219e264220020b59a2e07723af77eb118236ee98dfa9aa289d8261c73358fa590b6d81798e809c6b17db9caa0e63a5de1d3"}, 0x48, r0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="ba7e9b6cfe53bb0e9b6affc690298f0dca626c5e5a502e6b1765aec2b0480963961767337ac2c9e6019e2c3d678d4f896a84fe9739e46ef2fc3af9", 0x3b, r2) keyctl$revoke(0x3, r1) 22:39:03 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) 22:39:03 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@dont_hash}]}) 22:39:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 22:39:04 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000340)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) 22:39:04 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10bd435ffab8fc4080bde9b8a22219e264220020b59a2e07723af77eb118236ee98dfa9aa289d8261c73358fa590b6d81798e809c6b17db9caa0e63a5de1d3"}, 0x48, r0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="ba7e9b6cfe53bb0e9b6affc690298f0dca626c5e5a502e6b1765aec2b0480963961767337ac2c9e6019e2c3d678d4f896a84fe9739e46ef2fc3af9", 0x3b, r2) keyctl$revoke(0x3, r1) 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) [ 867.924643] encrypted_key: master key parameter 'c–g3zÂÉæž,=gO‰j„þ—9änòü:ù' is invalid 22:39:04 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:04 executing program 5: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300), 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) [ 868.006941] XFS (loop4): Invalid superblock magic number [ 868.035728] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@measure}]}) 22:39:04 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f00000003c0)={'fscrypt:', @desc2}, &(0x7f0000000400)={0x0, "3f10bd435ffab8fc4080bde9b8a22219e264220020b59a2e07723af77eb118236ee98dfa9aa289d8261c73358fa590b6d81798e809c6b17db9caa0e63a5de1d3"}, 0x48, r1) keyctl$revoke(0x3, r2) 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) 22:39:04 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x98a00, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000340)=ANY=[@ANYBLOB="801f00003c000000f1905cbdc88417664477b0a1244f8da52b8a2d5cd61519354637c2f5c3015f29ad39955e549653eb419ecb3302217157a356acad66eead53d74014961cc6ca090030e567f4016de83c19bf0b13b141e97ff3db27ec943d210201ba110a705967f1a60dbaa324a30b3da8b9ef8abf4add3e90e64919eecb1f0a146fb39e3b6f5b8704251611ff1677d3a814f83e05be17fe63523c151bde32bf1b3ac392f286c272ae2b986fa7a703905e9f3c6f7a8270a511"]) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba6169927", 0x91, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529af247112", 0x26, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbfd58a37", 0x3d, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b07566578c90b5cdc1ef350a4393ebdf766b2707558a03d2c4082114f266785f6021755ba406282d18a77f73293254ea9d814bb3a41fc", 0xd7, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000007c0)=0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000900)={0x0, 0x6}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x8000, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff, 0x6, 0x6]}) [ 868.112531] encrypted_key: master key parameter 'c–g3zÂÉæž,=gO‰j„þ—9änòü:ù' is invalid 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (fail_nth: 1) 22:39:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 1) 22:39:04 executing program 1: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:04 executing program 5: socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) 22:39:04 executing program 5: socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) [ 868.202316] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) sendto$netrom(r1, &(0x7f0000000040)="e3dfde5a392170a9b942440c78a661ff36ac9007045b8ae747da44947b06fb3c0b406dc33f32510ab3b0396af9c53211060c78af8425c030a9607d08f55f983d7876967bbaadddde31e1d4bcb4639319fc8eea4a3f67cb556184a2c3f9568ec767b3e429f8a87d8dd1abe4fe0b6f690969e7cd7373796545ce57bbeae0fb73b334daa9bbf32cd3742bd8800a9915e8c88f114f4d835b14817b8959dcbb4ada6ef1ba1e8c48", 0xa5, 0x24000000, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}, 0x48) 22:39:04 executing program 5: socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev}, &(0x7f0000000040)=0xc) [ 868.251760] FAULT_INJECTION: forcing a failure. [ 868.251760] name failslab, interval 1, probability 0, space 0, times 0 [ 868.288079] CPU: 0 PID: 898 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 868.295813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 868.305163] Call Trace: [ 868.307751] dump_stack+0x1b2/0x281 [ 868.311375] should_fail.cold+0x10a/0x149 [ 868.315788] should_failslab+0xd6/0x130 [ 868.319768] __kmalloc+0x2c1/0x400 [ 868.323306] ? SyS_memfd_create+0xbc/0x3c0 [ 868.328063] SyS_memfd_create+0xbc/0x3c0 [ 868.332130] ? shmem_fcntl+0x120/0x120 [ 868.336013] ? __do_page_fault+0x159/0xad0 [ 868.340242] ? do_syscall_64+0x4c/0x640 [ 868.344217] ? shmem_fcntl+0x120/0x120 [ 868.348105] do_syscall_64+0x1d5/0x640 [ 868.351994] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 868.357262] RIP: 0033:0x7f2645955209 [ 868.360966] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 868.368759] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645955209 [ 868.376030] RDX: 00007f26442c9fe0 RSI: 0000000000000000 RDI: 00007f26459ae29c [ 868.383306] RBP: 0000000000000000 R08: 00007f26442c9fd8 R09: 00007f26442ca1d0 [ 868.390570] R10: 00007f26442c9fdc R11: 0000000000000246 R12: 0000000020000400 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}]}) [ 868.397839] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 [ 868.418299] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 1) 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:39:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 2) 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendto$netrom(r1, &(0x7f0000000040)="e3dfde5a392170a9b942440c78a661ff36ac9007045b8ae747da44947b06fb3c0b406dc33f32510ab3b0396af9c53211060c78af8425c030a9607d08f55f983d7876967bbaadddde31e1d4bcb4639319fc8eea4a3f67cb556184a2c3f9568ec767b3e429f8a87d8dd1abe4fe0b6f690969e7cd7373796545ce57bbeae0fb73b334daa9bbf32cd3742bd8800a9915e8c88f114f4d835b14817b8959dcbb4ada6ef1ba1e8c48", 0xa5, 0x24000000, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}, 0x48) 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendto$netrom(r1, &(0x7f0000000040)="e3dfde5a392170a9b942440c78a661ff36ac9007045b8ae747da44947b06fb3c0b406dc33f32510ab3b0396af9c53211060c78af8425c030a9607d08f55f983d7876967bbaadddde31e1d4bcb4639319fc8eea4a3f67cb556184a2c3f9568ec767b3e429f8a87d8dd1abe4fe0b6f690969e7cd7373796545ce57bbeae0fb73b334daa9bbf32cd3742bd8800a9915e8c88f114f4d835b14817b8959dcbb4ada6ef1ba1e8c48", 0xa5, 0x24000000, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default]}, 0x48) 22:39:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}, {@pcr={'pcr', 0x3d, 0x12}}]}) 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) [ 868.579069] FAULT_INJECTION: forcing a failure. [ 868.579069] name failslab, interval 1, probability 0, space 0, times 0 [ 868.591052] CPU: 0 PID: 941 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 868.598769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 868.608118] Call Trace: [ 868.610708] dump_stack+0x1b2/0x281 [ 868.614353] should_fail.cold+0x10a/0x149 [ 868.618507] should_failslab+0xd6/0x130 [ 868.622488] __kmalloc+0x2c1/0x400 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (fail_nth: 1) [ 868.625207] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 868.626017] ? SyS_memfd_create+0xbc/0x3c0 [ 868.626033] SyS_memfd_create+0xbc/0x3c0 [ 868.641357] ? shmem_fcntl+0x120/0x120 [ 868.645253] ? __do_page_fault+0x159/0xad0 [ 868.649762] ? do_syscall_64+0x4c/0x640 [ 868.653741] ? shmem_fcntl+0x120/0x120 [ 868.657632] do_syscall_64+0x1d5/0x640 [ 868.661531] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 868.666721] RIP: 0033:0x7f91fb946209 [ 868.670422] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 868.678123] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb946209 [ 868.685477] RDX: 00007f91fa2bafe0 RSI: 0000000000000000 RDI: 00007f91fb99f29c [ 868.692769] RBP: 0000000000000000 R08: 00007f91fa2bafd8 R09: 00007f91fa2bb1d0 [ 868.700167] R10: 00007f91fa2bafdc R11: 0000000000000246 R12: 0000000020000400 [ 868.707702] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 [ 868.721346] FAULT_INJECTION: forcing a failure. 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @rand_addr=0x64010102, 0xe, 0x4}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$instantiate(0xc, r5, &(0x7f0000000200)=@encrypted_load={'load ', 'default', 0x20, 'user:', '', 0x20, 0x5, 0x20, [0x62, 0x35, 0x66, 0x33]}, 0x2d, r4) r6 = add_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r3) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16=0x0, @ANYBLOB="00042abd7000fcdbdf2501000000050004000100000075dbce60359e0da81f6ab4b7eab80bbadf081a38409bc6386a0affac3a0c890f6b6552fddacb2253507dc37a77e7f3cf8ffe59c72b85500f8e8b116cc810fb8aa60733a2d7d87e85b9875c069344f042775a0d8268bcf89afa88aef1cf0722eec99679eb1904815e8d305f7a41fcccc00bb50a971cbdc640246fb1d365b9557e08f04b"], 0x12}, 0x1, 0x0, 0x0, 0x20004810}, 0x5) keyctl$KEYCTL_WATCH_KEY(0x20, r6, r7, 0xf8) 22:39:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}]}) [ 868.721346] name failslab, interval 1, probability 0, space 0, times 0 [ 868.736664] CPU: 0 PID: 947 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 868.744381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 868.753735] Call Trace: [ 868.756333] dump_stack+0x1b2/0x281 [ 868.759982] should_fail.cold+0x10a/0x149 [ 868.764140] should_failslab+0xd6/0x130 [ 868.768167] kmem_cache_alloc+0x28e/0x3c0 [ 868.772325] __d_alloc+0x2a/0xa20 [ 868.775783] ? lock_downgrade+0x740/0x740 [ 868.779941] __shmem_file_setup.part.0+0xcb/0x3c0 [ 868.784871] ? shmem_create+0x30/0x30 [ 868.788672] ? __alloc_fd+0x1be/0x490 [ 868.792480] SyS_memfd_create+0x1fc/0x3c0 [ 868.796734] ? shmem_fcntl+0x120/0x120 [ 868.800627] ? __do_page_fault+0x159/0xad0 [ 868.804952] ? do_syscall_64+0x4c/0x640 [ 868.808924] ? shmem_fcntl+0x120/0x120 [ 868.809340] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 868.812817] do_syscall_64+0x1d5/0x640 [ 868.812835] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 868.812849] RIP: 0033:0x7f2645955209 [ 868.812854] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 868.812865] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645955209 [ 868.812871] RDX: 00007f26442c9fe0 RSI: 0000000000000000 RDI: 00007f26459ae29c [ 868.812876] RBP: 0000000000000000 R08: 00007f26442c9fd8 R09: 00007f26442ca1d0 [ 868.812880] R10: 00007f26442c9fdc R11: 0000000000000246 R12: 0000000020000400 [ 868.812889] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 22:39:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 2) 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x24d8ea5b, 0xffff, 0x5, 0x3ff, 0x800, 0x2, 0x4, 0xfa, 0x400, 0x7, 0x60, 0xffff, 0x8000, 0x200}}) 22:39:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 3) 22:39:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:04 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @rand_addr=0x64010102, 0xe, 0x4}}) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) (async) keyctl$instantiate(0xc, r5, &(0x7f0000000200)=@encrypted_load={'load ', 'default', 0x20, 'user:', '', 0x20, 0x5, 0x20, [0x62, 0x35, 0x66, 0x33]}, 0x2d, r4) (async) r6 = add_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r3) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16=0x0, @ANYBLOB="00042abd7000fcdbdf2501000000050004000100000075dbce60359e0da81f6ab4b7eab80bbadf081a38409bc6386a0affac3a0c890f6b6552fddacb2253507dc37a77e7f3cf8ffe59c72b85500f8e8b116cc810fb8aa60733a2d7d87e85b9875c069344f042775a0d8268bcf89afa88aef1cf0722eec99679eb1904815e8d305f7a41fcccc00bb50a971cbdc640246fb1d365b9557e08f04b"], 0x12}, 0x1, 0x0, 0x0, 0x20004810}, 0x5) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r6, r7, 0xf8) 22:39:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x24d8ea5b, 0xffff, 0x5, 0x3ff, 0x800, 0x2, 0x4, 0xfa, 0x400, 0x7, 0x60, 0xffff, 0x8000, 0x200}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x24d8ea5b, 0xffff, 0x5, 0x3ff, 0x800, 0x2, 0x4, 0xfa, 0x400, 0x7, 0x60, 0xffff, 0x8000, 0x200}}) (async) 22:39:04 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) [ 868.966445] FAULT_INJECTION: forcing a failure. [ 868.966445] name failslab, interval 1, probability 0, space 0, times 0 [ 868.988540] CPU: 0 PID: 978 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 868.996267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 869.001352] FAULT_INJECTION: forcing a failure. [ 869.001352] name failslab, interval 1, probability 0, space 0, times 0 [ 869.005615] Call Trace: [ 869.005633] dump_stack+0x1b2/0x281 [ 869.005646] should_fail.cold+0x10a/0x149 [ 869.005662] should_failslab+0xd6/0x130 [ 869.031134] kmem_cache_alloc+0x28e/0x3c0 [ 869.035282] ? shmem_destroy_callback+0xa0/0xa0 [ 869.039954] shmem_alloc_inode+0x18/0x40 [ 869.044101] ? shmem_destroy_callback+0xa0/0xa0 [ 869.048775] alloc_inode+0x5d/0x170 [ 869.052407] new_inode+0x1d/0xf0 [ 869.055777] shmem_get_inode+0x8b/0x890 [ 869.059765] __shmem_file_setup.part.0+0x104/0x3c0 [ 869.064695] ? shmem_create+0x30/0x30 [ 869.068500] ? __alloc_fd+0x1be/0x490 [ 869.072307] SyS_memfd_create+0x1fc/0x3c0 [ 869.076458] ? shmem_fcntl+0x120/0x120 [ 869.080348] ? __do_page_fault+0x159/0xad0 [ 869.084582] ? do_syscall_64+0x4c/0x640 [ 869.088554] ? shmem_fcntl+0x120/0x120 [ 869.092445] do_syscall_64+0x1d5/0x640 [ 869.096405] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 869.101589] RIP: 0033:0x7f2645955209 [ 869.105298] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:39:05 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x18}}, @rand_addr=0x64010102, 0xe, 0x4}}) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r2) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) (async) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$instantiate(0xc, r5, &(0x7f0000000200)=@encrypted_load={'load ', 'default', 0x20, 'user:', '', 0x20, 0x5, 0x20, [0x62, 0x35, 0x66, 0x33]}, 0x2d, r4) (async) r6 = add_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r3) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16=0x0, @ANYBLOB="00042abd7000fcdbdf2501000000050004000100000075dbce60359e0da81f6ab4b7eab80bbadf081a38409bc6386a0affac3a0c890f6b6552fddacb2253507dc37a77e7f3cf8ffe59c72b85500f8e8b116cc810fb8aa60733a2d7d87e85b9875c069344f042775a0d8268bcf89afa88aef1cf0722eec99679eb1904815e8d305f7a41fcccc00bb50a971cbdc640246fb1d365b9557e08f04b"], 0x12}, 0x1, 0x0, 0x0, 0x20004810}, 0x5) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r6, r7, 0xf8) 22:39:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x24d8ea5b, 0xffff, 0x5, 0x3ff, 0x800, 0x2, 0x4, 0xfa, 0x400, 0x7, 0x60, 0xffff, 0x8000, 0x200}}) [ 869.113180] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645955209 [ 869.120449] RDX: 00007f26442c9fe0 RSI: 0000000000000000 RDI: 00007f26459ae29c [ 869.127715] RBP: 0000000000000000 R08: 00007f26442c9fd8 R09: 00007f26442ca1d0 [ 869.134985] R10: 00007f26442c9fdc R11: 0000000000000246 R12: 0000000020000400 [ 869.142250] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 [ 869.157201] XFS (loop0): unknown mount option [euid<00000000000000060928]. 22:39:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 4) [ 869.176765] CPU: 1 PID: 990 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 869.184581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 869.193934] Call Trace: [ 869.196523] dump_stack+0x1b2/0x281 [ 869.200152] should_fail.cold+0x10a/0x149 [ 869.204298] should_failslab+0xd6/0x130 [ 869.208272] kmem_cache_alloc+0x28e/0x3c0 [ 869.212441] __d_alloc+0x2a/0xa20 [ 869.215988] ? lock_downgrade+0x740/0x740 [ 869.220134] __shmem_file_setup.part.0+0xcb/0x3c0 22:39:05 executing program 3: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'wlan1\x00'}}, 0x1e) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040)=0x1, 0x4) [ 869.224423] FAULT_INJECTION: forcing a failure. [ 869.224423] name failslab, interval 1, probability 0, space 0, times 0 [ 869.224973] ? shmem_create+0x30/0x30 [ 869.240111] ? __alloc_fd+0x1be/0x490 [ 869.243918] SyS_memfd_create+0x1fc/0x3c0 [ 869.248066] ? shmem_fcntl+0x120/0x120 [ 869.251963] ? __do_page_fault+0x159/0xad0 [ 869.256196] ? do_syscall_64+0x4c/0x640 [ 869.260170] ? shmem_fcntl+0x120/0x120 [ 869.264069] do_syscall_64+0x1d5/0x640 [ 869.267965] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 869.273149] RIP: 0033:0x7f91fb946209 22:39:05 executing program 3: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'wlan1\x00'}}, 0x1e) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040)=0x1, 0x4) [ 869.276851] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 869.284555] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb946209 [ 869.291818] RDX: 00007f91fa2bafe0 RSI: 0000000000000000 RDI: 00007f91fb99f29c [ 869.299086] RBP: 0000000000000000 R08: 00007f91fa2bafd8 R09: 00007f91fa2bb1d0 [ 869.306349] R10: 00007f91fa2bafdc R11: 0000000000000246 R12: 0000000020000400 [ 869.313609] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 [ 869.324541] CPU: 0 PID: 1001 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 869.332352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 869.341706] Call Trace: [ 869.344296] dump_stack+0x1b2/0x281 [ 869.347930] should_fail.cold+0x10a/0x149 [ 869.352087] should_failslab+0xd6/0x130 [ 869.356117] kmem_cache_alloc+0x28e/0x3c0 [ 869.360272] get_empty_filp+0x86/0x3f0 [ 869.364180] alloc_file+0x23/0x440 [ 869.367728] __shmem_file_setup.part.0+0x198/0x3c0 [ 869.372664] ? shmem_create+0x30/0x30 [ 869.376469] ? __alloc_fd+0x1be/0x490 [ 869.380282] SyS_memfd_create+0x1fc/0x3c0 [ 869.384442] ? shmem_fcntl+0x120/0x120 [ 869.388333] ? __do_page_fault+0x159/0xad0 [ 869.392575] ? do_syscall_64+0x4c/0x640 [ 869.396550] ? shmem_fcntl+0x120/0x120 [ 869.400440] do_syscall_64+0x1d5/0x640 [ 869.404336] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 869.409611] RIP: 0033:0x7f2645955209 [ 869.413316] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 869.421049] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645955209 [ 869.428321] RDX: 00007f26442c9fe0 RSI: 0000000000000000 RDI: 00007f26459ae29c [ 869.435675] RBP: 0000000000000000 R08: 00007f26442c9fd8 R09: 00007f26442ca1d0 [ 869.443570] R10: 00007f26442c9fdc R11: 0000000000000246 R12: 0000000020000400 [ 869.450968] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 22:39:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 3) 22:39:05 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='.#\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:05 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}]}) 22:39:05 executing program 3: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'wlan1\x00'}}, 0x1e) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) (async, rerun: 64) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040)=0x1, 0x4) (rerun: 64) 22:39:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 5) 22:39:05 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='.#\x00') (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) [ 869.594235] FAULT_INJECTION: forcing a failure. [ 869.594235] name failslab, interval 1, probability 0, space 0, times 0 [ 869.620382] FAULT_INJECTION: forcing a failure. [ 869.620382] name failslab, interval 1, probability 0, space 0, times 0 [ 869.627547] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 869.637801] CPU: 0 PID: 1024 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 869.646440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 869.655799] Call Trace: [ 869.658399] dump_stack+0x1b2/0x281 [ 869.662214] should_fail.cold+0x10a/0x149 [ 869.666367] should_failslab+0xd6/0x130 [ 869.670351] kmem_cache_alloc+0x28e/0x3c0 [ 869.674511] ? shmem_destroy_callback+0xa0/0xa0 [ 869.679308] shmem_alloc_inode+0x18/0x40 [ 869.683373] ? shmem_destroy_callback+0xa0/0xa0 [ 869.688043] alloc_inode+0x5d/0x170 [ 869.691673] new_inode+0x1d/0xf0 [ 869.695056] shmem_get_inode+0x8b/0x890 [ 869.699044] __shmem_file_setup.part.0+0x104/0x3c0 [ 869.703981] ? shmem_create+0x30/0x30 [ 869.707812] ? __alloc_fd+0x1be/0x490 [ 869.711787] SyS_memfd_create+0x1fc/0x3c0 [ 869.716132] ? shmem_fcntl+0x120/0x120 [ 869.720024] ? __do_page_fault+0x159/0xad0 [ 869.724288] ? do_syscall_64+0x4c/0x640 [ 869.728355] ? shmem_fcntl+0x120/0x120 [ 869.732346] do_syscall_64+0x1d5/0x640 [ 869.736349] entry_SYSCALL_64_after_hwframe+0x46/0xbb 22:39:05 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='.#\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:05 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000000)="4a76188282db6df0e4cd315aa80e3d65d88043abb0bd1d81a8aae53cc28f58bdcdd19c747b118261c85d0ddc3d81d852e103acef57b8472d23ec90684e1b9d8925354e77a8becdcab8d212f395e303e2f1eef119bf265294e2a0a1a7b3ef1eb568194fe4bf90df4bdc4fe4854fb4a59f2bfa", 0x72, 0x80, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$netrom(r0, &(0x7f0000000100)={{0x3, @default}, [@null, @remote, @remote, @rose, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48) [ 869.741573] RIP: 0033:0x7f91fb946209 [ 869.745279] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 869.753217] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb946209 [ 869.760576] RDX: 00007f91fa2bafe0 RSI: 0000000000000000 RDI: 00007f91fb99f29c [ 869.767990] RBP: 0000000000000000 R08: 00007f91fa2bafd8 R09: 00007f91fa2bb1d0 [ 869.775265] R10: 00007f91fa2bafdc R11: 0000000000000246 R12: 0000000020000400 [ 869.782660] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 [ 869.820734] CPU: 0 PID: 1028 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 869.828554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 869.837916] Call Trace: [ 869.840519] dump_stack+0x1b2/0x281 [ 869.844152] should_fail.cold+0x10a/0x149 [ 869.848302] should_failslab+0xd6/0x130 [ 869.852283] kmem_cache_alloc_trace+0x29a/0x3d0 [ 869.856967] apparmor_file_alloc_security+0x129/0x800 [ 869.862163] security_file_alloc+0x66/0xa0 [ 869.866403] ? selinux_is_enabled+0x5/0x50 [ 869.870645] get_empty_filp+0x16b/0x3f0 [ 869.874631] alloc_file+0x23/0x440 [ 869.878175] __shmem_file_setup.part.0+0x198/0x3c0 [ 869.883110] ? shmem_create+0x30/0x30 [ 869.886908] ? __alloc_fd+0x1be/0x490 [ 869.890716] SyS_memfd_create+0x1fc/0x3c0 [ 869.894870] ? shmem_fcntl+0x120/0x120 [ 869.898756] ? __do_page_fault+0x159/0xad0 [ 869.902996] ? do_syscall_64+0x4c/0x640 [ 869.906976] ? shmem_fcntl+0x120/0x120 [ 869.910872] do_syscall_64+0x1d5/0x640 [ 869.914866] entry_SYSCALL_64_after_hwframe+0x46/0xbb 22:39:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}]}) 22:39:06 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000000)="4a76188282db6df0e4cd315aa80e3d65d88043abb0bd1d81a8aae53cc28f58bdcdd19c747b118261c85d0ddc3d81d852e103acef57b8472d23ec90684e1b9d8925354e77a8becdcab8d212f395e303e2f1eef119bf265294e2a0a1a7b3ef1eb568194fe4bf90df4bdc4fe4854fb4a59f2bfa", 0x72, 0x80, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$netrom(r0, &(0x7f0000000100)={{0x3, @default}, [@null, @remote, @remote, @rose, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) sendto$netrom(0xffffffffffffffff, &(0x7f0000000000)="4a76188282db6df0e4cd315aa80e3d65d88043abb0bd1d81a8aae53cc28f58bdcdd19c747b118261c85d0ddc3d81d852e103acef57b8472d23ec90684e1b9d8925354e77a8becdcab8d212f395e303e2f1eef119bf265294e2a0a1a7b3ef1eb568194fe4bf90df4bdc4fe4854fb4a59f2bfa", 0x72, 0x80, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) getsockname$netrom(r0, &(0x7f0000000100)={{0x3, @default}, [@null, @remote, @remote, @rose, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48) (async) [ 869.920229] RIP: 0033:0x7f2645955209 [ 869.923937] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 869.931650] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645955209 [ 869.939102] RDX: 00007f26442c9fe0 RSI: 0000000000000000 RDI: 00007f26459ae29c [ 869.946370] RBP: 0000000000000000 R08: 00007f26442c9fd8 R09: 00007f26442ca1d0 [ 869.953642] R10: 00007f26442c9fdc R11: 0000000000000246 R12: 0000000020000400 [ 869.960998] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 22:39:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 4) 22:39:06 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x5a) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$alg(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 22:39:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) 22:39:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 6) 22:39:06 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) sendto$netrom(0xffffffffffffffff, &(0x7f0000000000)="4a76188282db6df0e4cd315aa80e3d65d88043abb0bd1d81a8aae53cc28f58bdcdd19c747b118261c85d0ddc3d81d852e103acef57b8472d23ec90684e1b9d8925354e77a8becdcab8d212f395e303e2f1eef119bf265294e2a0a1a7b3ef1eb568194fe4bf90df4bdc4fe4854fb4a59f2bfa", 0x72, 0x80, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$netrom(r0, &(0x7f0000000100)={{0x3, @default}, [@null, @remote, @remote, @rose, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48) [ 870.101469] FAULT_INJECTION: forcing a failure. [ 870.101469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 870.113292] CPU: 1 PID: 1063 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 870.121088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 870.128018] FAULT_INJECTION: forcing a failure. [ 870.128018] name failslab, interval 1, probability 0, space 0, times 0 [ 870.130441] Call Trace: [ 870.130457] dump_stack+0x1b2/0x281 [ 870.130470] should_fail.cold+0x10a/0x149 [ 870.130486] ? is_bpf_text_address+0xb8/0x150 [ 870.156452] __alloc_pages_nodemask+0x22c/0x2720 [ 870.161209] ? unwind_get_return_address+0x51/0x90 [ 870.166225] ? __save_stack_trace+0xa0/0x160 [ 870.170641] ? __lock_acquire+0x5fc/0x3f20 [ 870.174919] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 870.179850] ? __shmem_file_setup.part.0+0xcb/0x3c0 [ 870.184865] ? SyS_memfd_create+0x1fc/0x3c0 [ 870.189188] ? do_syscall_64+0x1d5/0x640 [ 870.193337] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.198722] ? depot_save_stack+0x10d/0x3f0 [ 870.203054] ? trace_hardirqs_on+0x10/0x10 [ 870.207305] ? __lock_acquire+0x5fc/0x3f20 [ 870.211549] cache_grow_begin+0x91/0x700 [ 870.215607] ? fs_reclaim_release+0xd0/0x110 [ 870.220019] ? check_preemption_disabled+0x35/0x240 [ 870.225036] cache_alloc_refill+0x273/0x350 [ 870.229361] kmem_cache_alloc+0x333/0x3c0 [ 870.233507] ? shmem_destroy_callback+0xa0/0xa0 [ 870.238176] shmem_alloc_inode+0x18/0x40 [ 870.242238] ? shmem_destroy_callback+0xa0/0xa0 [ 870.246904] alloc_inode+0x5d/0x170 [ 870.250620] new_inode+0x1d/0xf0 [ 870.253983] shmem_get_inode+0x8b/0x890 [ 870.257989] __shmem_file_setup.part.0+0x104/0x3c0 [ 870.263091] ? shmem_create+0x30/0x30 [ 870.266884] ? __alloc_fd+0x1be/0x490 [ 870.270691] SyS_memfd_create+0x1fc/0x3c0 [ 870.274835] ? shmem_fcntl+0x120/0x120 [ 870.278719] ? __do_page_fault+0x159/0xad0 [ 870.282954] ? do_syscall_64+0x4c/0x640 [ 870.286954] ? shmem_fcntl+0x120/0x120 [ 870.290851] do_syscall_64+0x1d5/0x640 [ 870.294744] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.299929] RIP: 0033:0x7f91fb946209 [ 870.303626] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 870.311326] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb946209 [ 870.318594] RDX: 00007f91fa2bafe0 RSI: 0000000000000000 RDI: 00007f91fb99f29c [ 870.325857] RBP: 0000000000000000 R08: 00007f91fa2bafd8 R09: 00007f91fa2bb1d0 [ 870.333124] R10: 00007f91fa2bafdc R11: 0000000000000246 R12: 0000000020000400 [ 870.340394] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 [ 870.361488] CPU: 0 PID: 1065 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 870.369300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 870.378653] Call Trace: [ 870.381330] dump_stack+0x1b2/0x281 [ 870.384972] should_fail.cold+0x10a/0x149 [ 870.389126] should_failslab+0xd6/0x130 [ 870.393117] kmem_cache_alloc+0x28e/0x3c0 [ 870.397269] getname_flags+0xc8/0x550 [ 870.401072] do_sys_open+0x1ce/0x410 [ 870.404784] ? filp_open+0x60/0x60 22:39:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:06 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x5a) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$alg(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x5a) (async) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) accept$alg(r2, 0x0, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) 22:39:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:06 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x5a) (async) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$alg(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) [ 870.408325] ? do_syscall_64+0x4c/0x640 [ 870.412297] ? SyS_open+0x30/0x30 [ 870.415749] do_syscall_64+0x1d5/0x640 [ 870.419640] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.424846] RIP: 0033:0x7f2645908124 [ 870.428554] RSP: 002b:00007f26442c9eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 870.436259] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645908124 [ 870.438023] XFS (loop0): Invalid superblock magic number [ 870.443523] RDX: 0000000000000002 RSI: 00007f26442c9fe0 RDI: 00000000ffffff9c 22:39:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = accept4$netrom(r0, 0x0, &(0x7f0000000040), 0xc0000) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x40, 0x4) [ 870.443529] RBP: 00007f26442c9fe0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 870.443534] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 870.443540] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 870.515788] XFS (loop2): Invalid superblock magic number 22:39:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 7) 22:39:06 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)) 22:39:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 5) 22:39:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}]}) 22:39:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = accept4$netrom(r0, 0x0, &(0x7f0000000040), 0xc0000) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x40, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) accept4$netrom(r0, 0x0, &(0x7f0000000040), 0xc0000) (async) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x40, 0x4) (async) [ 870.612868] FAULT_INJECTION: forcing a failure. [ 870.612868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 870.624677] CPU: 0 PID: 1111 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 870.632465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 870.641972] Call Trace: [ 870.644549] dump_stack+0x1b2/0x281 [ 870.648170] should_fail.cold+0x10a/0x149 [ 870.652304] __alloc_pages_nodemask+0x22c/0x2720 [ 870.657047] ? static_obj+0x50/0x50 [ 870.660654] ? trace_hardirqs_on+0x10/0x10 [ 870.664870] ? __lock_acquire+0x5fc/0x3f20 [ 870.669091] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 870.673911] ? __lock_acquire+0x5fc/0x3f20 [ 870.678126] ? simple_xattr_get+0xe5/0x160 [ 870.682342] ? fsnotify+0x974/0x11b0 [ 870.686040] ? shmem_setattr+0x241/0xbf0 [ 870.690204] ? __fsnotify_inode_delete+0x20/0x20 [ 870.695010] cache_grow_begin+0x91/0x700 [ 870.699066] ? fs_reclaim_release+0xd0/0x110 [ 870.703559] ? check_preemption_disabled+0x35/0x240 [ 870.708555] cache_alloc_refill+0x273/0x350 [ 870.712867] kmem_cache_alloc+0x333/0x3c0 [ 870.717002] getname_flags+0xc8/0x550 [ 870.720807] do_sys_open+0x1ce/0x410 [ 870.724503] ? filp_open+0x60/0x60 [ 870.728034] ? do_syscall_64+0x4c/0x640 [ 870.731996] ? SyS_open+0x30/0x30 [ 870.735434] do_syscall_64+0x1d5/0x640 [ 870.739310] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.744478] RIP: 0033:0x7f2645908124 [ 870.748170] RSP: 002b:00007f26442c9eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 870.755865] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645908124 [ 870.763117] RDX: 0000000000000002 RSI: 00007f26442c9fe0 RDI: 00000000ffffff9c [ 870.770374] RBP: 00007f26442c9fe0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 870.777719] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 870.784979] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:06 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)) [ 870.875209] FAULT_INJECTION: forcing a failure. [ 870.875209] name failslab, interval 1, probability 0, space 0, times 0 [ 870.901168] CPU: 0 PID: 1126 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 870.909091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 870.918443] Call Trace: [ 870.921039] dump_stack+0x1b2/0x281 [ 870.924681] should_fail.cold+0x10a/0x149 [ 870.928840] should_failslab+0xd6/0x130 [ 870.932819] kmem_cache_alloc+0x28e/0x3c0 [ 870.936979] get_empty_filp+0x86/0x3f0 [ 870.940873] alloc_file+0x23/0x440 [ 870.944409] __shmem_file_setup.part.0+0x198/0x3c0 [ 870.949328] ? shmem_create+0x30/0x30 [ 870.953111] ? __alloc_fd+0x1be/0x490 [ 870.956917] SyS_memfd_create+0x1fc/0x3c0 [ 870.961049] ? shmem_fcntl+0x120/0x120 [ 870.965030] ? __do_page_fault+0x159/0xad0 [ 870.969247] ? do_syscall_64+0x4c/0x640 [ 870.973210] ? shmem_fcntl+0x120/0x120 [ 870.977082] do_syscall_64+0x1d5/0x640 [ 870.981082] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 870.986284] RIP: 0033:0x7f91fb946209 [ 870.989981] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 870.997938] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb946209 [ 871.005194] RDX: 00007f91fa2bafe0 RSI: 0000000000000000 RDI: 00007f91fb99f29c [ 871.012448] RBP: 0000000000000000 R08: 00007f91fa2bafd8 R09: 00007f91fa2bb1d0 22:39:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = accept4$netrom(r0, 0x0, &(0x7f0000000040), 0xc0000) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x40, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) accept4$netrom(r0, 0x0, &(0x7f0000000040), 0xc0000) (async) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000080)=0x40, 0x4) (async) 22:39:07 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)) (async) 22:39:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 6) 22:39:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}]}) [ 871.019793] R10: 00007f91fa2bafdc R11: 0000000000000246 R12: 0000000020000400 [ 871.027158] R13: 0000000020001580 R14: 0000000000000000 R15: 0000000020003940 [ 871.046518] XFS (loop4): Invalid superblock magic number 22:39:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 8) 22:39:07 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "eff33651091025e75ff3348812860c3c6c539d19a20fdd682524cac07f8f3ee719a9f2eb75aba10ed4a5bfcf614d91f152d8188eecd0ec1935f1c0b0832649fa"}, 0x48, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000340)='rxrpc\x00', 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) accept4$netrom(r4, &(0x7f0000000240)={{0x3, @netrom}, [@default, @remote, @bcast, @remote, @default, @null, @netrom, @default]}, &(0x7f00000002c0)=0x48, 0x80000) [ 871.215299] FAULT_INJECTION: forcing a failure. [ 871.215299] name failslab, interval 1, probability 0, space 0, times 0 [ 871.250898] CPU: 1 PID: 1161 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 871.258713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 871.268068] Call Trace: [ 871.270653] dump_stack+0x1b2/0x281 [ 871.274285] should_fail.cold+0x10a/0x149 [ 871.278441] should_failslab+0xd6/0x130 [ 871.282421] kmem_cache_alloc+0x28e/0x3c0 [ 871.286573] getname_flags+0xc8/0x550 [ 871.290384] do_sys_open+0x1ce/0x410 [ 871.294109] ? filp_open+0x60/0x60 [ 871.297721] ? do_syscall_64+0x4c/0x640 [ 871.300201] FAULT_INJECTION: forcing a failure. [ 871.300201] name failslab, interval 1, probability 0, space 0, times 0 [ 871.301710] ? SyS_open+0x30/0x30 [ 871.301722] do_syscall_64+0x1d5/0x640 [ 871.301739] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 871.325407] RIP: 0033:0x7f91fb8f9124 [ 871.329114] RSP: 002b:00007f91fa2baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 871.336824] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb8f9124 [ 871.344192] RDX: 0000000000000002 RSI: 00007f91fa2bafe0 RDI: 00000000ffffff9c [ 871.351495] RBP: 00007f91fa2bafe0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 871.358764] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 22:39:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) accept4$netrom(r4, &(0x7f0000000240)={{0x3, @netrom}, [@default, @remote, @bcast, @remote, @default, @null, @netrom, @default]}, &(0x7f00000002c0)=0x48, 0x80000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) (async) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) (async) accept4$netrom(r4, &(0x7f0000000240)={{0x3, @netrom}, [@default, @remote, @bcast, @remote, @default, @null, @netrom, @default]}, &(0x7f00000002c0)=0x48, 0x80000) (async) 22:39:07 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "eff33651091025e75ff3348812860c3c6c539d19a20fdd682524cac07f8f3ee719a9f2eb75aba10ed4a5bfcf614d91f152d8188eecd0ec1935f1c0b0832649fa"}, 0x48, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000340)='rxrpc\x00', 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 871.366034] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 871.378386] XFS (loop0): Invalid superblock magic number [ 871.422755] CPU: 0 PID: 1171 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 871.430577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 871.439931] Call Trace: [ 871.442520] dump_stack+0x1b2/0x281 [ 871.446157] should_fail.cold+0x10a/0x149 [ 871.450306] should_failslab+0xd6/0x130 [ 871.454284] kmem_cache_alloc+0x28e/0x3c0 [ 871.458432] get_empty_filp+0x86/0x3f0 [ 871.462322] path_openat+0x84/0x2970 [ 871.466047] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 871.470897] ? path_lookupat+0x780/0x780 [ 871.473965] FAULT_INJECTION: forcing a failure. [ 871.473965] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 871.474958] ? trace_hardirqs_on+0x10/0x10 [ 871.490964] ? fsnotify+0x974/0x11b0 [ 871.494663] ? shmem_setattr+0x241/0xbf0 [ 871.498713] do_filp_open+0x179/0x3c0 [ 871.502500] ? may_open_dev+0xe0/0xe0 [ 871.506284] ? __alloc_fd+0x1be/0x490 [ 871.510069] ? lock_downgrade+0x740/0x740 [ 871.514201] ? do_raw_spin_unlock+0x164/0x220 [ 871.518681] ? _raw_spin_unlock+0x29/0x40 [ 871.522811] ? __alloc_fd+0x1be/0x490 [ 871.526600] do_sys_open+0x296/0x410 [ 871.530296] ? filp_open+0x60/0x60 [ 871.533826] ? do_syscall_64+0x4c/0x640 [ 871.537786] ? SyS_open+0x30/0x30 [ 871.541224] do_syscall_64+0x1d5/0x640 [ 871.545095] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 871.550264] RIP: 0033:0x7f2645908124 [ 871.553957] RSP: 002b:00007f26442c9eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 871.561651] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645908124 22:39:07 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}]}) 22:39:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 7) 22:39:07 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "eff33651091025e75ff3348812860c3c6c539d19a20fdd682524cac07f8f3ee719a9f2eb75aba10ed4a5bfcf614d91f152d8188eecd0ec1935f1c0b0832649fa"}, 0x48, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000340)='rxrpc\x00', 0x0) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 871.568904] RDX: 0000000000000002 RSI: 00007f26442c9fe0 RDI: 00000000ffffff9c [ 871.576154] RBP: 00007f26442c9fe0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 871.583405] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 871.590654] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 871.597921] CPU: 1 PID: 1186 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 871.605719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 871.615068] Call Trace: [ 871.617671] dump_stack+0x1b2/0x281 [ 871.621300] should_fail.cold+0x10a/0x149 [ 871.625449] __alloc_pages_nodemask+0x22c/0x2720 [ 871.630224] ? static_obj+0x50/0x50 [ 871.633940] ? trace_hardirqs_on+0x10/0x10 [ 871.638446] ? __lock_acquire+0x5fc/0x3f20 [ 871.642691] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 871.647529] ? __lock_acquire+0x5fc/0x3f20 [ 871.651762] ? simple_xattr_get+0xe5/0x160 [ 871.655999] ? fsnotify+0x974/0x11b0 [ 871.659723] ? shmem_setattr+0x241/0xbf0 [ 871.663876] ? __fsnotify_inode_delete+0x20/0x20 [ 871.668640] cache_grow_begin+0x91/0x700 [ 871.672703] ? fs_reclaim_release+0xd0/0x110 [ 871.677113] ? check_preemption_disabled+0x35/0x240 [ 871.682133] cache_alloc_refill+0x273/0x350 [ 871.686460] kmem_cache_alloc+0x333/0x3c0 [ 871.690625] getname_flags+0xc8/0x550 [ 871.694429] do_sys_open+0x1ce/0x410 [ 871.698141] ? filp_open+0x60/0x60 [ 871.701722] ? do_syscall_64+0x4c/0x640 [ 871.705703] ? SyS_open+0x30/0x30 [ 871.709159] do_syscall_64+0x1d5/0x640 [ 871.713055] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 871.718245] RIP: 0033:0x7f91fb8f9124 [ 871.721956] RSP: 002b:00007f91fa2baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 871.729664] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb8f9124 [ 871.736930] RDX: 0000000000000002 RSI: 00007f91fa2bafe0 RDI: 00000000ffffff9c [ 871.744485] RBP: 00007f91fa2bafe0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 871.751750] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 871.759026] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:07 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x7fff, 0x80, 0x0, 0x402, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x80, 0x10, 0x401, 0x8, {{0x15, 0x4, 0x3, 0x1c, 0x54, 0x65, 0x0, 0x9, 0x2f, 0x0, @rand_addr=0x64010101, @private=0xa010102, {[@ra={0x94, 0x4}, @end, @ssrr={0x89, 0x13, 0xd2, [@empty, @loopback, @multicast2, @private=0xa010101]}, @ra={0x94, 0x4, 0x9}, @rr={0x7, 0x17, 0xe1, [@dev={0xac, 0x14, 0x14, 0x3e}, @multicast2, @loopback, @loopback, @remote]}, @generic={0x82, 0x6, "92662c29"}, @ra={0x94, 0x4}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0x8, 0x9a1, 0x800, r1, 0x2f06e34f, '\x00', r3, r4, 0x0, 0x3, 0x1, 0x2}, 0x48) 22:39:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) (async, rerun: 32) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async, rerun: 32) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) (async, rerun: 32) accept4$netrom(r4, &(0x7f0000000240)={{0x3, @netrom}, [@default, @remote, @bcast, @remote, @default, @null, @netrom, @default]}, &(0x7f00000002c0)=0x48, 0x80000) (rerun: 32) [ 871.784879] XFS (loop1): Invalid superblock magic number 22:39:07 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x7fff, 0x80, 0x0, 0x402, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x80, 0x10, 0x401, 0x8, {{0x15, 0x4, 0x3, 0x1c, 0x54, 0x65, 0x0, 0x9, 0x2f, 0x0, @rand_addr=0x64010101, @private=0xa010102, {[@ra={0x94, 0x4}, @end, @ssrr={0x89, 0x13, 0xd2, [@empty, @loopback, @multicast2, @private=0xa010101]}, @ra={0x94, 0x4, 0x9}, @rr={0x7, 0x17, 0xe1, [@dev={0xac, 0x14, 0x14, 0x3e}, @multicast2, @loopback, @loopback, @remote]}, @generic={0x82, 0x6, "92662c29"}, @ra={0x94, 0x4}]}}}}}) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0x8, 0x9a1, 0x800, r1, 0x2f06e34f, '\x00', r3, r4, 0x0, 0x3, 0x1, 0x2}, 0x48) [ 871.878170] XFS (loop0): Invalid superblock magic number [ 871.943221] XFS (loop2): Invalid superblock magic number [ 871.965024] XFS (loop1): Invalid superblock magic number 22:39:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 9) 22:39:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"b3e2d44f81cd1c7deed830c4dd28f161", r1, 0x0, {0xff, 0x3}, {0x800, 0x5}, 0xfff, [0x9, 0xffffffffffffa71f, 0x41, 0x0, 0x8000000000000000, 0x9, 0x100000000, 0x267, 0x7fffffff, 0x3, 0x401, 0x10000, 0x1, 0x10001, 0x2, 0xf6]}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @multicast, 'geneve0\x00'}}, 0x1e) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0)=0x7f, 0x4) 22:39:08 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}]}) 22:39:08 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$alg(0x26, 0x5, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x7fff, 0x80, 0x0, 0x402, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) (rerun: 32) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x80, 0x10, 0x401, 0x8, {{0x15, 0x4, 0x3, 0x1c, 0x54, 0x65, 0x0, 0x9, 0x2f, 0x0, @rand_addr=0x64010101, @private=0xa010102, {[@ra={0x94, 0x4}, @end, @ssrr={0x89, 0x13, 0xd2, [@empty, @loopback, @multicast2, @private=0xa010101]}, @ra={0x94, 0x4, 0x9}, @rr={0x7, 0x17, 0xe1, [@dev={0xac, 0x14, 0x14, 0x3e}, @multicast2, @loopback, @loopback, @remote]}, @generic={0x82, 0x6, "92662c29"}, @ra={0x94, 0x4}]}}}}}) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0x8, 0x9a1, 0x800, r1, 0x2f06e34f, '\x00', r3, r4, 0x0, 0x3, 0x1, 0x2}, 0x48) 22:39:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 8) 22:39:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"b3e2d44f81cd1c7deed830c4dd28f161", r1, 0x0, {0xff, 0x3}, {0x800, 0x5}, 0xfff, [0x9, 0xffffffffffffa71f, 0x41, 0x0, 0x8000000000000000, 0x9, 0x100000000, 0x267, 0x7fffffff, 0x3, 0x401, 0x10000, 0x1, 0x10001, 0x2, 0xf6]}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @multicast, 'geneve0\x00'}}, 0x1e) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0)=0x7f, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"b3e2d44f81cd1c7deed830c4dd28f161", r1, 0x0, {0xff, 0x3}, {0x800, 0x5}, 0xfff, [0x9, 0xffffffffffffa71f, 0x41, 0x0, 0x8000000000000000, 0x9, 0x100000000, 0x267, 0x7fffffff, 0x3, 0x401, 0x10000, 0x1, 0x10001, 0x2, 0xf6]}) (async) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @multicast, 'geneve0\x00'}}, 0x1e) (async) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0)=0x7f, 0x4) (async) [ 872.104480] FAULT_INJECTION: forcing a failure. [ 872.104480] name failslab, interval 1, probability 0, space 0, times 0 [ 872.118736] FAULT_INJECTION: forcing a failure. [ 872.118736] name failslab, interval 1, probability 0, space 0, times 0 [ 872.147327] CPU: 1 PID: 1263 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 872.155148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 872.164601] Call Trace: [ 872.167195] dump_stack+0x1b2/0x281 [ 872.170823] should_fail.cold+0x10a/0x149 [ 872.175021] should_failslab+0xd6/0x130 [ 872.179436] kmem_cache_alloc_trace+0x29a/0x3d0 [ 872.184117] apparmor_file_alloc_security+0x129/0x800 [ 872.189316] security_file_alloc+0x66/0xa0 [ 872.193573] ? selinux_is_enabled+0x5/0x50 [ 872.197816] get_empty_filp+0x16b/0x3f0 [ 872.201802] path_openat+0x84/0x2970 [ 872.205528] ? path_lookupat+0x780/0x780 [ 872.209592] ? trace_hardirqs_on+0x10/0x10 [ 872.213825] ? fsnotify+0x974/0x11b0 [ 872.217555] ? shmem_setattr+0x241/0xbf0 [ 872.221619] do_filp_open+0x179/0x3c0 [ 872.225420] ? may_open_dev+0xe0/0xe0 [ 872.229219] ? __alloc_fd+0x1be/0x490 [ 872.233026] ? lock_downgrade+0x740/0x740 [ 872.237178] ? do_raw_spin_unlock+0x164/0x220 [ 872.241681] ? _raw_spin_unlock+0x29/0x40 [ 872.245826] ? __alloc_fd+0x1be/0x490 [ 872.249632] do_sys_open+0x296/0x410 [ 872.253344] ? filp_open+0x60/0x60 [ 872.256886] ? do_syscall_64+0x4c/0x640 [ 872.260856] ? SyS_open+0x30/0x30 [ 872.264313] do_syscall_64+0x1d5/0x640 [ 872.268207] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.273388] RIP: 0033:0x7f91fb8f9124 [ 872.277103] RSP: 002b:00007f91fa2baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 872.284844] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb8f9124 [ 872.292113] RDX: 0000000000000002 RSI: 00007f91fa2bafe0 RDI: 00000000ffffff9c [ 872.299472] RBP: 00007f91fa2bafe0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 872.306741] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 872.314012] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 872.328661] CPU: 1 PID: 1264 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 872.336460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 872.345822] Call Trace: [ 872.348418] dump_stack+0x1b2/0x281 [ 872.352051] should_fail.cold+0x10a/0x149 [ 872.356201] should_failslab+0xd6/0x130 [ 872.360179] kmem_cache_alloc_trace+0x29a/0x3d0 [ 872.364853] apparmor_file_alloc_security+0x129/0x800 [ 872.370052] security_file_alloc+0x66/0xa0 [ 872.374290] ? selinux_is_enabled+0x5/0x50 [ 872.378528] get_empty_filp+0x16b/0x3f0 [ 872.382505] path_openat+0x84/0x2970 [ 872.386224] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 872.391193] ? path_lookupat+0x780/0x780 [ 872.395274] ? trace_hardirqs_on+0x10/0x10 [ 872.399517] ? fsnotify+0x974/0x11b0 [ 872.403325] ? shmem_setattr+0x241/0xbf0 [ 872.407391] do_filp_open+0x179/0x3c0 [ 872.411196] ? may_open_dev+0xe0/0xe0 [ 872.415004] ? __alloc_fd+0x1be/0x490 [ 872.418812] ? lock_downgrade+0x740/0x740 [ 872.422963] ? do_raw_spin_unlock+0x164/0x220 [ 872.427466] ? _raw_spin_unlock+0x29/0x40 [ 872.431819] ? __alloc_fd+0x1be/0x490 [ 872.435627] do_sys_open+0x296/0x410 [ 872.439344] ? filp_open+0x60/0x60 [ 872.443927] ? do_syscall_64+0x4c/0x640 [ 872.447898] ? SyS_open+0x30/0x30 [ 872.451359] do_syscall_64+0x1d5/0x640 [ 872.455244] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.460431] RIP: 0033:0x7f2645908124 [ 872.464135] RSP: 002b:00007f26442c9eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 872.471841] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645908124 [ 872.479134] RDX: 0000000000000002 RSI: 00007f26442c9fe0 RDI: 00000000ffffff9c [ 872.486421] RBP: 00007f26442c9fe0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 872.493695] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 22:39:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"b3e2d44f81cd1c7deed830c4dd28f161", r1, 0x0, {0xff, 0x3}, {0x800, 0x5}, 0xfff, [0x9, 0xffffffffffffa71f, 0x41, 0x0, 0x8000000000000000, 0x9, 0x100000000, 0x267, 0x7fffffff, 0x3, 0x401, 0x10000, 0x1, 0x10001, 0x2, 0xf6]}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @multicast, 'geneve0\x00'}}, 0x1e) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0)=0x7f, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"b3e2d44f81cd1c7deed830c4dd28f161", r1, 0x0, {0xff, 0x3}, {0x800, 0x5}, 0xfff, [0x9, 0xffffffffffffa71f, 0x41, 0x0, 0x8000000000000000, 0x9, 0x100000000, 0x267, 0x7fffffff, 0x3, 0x401, 0x10000, 0x1, 0x10001, 0x2, 0xf6]}) (async) connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @multicast, 'geneve0\x00'}}, 0x1e) (async) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000001c0)=0x7f, 0x4) (async) 22:39:08 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$can_raw(0x1d, 0x3, 0x1) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @private}, &(0x7f0000000080)=0xc) sendmsg$can_raw(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x1d, r2}, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x4, 0x1, 0x1, 0x1}, 0x0, 0x3, 0x0, 0x0, "f742d55485c5afd2"}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0x4, 0x4) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'erspan0\x00', r2, 0x700, 0x700, 0xffff, 0x5, {{0xe, 0x4, 0x0, 0x1, 0x38, 0x68, 0x0, 0x1, 0x2f, 0x0, @private=0xa010100, @remote, {[@timestamp={0x44, 0x24, 0xa4, 0x0, 0x8, [0x1, 0x80000001, 0x7, 0x4b3, 0x3, 0x80, 0x1, 0x4]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r5, 0x65, 0x6, 0x0, 0x0) bind$netrom(r5, &(0x7f00000003c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000380)={'gre0\x00', &(0x7f0000000300)={'sit0\x00', r4, 0x20, 0x80, 0x7, 0x1, {{0xc, 0x4, 0x1, 0x4, 0x30, 0x67, 0x0, 0x8, 0x2f, 0x0, @private=0xa010100, @rand_addr=0x64010102, {[@rr={0x7, 0x1b, 0xbf, [@rand_addr=0x64010102, @private=0xa010102, @rand_addr=0x64010100, @multicast1, @rand_addr=0x64010100, @remote]}]}}}}}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 872.500971] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 9) 22:39:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 10) [ 872.534025] FAULT_INJECTION: forcing a failure. [ 872.534025] name failslab, interval 1, probability 0, space 0, times 0 [ 872.538050] XFS (loop0): Invalid superblock magic number [ 872.548712] FAULT_INJECTION: forcing a failure. [ 872.548712] name failslab, interval 1, probability 0, space 0, times 0 [ 872.562965] CPU: 1 PID: 1298 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 872.570770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 872.580120] Call Trace: 22:39:08 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$can_raw(0x1d, 0x3, 0x1) (async) socket$pppoe(0x18, 0x1, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @private}, &(0x7f0000000080)=0xc) sendmsg$can_raw(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x1d, r2}, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x4, 0x1, 0x1, 0x1}, 0x0, 0x3, 0x0, 0x0, "f742d55485c5afd2"}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) (async) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0x4, 0x4) (async) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'erspan0\x00', r2, 0x700, 0x700, 0xffff, 0x5, {{0xe, 0x4, 0x0, 0x1, 0x38, 0x68, 0x0, 0x1, 0x2f, 0x0, @private=0xa010100, @remote, {[@timestamp={0x44, 0x24, 0xa4, 0x0, 0x8, [0x1, 0x80000001, 0x7, 0x4b3, 0x3, 0x80, 0x1, 0x4]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r5, 0x65, 0x6, 0x0, 0x0) (async) bind$netrom(r5, &(0x7f00000003c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000380)={'gre0\x00', &(0x7f0000000300)={'sit0\x00', r4, 0x20, 0x80, 0x7, 0x1, {{0xc, 0x4, 0x1, 0x4, 0x30, 0x67, 0x0, 0x8, 0x2f, 0x0, @private=0xa010100, @rand_addr=0x64010102, {[@rr={0x7, 0x1b, 0xbf, [@rand_addr=0x64010102, @private=0xa010102, @rand_addr=0x64010100, @multicast1, @rand_addr=0x64010100, @remote]}]}}}}}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 872.582708] dump_stack+0x1b2/0x281 [ 872.586337] should_fail.cold+0x10a/0x149 [ 872.590500] should_failslab+0xd6/0x130 [ 872.594476] kmem_cache_alloc_trace+0x29a/0x3d0 [ 872.599160] apparmor_file_alloc_security+0x129/0x800 [ 872.604356] security_file_alloc+0x66/0xa0 [ 872.608588] ? selinux_is_enabled+0x5/0x50 [ 872.612913] get_empty_filp+0x16b/0x3f0 [ 872.616888] path_openat+0x84/0x2970 [ 872.620608] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 872.625456] ? path_lookupat+0x780/0x780 [ 872.629516] ? trace_hardirqs_on+0x10/0x10 [ 872.633800] ? fsnotify+0x974/0x11b0 [ 872.637513] ? shmem_setattr+0x241/0xbf0 [ 872.641577] do_filp_open+0x179/0x3c0 [ 872.645380] ? may_open_dev+0xe0/0xe0 [ 872.649182] ? __alloc_fd+0x1be/0x490 [ 872.653076] ? lock_downgrade+0x740/0x740 [ 872.657227] ? do_raw_spin_unlock+0x164/0x220 [ 872.662196] ? _raw_spin_unlock+0x29/0x40 [ 872.666350] ? __alloc_fd+0x1be/0x490 [ 872.669468] XFS (loop1): Invalid superblock magic number [ 872.670151] do_sys_open+0x296/0x410 [ 872.679316] ? filp_open+0x60/0x60 [ 872.682888] ? do_syscall_64+0x4c/0x640 [ 872.686857] ? SyS_open+0x30/0x30 [ 872.690311] do_syscall_64+0x1d5/0x640 [ 872.694209] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.699402] RIP: 0033:0x7f91fb8f9124 [ 872.703113] RSP: 002b:00007f91fa2baeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 872.710909] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb8f9124 [ 872.718182] RDX: 0000000000000002 RSI: 00007f91fa2bafe0 RDI: 00000000ffffff9c [ 872.725452] RBP: 00007f91fa2bafe0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 22:39:08 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$can_raw(0x1d, 0x3, 0x1) (async) socket$pppoe(0x18, 0x1, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @private}, &(0x7f0000000080)=0xc) sendmsg$can_raw(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x1d, r2}, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x4, 0x1, 0x1, 0x1}, 0x0, 0x3, 0x0, 0x0, "f742d55485c5afd2"}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f00000001c0)=0x4, 0x4) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000240)={'erspan0\x00', r2, 0x700, 0x700, 0xffff, 0x5, {{0xe, 0x4, 0x0, 0x1, 0x38, 0x68, 0x0, 0x1, 0x2f, 0x0, @private=0xa010100, @remote, {[@timestamp={0x44, 0x24, 0xa4, 0x0, 0x8, [0x1, 0x80000001, 0x7, 0x4b3, 0x3, 0x80, 0x1, 0x4]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r5, 0x65, 0x6, 0x0, 0x0) (async) bind$netrom(r5, &(0x7f00000003c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000380)={'gre0\x00', &(0x7f0000000300)={'sit0\x00', r4, 0x20, 0x80, 0x7, 0x1, {{0xc, 0x4, 0x1, 0x4, 0x30, 0x67, 0x0, 0x8, 0x2f, 0x0, @private=0xa010100, @rand_addr=0x64010102, {[@rr={0x7, 0x1b, 0xbf, [@rand_addr=0x64010102, @private=0xa010102, @rand_addr=0x64010100, @multicast1, @rand_addr=0x64010100, @remote]}]}}}}}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 10) [ 872.732722] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 872.739995] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 872.792835] CPU: 1 PID: 1301 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 872.800653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 872.810004] Call Trace: [ 872.812577] dump_stack+0x1b2/0x281 [ 872.816187] should_fail.cold+0x10a/0x149 [ 872.820334] should_failslab+0xd6/0x130 [ 872.824301] kmem_cache_alloc_trace+0x29a/0x3d0 [ 872.829005] apparmor_file_alloc_security+0x129/0x800 [ 872.834182] security_file_alloc+0x66/0xa0 [ 872.838406] ? selinux_is_enabled+0x5/0x50 [ 872.842635] get_empty_filp+0x16b/0x3f0 [ 872.846604] path_openat+0x84/0x2970 [ 872.850311] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 872.855146] ? path_lookupat+0x780/0x780 [ 872.859262] ? trace_hardirqs_on+0x10/0x10 [ 872.863497] ? fsnotify+0x974/0x11b0 [ 872.867193] ? shmem_setattr+0x241/0xbf0 [ 872.871311] do_filp_open+0x179/0x3c0 [ 872.875110] ? may_open_dev+0xe0/0xe0 [ 872.878910] ? __alloc_fd+0x1be/0x490 [ 872.882749] ? lock_downgrade+0x740/0x740 [ 872.886897] ? do_raw_spin_unlock+0x164/0x220 [ 872.891508] ? _raw_spin_unlock+0x29/0x40 [ 872.895642] ? __alloc_fd+0x1be/0x490 [ 872.899450] do_sys_open+0x296/0x410 [ 872.903259] ? filp_open+0x60/0x60 [ 872.906784] ? do_syscall_64+0x4c/0x640 [ 872.910922] ? SyS_open+0x30/0x30 [ 872.914366] do_syscall_64+0x1d5/0x640 [ 872.918255] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 872.923436] RIP: 0033:0x7f2645908124 [ 872.927133] RSP: 002b:00007f26442c9eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 872.934955] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645908124 22:39:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:09 executing program 5: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:09 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) [ 872.942217] RDX: 0000000000000002 RSI: 00007f26442c9fe0 RDI: 00000000ffffff9c [ 872.949543] RBP: 00007f26442c9fe0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 872.956888] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 872.964237] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 872.987357] FAULT_INJECTION: forcing a failure. 22:39:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 11) [ 872.987357] name failslab, interval 1, probability 0, space 0, times 0 [ 873.017476] CPU: 1 PID: 1325 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 873.025302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 873.034654] Call Trace: [ 873.037248] dump_stack+0x1b2/0x281 [ 873.040968] should_fail.cold+0x10a/0x149 [ 873.045120] should_failslab+0xd6/0x130 [ 873.049104] kmem_cache_alloc_trace+0x29a/0x3d0 [ 873.053784] ? loop_get_status64+0x100/0x100 [ 873.058200] __kthread_create_on_node+0xbe/0x3a0 [ 873.062961] ? kthread_park+0x130/0x130 [ 873.066952] ? loop_get_status64+0x100/0x100 [ 873.071363] kthread_create_on_node+0xa8/0xd0 [ 873.075866] ? __kthread_create_on_node+0x3a0/0x3a0 [ 873.080898] ? __lockdep_init_map+0x100/0x560 [ 873.085401] ? __lockdep_init_map+0x100/0x560 [ 873.089920] lo_ioctl+0xcd9/0x1cd0 [ 873.093471] ? loop_set_status64+0xe0/0xe0 [ 873.097841] blkdev_ioctl+0x540/0x1830 [ 873.101738] ? blkpg_ioctl+0x8d0/0x8d0 [ 873.105631] ? trace_hardirqs_on+0x10/0x10 [ 873.109872] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 873.114977] ? debug_check_no_obj_freed+0x2c0/0x680 [ 873.120001] block_ioctl+0xd9/0x120 [ 873.123631] ? blkdev_fallocate+0x3a0/0x3a0 [ 873.127957] do_vfs_ioctl+0x75a/0xff0 [ 873.131765] ? lock_acquire+0x170/0x3f0 [ 873.135740] ? ioctl_preallocate+0x1a0/0x1a0 [ 873.140151] ? __fget+0x265/0x3e0 [ 873.143609] ? do_vfs_ioctl+0xff0/0xff0 [ 873.147586] ? security_file_ioctl+0x83/0xb0 [ 873.151997] SyS_ioctl+0x7f/0xb0 [ 873.155452] ? do_vfs_ioctl+0xff0/0xff0 [ 873.159441] do_syscall_64+0x1d5/0x640 22:39:09 executing program 5: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:09 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) [ 873.163335] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.168526] RIP: 0033:0x7f91fb945fc7 [ 873.172231] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 873.180029] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 873.187309] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 873.194580] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 873.201853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 873.209302] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 873.251293] FAULT_INJECTION: forcing a failure. [ 873.251293] name failslab, interval 1, probability 0, space 0, times 0 [ 873.274393] CPU: 1 PID: 1342 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 873.282297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 873.291655] Call Trace: [ 873.294251] dump_stack+0x1b2/0x281 [ 873.297975] should_fail.cold+0x10a/0x149 [ 873.302135] should_failslab+0xd6/0x130 [ 873.306291] kmem_cache_alloc+0x28e/0x3c0 [ 873.310449] __kernfs_new_node+0x6f/0x470 [ 873.314600] kernfs_new_node+0x7b/0xe0 [ 873.318489] __kernfs_create_file+0x3d/0x320 [ 873.322906] sysfs_add_file_mode_ns+0x1e1/0x450 [ 873.327574] ? kernfs_create_dir_ns+0x171/0x200 [ 873.332241] internal_create_group+0x22b/0x710 [ 873.336828] lo_ioctl+0x1137/0x1cd0 [ 873.340457] ? loop_set_status64+0xe0/0xe0 [ 873.344693] blkdev_ioctl+0x540/0x1830 [ 873.348581] ? blkpg_ioctl+0x8d0/0x8d0 [ 873.352463] ? trace_hardirqs_on+0x10/0x10 [ 873.356698] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 873.361804] ? debug_check_no_obj_freed+0x2c0/0x680 [ 873.366822] block_ioctl+0xd9/0x120 [ 873.370449] ? blkdev_fallocate+0x3a0/0x3a0 [ 873.374940] do_vfs_ioctl+0x75a/0xff0 [ 873.378738] ? lock_acquire+0x170/0x3f0 [ 873.382714] ? ioctl_preallocate+0x1a0/0x1a0 [ 873.387121] ? __fget+0x265/0x3e0 [ 873.390574] ? do_vfs_ioctl+0xff0/0xff0 [ 873.394559] ? security_file_ioctl+0x83/0xb0 [ 873.398967] SyS_ioctl+0x7f/0xb0 [ 873.402339] ? do_vfs_ioctl+0xff0/0xff0 [ 873.406325] do_syscall_64+0x1d5/0x640 [ 873.410214] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.415404] RIP: 0033:0x7f2645954fc7 [ 873.419109] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 873.426904] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 873.434179] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 873.441497] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 22:39:09 executing program 5: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:09 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) (async) 22:39:09 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"329e5a76964ad04fe4aeab41082e03f9", 0x0, 0x0, {0x8000000000000000}, {0x4, 0x5}, 0x1, [0x2, 0x10000, 0x0, 0xfffffffffffff001, 0xffffffffffffffff, 0x3ff, 0x9, 0x8, 0x200, 0x6, 0x9, 0x3, 0xfffffffffffffffc, 0x5ccb, 0x2, 0x3]}) [ 873.448762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 873.456114] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 11) 22:39:09 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"329e5a76964ad04fe4aeab41082e03f9", 0x0, 0x0, {0x8000000000000000}, {0x4, 0x5}, 0x1, [0x2, 0x10000, 0x0, 0xfffffffffffff001, 0xffffffffffffffff, 0x3ff, 0x9, 0x8, 0x200, 0x6, 0x9, 0x3, 0xfffffffffffffffc, 0x5ccb, 0x2, 0x3]}) [ 873.509072] XFS (loop0): Invalid superblock magic number [ 873.534292] XFS (loop1): Invalid superblock magic number [ 873.548384] FAULT_INJECTION: forcing a failure. [ 873.548384] name failslab, interval 1, probability 0, space 0, times 0 22:39:09 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:09 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000000)={"329e5a76964ad04fe4aeab41082e03f9", 0x0, 0x0, {0x8000000000000000}, {0x4, 0x5}, 0x1, [0x2, 0x10000, 0x0, 0xfffffffffffff001, 0xffffffffffffffff, 0x3ff, 0x9, 0x8, 0x200, 0x6, 0x9, 0x3, 0xfffffffffffffffc, 0x5ccb, 0x2, 0x3]}) 22:39:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}]}) [ 873.592922] CPU: 0 PID: 1374 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 873.600736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 873.610095] Call Trace: [ 873.612700] dump_stack+0x1b2/0x281 [ 873.616329] should_fail.cold+0x10a/0x149 [ 873.620485] should_failslab+0xd6/0x130 [ 873.624466] kmem_cache_alloc+0x28e/0x3c0 [ 873.628617] __kernfs_new_node+0x6f/0x470 [ 873.632769] kernfs_create_dir_ns+0x8c/0x200 [ 873.637178] internal_create_group+0xe9/0x710 [ 873.641681] lo_ioctl+0x1137/0x1cd0 [ 873.645572] ? loop_set_status64+0xe0/0xe0 [ 873.649808] blkdev_ioctl+0x540/0x1830 [ 873.653703] ? blkpg_ioctl+0x8d0/0x8d0 [ 873.657587] ? trace_hardirqs_on+0x10/0x10 [ 873.661993] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 873.664951] XFS (loop4): Invalid superblock magic number [ 873.667113] ? debug_check_no_obj_freed+0x2c0/0x680 [ 873.667162] block_ioctl+0xd9/0x120 [ 873.681459] ? blkdev_fallocate+0x3a0/0x3a0 [ 873.685778] do_vfs_ioctl+0x75a/0xff0 [ 873.689566] ? lock_acquire+0x170/0x3f0 [ 873.693533] ? ioctl_preallocate+0x1a0/0x1a0 [ 873.697924] ? __fget+0x265/0x3e0 [ 873.701359] ? do_vfs_ioctl+0xff0/0xff0 [ 873.705376] ? security_file_ioctl+0x83/0xb0 [ 873.709767] SyS_ioctl+0x7f/0xb0 [ 873.713132] ? do_vfs_ioctl+0xff0/0xff0 [ 873.717092] do_syscall_64+0x1d5/0x640 [ 873.720966] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 873.726201] RIP: 0033:0x7f91fb945fc7 [ 873.730057] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:39:09 executing program 3: bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 873.737750] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 873.745003] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 873.752262] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 873.759519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 873.766767] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 12) 22:39:09 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000100)=0x40000455, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast2, @local}, &(0x7f0000000080)=0xc) 22:39:09 executing program 3: bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) (async) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:09 executing program 3: bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:09 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000100)=0x40000455, 0x4) (async) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast2, @local}, &(0x7f0000000080)=0xc) 22:39:09 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000100)=0x40000455, 0x4) (async) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast2, @local}, &(0x7f0000000080)=0xc) [ 873.894126] FAULT_INJECTION: forcing a failure. [ 873.894126] name failslab, interval 1, probability 0, space 0, times 0 [ 873.906122] XFS (loop1): Invalid superblock magic number [ 873.919263] XFS (loop0): Invalid superblock magic number [ 873.926707] XFS (loop2): Invalid superblock magic number [ 873.927352] CPU: 0 PID: 1426 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 873.940003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 873.949354] Call Trace: [ 873.951940] dump_stack+0x1b2/0x281 [ 873.955693] should_fail.cold+0x10a/0x149 [ 873.959940] should_failslab+0xd6/0x130 [ 873.963917] kmem_cache_alloc+0x28e/0x3c0 [ 873.968068] __kernfs_new_node+0x6f/0x470 [ 873.972222] kernfs_new_node+0x7b/0xe0 [ 873.976115] __kernfs_create_file+0x3d/0x320 [ 873.980525] sysfs_add_file_mode_ns+0x1e1/0x450 [ 873.985219] ? kernfs_create_dir_ns+0x171/0x200 [ 873.989890] internal_create_group+0x22b/0x710 [ 873.994577] lo_ioctl+0x1137/0x1cd0 [ 873.998209] ? loop_set_status64+0xe0/0xe0 [ 874.002444] blkdev_ioctl+0x540/0x1830 [ 874.006331] ? blkpg_ioctl+0x8d0/0x8d0 [ 874.010212] ? trace_hardirqs_on+0x10/0x10 [ 874.014447] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 874.019547] ? debug_check_no_obj_freed+0x2c0/0x680 [ 874.024564] block_ioctl+0xd9/0x120 [ 874.028189] ? blkdev_fallocate+0x3a0/0x3a0 [ 874.032506] do_vfs_ioctl+0x75a/0xff0 [ 874.036304] ? lock_acquire+0x170/0x3f0 [ 874.040273] ? ioctl_preallocate+0x1a0/0x1a0 [ 874.044689] ? __fget+0x265/0x3e0 [ 874.048140] ? do_vfs_ioctl+0xff0/0xff0 [ 874.052113] ? security_file_ioctl+0x83/0xb0 [ 874.056523] SyS_ioctl+0x7f/0xb0 [ 874.059880] ? do_vfs_ioctl+0xff0/0xff0 [ 874.063852] do_syscall_64+0x1d5/0x640 [ 874.067751] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 874.072979] RIP: 0033:0x7f2645954fc7 [ 874.076688] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 874.084392] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 874.091690] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 874.098957] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 874.106223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 874.113488] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 12) 22:39:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) 22:39:10 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$l2tp6(0xa, 0x2, 0x73) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000000c0)=[{{0x3, 0x1, 0x1}, {0x2, 0x0, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1}}, {{0x2, 0x0, 0x1, 0x1}, {0x0, 0x1}}, {{0x2}, {0x2, 0x0, 0x0, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}], 0x38) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) 22:39:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}]}) 22:39:10 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:10 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$l2tp6(0xa, 0x2, 0x73) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000000c0)=[{{0x3, 0x1, 0x1}, {0x2, 0x0, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1}}, {{0x2, 0x0, 0x1, 0x1}, {0x0, 0x1}}, {{0x2}, {0x2, 0x0, 0x0, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}], 0x38) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000000c0)=[{{0x3, 0x1, 0x1}, {0x2, 0x0, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1}}, {{0x2, 0x0, 0x1, 0x1}, {0x0, 0x1}}, {{0x2}, {0x2, 0x0, 0x0, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}], 0x38) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) [ 874.200902] FAULT_INJECTION: forcing a failure. [ 874.200902] name failslab, interval 1, probability 0, space 0, times 0 [ 874.239612] CPU: 1 PID: 1451 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 874.247518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 874.256963] Call Trace: [ 874.259548] dump_stack+0x1b2/0x281 [ 874.263175] should_fail.cold+0x10a/0x149 [ 874.267326] should_failslab+0xd6/0x130 [ 874.271301] kmem_cache_alloc+0x28e/0x3c0 [ 874.275451] __kernfs_new_node+0x6f/0x470 [ 874.279605] kernfs_new_node+0x7b/0xe0 [ 874.283583] __kernfs_create_file+0x3d/0x320 [ 874.287989] sysfs_add_file_mode_ns+0x1e1/0x450 [ 874.292657] ? kernfs_create_dir_ns+0x171/0x200 [ 874.297323] internal_create_group+0x22b/0x710 [ 874.301907] lo_ioctl+0x1137/0x1cd0 [ 874.305535] ? loop_set_status64+0xe0/0xe0 [ 874.309763] blkdev_ioctl+0x540/0x1830 [ 874.313651] ? blkpg_ioctl+0x8d0/0x8d0 [ 874.317540] ? trace_hardirqs_on+0x10/0x10 [ 874.321779] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 874.326876] ? debug_check_no_obj_freed+0x2c0/0x680 [ 874.331893] block_ioctl+0xd9/0x120 [ 874.335518] ? blkdev_fallocate+0x3a0/0x3a0 [ 874.339840] do_vfs_ioctl+0x75a/0xff0 [ 874.343640] ? lock_acquire+0x170/0x3f0 [ 874.347613] ? ioctl_preallocate+0x1a0/0x1a0 [ 874.352025] ? __fget+0x265/0x3e0 [ 874.355484] ? do_vfs_ioctl+0xff0/0xff0 [ 874.359457] ? security_file_ioctl+0x83/0xb0 [ 874.363862] SyS_ioctl+0x7f/0xb0 [ 874.367219] ? do_vfs_ioctl+0xff0/0xff0 [ 874.371191] do_syscall_64+0x1d5/0x640 [ 874.375266] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 874.380446] RIP: 0033:0x7f91fb945fc7 [ 874.384149] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 874.391945] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 874.399237] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 874.406505] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 874.413774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 874.421041] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 874.552197] XFS (loop2): Invalid superblock magic number [ 874.558614] XFS (loop0): Invalid superblock magic number [ 874.564580] XFS (loop1): Invalid superblock magic number [ 874.586133] XFS (loop4): Invalid superblock magic number 22:39:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 13) 22:39:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xffffffff, 0x4) (async) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) 22:39:10 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$l2tp6(0xa, 0x2, 0x73) (async) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000000c0)=[{{0x3, 0x1, 0x1}, {0x2, 0x0, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1}}, {{0x2, 0x0, 0x1, 0x1}, {0x0, 0x1}}, {{0x2}, {0x2, 0x0, 0x0, 0x1}}, {{0x3, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}], 0x38) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) 22:39:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 13) 22:39:10 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}]}) 22:39:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xffffffff, 0x4) (async, rerun: 32) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) (rerun: 32) 22:39:10 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000000)) 22:39:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@bcast, @default, @rose, @default, @rose, @null, @remote, @bcast]}, &(0x7f00000000c0)=0x48, 0x80800) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0xffffffffffffffa1) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000100)=0x1, 0x4) 22:39:10 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000000)) socket$l2tp(0x2, 0x2, 0x73) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000000)) (async) [ 874.732863] FAULT_INJECTION: forcing a failure. [ 874.732863] name failslab, interval 1, probability 0, space 0, times 0 [ 874.746705] CPU: 0 PID: 1534 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 874.754621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 874.764066] Call Trace: [ 874.766718] dump_stack+0x1b2/0x281 [ 874.770348] should_fail.cold+0x10a/0x149 [ 874.774488] should_failslab+0xd6/0x130 [ 874.778445] kmem_cache_alloc+0x28e/0x3c0 [ 874.782576] __kernfs_new_node+0x6f/0x470 [ 874.786715] kernfs_new_node+0x7b/0xe0 [ 874.790584] __kernfs_create_file+0x3d/0x320 [ 874.794981] sysfs_add_file_mode_ns+0x1e1/0x450 [ 874.799628] ? kernfs_create_dir_ns+0x171/0x200 [ 874.804277] internal_create_group+0x22b/0x710 [ 874.808852] lo_ioctl+0x1137/0x1cd0 [ 874.812467] ? loop_set_status64+0xe0/0xe0 [ 874.816690] blkdev_ioctl+0x540/0x1830 [ 874.820557] ? blkpg_ioctl+0x8d0/0x8d0 [ 874.824422] ? trace_hardirqs_on+0x10/0x10 [ 874.828639] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 874.833722] ? debug_check_no_obj_freed+0x2c0/0x680 [ 874.838721] block_ioctl+0xd9/0x120 [ 874.842324] ? blkdev_fallocate+0x3a0/0x3a0 [ 874.846650] do_vfs_ioctl+0x75a/0xff0 [ 874.850436] ? lock_acquire+0x170/0x3f0 [ 874.854394] ? ioctl_preallocate+0x1a0/0x1a0 [ 874.858779] ? __fget+0x265/0x3e0 [ 874.862209] ? do_vfs_ioctl+0xff0/0xff0 [ 874.866624] ? security_file_ioctl+0x83/0xb0 [ 874.871027] SyS_ioctl+0x7f/0xb0 [ 874.874371] ? do_vfs_ioctl+0xff0/0xff0 [ 874.878337] do_syscall_64+0x1d5/0x640 [ 874.882222] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 874.887405] RIP: 0033:0x7f2645954fc7 [ 874.891094] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 874.898787] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 874.906041] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 874.913309] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 874.920568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:39:11 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) [ 874.927821] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 874.950970] FAULT_INJECTION: forcing a failure. [ 874.950970] name failslab, interval 1, probability 0, space 0, times 0 [ 874.963397] CPU: 1 PID: 1533 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 874.971192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 874.971963] XFS (loop1): Invalid superblock magic number [ 874.980559] Call Trace: [ 874.980578] dump_stack+0x1b2/0x281 [ 874.980593] should_fail.cold+0x10a/0x149 [ 874.980605] should_failslab+0xd6/0x130 [ 874.980615] kmem_cache_alloc+0x28e/0x3c0 [ 874.980628] __kernfs_new_node+0x6f/0x470 [ 874.980640] kernfs_new_node+0x7b/0xe0 [ 874.980650] __kernfs_create_file+0x3d/0x320 [ 874.980662] sysfs_add_file_mode_ns+0x1e1/0x450 [ 874.980670] ? kernfs_create_dir_ns+0x171/0x200 [ 874.980679] internal_create_group+0x22b/0x710 [ 874.980692] lo_ioctl+0x1137/0x1cd0 [ 874.980704] ? loop_set_status64+0xe0/0xe0 [ 874.980718] blkdev_ioctl+0x540/0x1830 [ 874.980728] ? blkpg_ioctl+0x8d0/0x8d0 [ 874.980737] ? trace_hardirqs_on+0x10/0x10 [ 874.980750] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 874.980760] ? debug_check_no_obj_freed+0x2c0/0x680 [ 874.980773] block_ioctl+0xd9/0x120 [ 874.980781] ? blkdev_fallocate+0x3a0/0x3a0 [ 874.980790] do_vfs_ioctl+0x75a/0xff0 [ 874.980798] ? lock_acquire+0x170/0x3f0 [ 874.980807] ? ioctl_preallocate+0x1a0/0x1a0 [ 874.980818] ? __fget+0x265/0x3e0 [ 874.980828] ? do_vfs_ioctl+0xff0/0xff0 [ 874.980838] ? security_file_ioctl+0x83/0xb0 [ 874.980848] SyS_ioctl+0x7f/0xb0 [ 875.096887] ? do_vfs_ioctl+0xff0/0xff0 [ 875.100864] do_syscall_64+0x1d5/0x640 [ 875.104772] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.109958] RIP: 0033:0x7f91fb945fc7 [ 875.113793] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 875.121583] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 875.128846] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 875.136120] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 875.143392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 875.150661] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@bcast, @default, @rose, @default, @rose, @null, @remote, @bcast]}, &(0x7f00000000c0)=0x48, 0x80800) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0xffffffffffffffa1) (async) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000100)=0x1, 0x4) [ 875.214373] XFS (loop4): Invalid superblock magic number 22:39:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 14) 22:39:11 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000000)) 22:39:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}]}) 22:39:11 executing program 0: syz_mount_image$xfs(0x0, &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f0000000040)={{0x3, @null}, [@bcast, @default, @rose, @default, @rose, @null, @remote, @bcast]}, &(0x7f00000000c0)=0x48, 0x80800) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0xffffffffffffffa1) (async) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000100)=0x1, 0x4) 22:39:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 14) [ 875.265447] XFS (loop2): Invalid superblock magic number 22:39:11 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x2, 0x94, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x8000, 0x700, 0x1, 0x1}}) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7fff, 0x9, 0x1, 0x1004, r1, 0xfff, '\x00', r2, r3, 0x1, 0x0, 0x4, 0x5}, 0x48) 22:39:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @null, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xfffffff8, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040), 0x4) 22:39:11 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:11 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x2, 0x94, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x8000, 0x700, 0x1, 0x1}}) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7fff, 0x9, 0x1, 0x1004, r1, 0xfff, '\x00', r2, r3, 0x1, 0x0, 0x4, 0x5}, 0x48) 22:39:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @null, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xfffffff8, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}) (async, rerun: 32) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040), 0x4) (rerun: 32) [ 875.413258] FAULT_INJECTION: forcing a failure. [ 875.413258] name failslab, interval 1, probability 0, space 0, times 0 [ 875.430391] FAULT_INJECTION: forcing a failure. [ 875.430391] name failslab, interval 1, probability 0, space 0, times 0 22:39:11 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x2, 0x94, 0x1, @mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x8000, 0x700, 0x1, 0x1}}) pipe2$watch_queue(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x7fff, 0x9, 0x1, 0x1004, r1, 0xfff, '\x00', r2, r3, 0x1, 0x0, 0x4, 0x5}, 0x48) [ 875.489464] CPU: 1 PID: 1609 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 875.497295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 875.506644] Call Trace: [ 875.509231] dump_stack+0x1b2/0x281 [ 875.512861] should_fail.cold+0x10a/0x149 [ 875.517020] should_failslab+0xd6/0x130 [ 875.520998] kmem_cache_alloc+0x28e/0x3c0 [ 875.525157] __kernfs_new_node+0x6f/0x470 [ 875.529321] kernfs_new_node+0x7b/0xe0 [ 875.533212] __kernfs_create_file+0x3d/0x320 [ 875.537622] sysfs_add_file_mode_ns+0x1e1/0x450 [ 875.542289] ? kernfs_create_dir_ns+0x171/0x200 [ 875.546955] internal_create_group+0x22b/0x710 [ 875.551541] lo_ioctl+0x1137/0x1cd0 [ 875.555174] ? loop_set_status64+0xe0/0xe0 [ 875.559413] blkdev_ioctl+0x540/0x1830 [ 875.563295] ? blkpg_ioctl+0x8d0/0x8d0 [ 875.567188] ? trace_hardirqs_on+0x10/0x10 [ 875.571423] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 875.576539] ? debug_check_no_obj_freed+0x2c0/0x680 [ 875.581615] block_ioctl+0xd9/0x120 [ 875.585235] ? blkdev_fallocate+0x3a0/0x3a0 [ 875.589550] do_vfs_ioctl+0x75a/0xff0 [ 875.593346] ? lock_acquire+0x170/0x3f0 [ 875.597314] ? ioctl_preallocate+0x1a0/0x1a0 [ 875.601709] ? __fget+0x265/0x3e0 [ 875.605238] ? do_vfs_ioctl+0xff0/0xff0 [ 875.607304] XFS (loop1): Invalid superblock magic number [ 875.609199] ? security_file_ioctl+0x83/0xb0 [ 875.609210] SyS_ioctl+0x7f/0xb0 [ 875.609218] ? do_vfs_ioctl+0xff0/0xff0 [ 875.609230] do_syscall_64+0x1d5/0x640 [ 875.609245] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.609252] RIP: 0033:0x7f91fb945fc7 [ 875.609257] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 875.609266] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 875.609272] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 875.609277] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 875.609282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 875.609288] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 875.664498] CPU: 1 PID: 1610 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 875.691859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 875.701294] Call Trace: [ 875.703887] dump_stack+0x1b2/0x281 [ 875.707527] should_fail.cold+0x10a/0x149 [ 875.711680] should_failslab+0xd6/0x130 [ 875.715655] kmem_cache_alloc+0x28e/0x3c0 [ 875.719808] __kernfs_new_node+0x6f/0x470 [ 875.723962] kernfs_new_node+0x7b/0xe0 [ 875.727855] __kernfs_create_file+0x3d/0x320 [ 875.732266] sysfs_add_file_mode_ns+0x1e1/0x450 [ 875.736943] ? kernfs_create_dir_ns+0x171/0x200 [ 875.741610] internal_create_group+0x22b/0x710 [ 875.746202] lo_ioctl+0x1137/0x1cd0 [ 875.749838] ? loop_set_status64+0xe0/0xe0 [ 875.754074] blkdev_ioctl+0x540/0x1830 [ 875.757957] ? blkpg_ioctl+0x8d0/0x8d0 [ 875.761848] ? trace_hardirqs_on+0x10/0x10 [ 875.766223] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 875.771324] ? debug_check_no_obj_freed+0x2c0/0x680 [ 875.776344] block_ioctl+0xd9/0x120 [ 875.779971] ? blkdev_fallocate+0x3a0/0x3a0 [ 875.784334] do_vfs_ioctl+0x75a/0xff0 [ 875.788141] ? lock_acquire+0x170/0x3f0 [ 875.792214] ? ioctl_preallocate+0x1a0/0x1a0 [ 875.796632] ? __fget+0x265/0x3e0 [ 875.800086] ? do_vfs_ioctl+0xff0/0xff0 [ 875.804064] ? security_file_ioctl+0x83/0xb0 [ 875.808572] SyS_ioctl+0x7f/0xb0 [ 875.811936] ? do_vfs_ioctl+0xff0/0xff0 [ 875.815913] do_syscall_64+0x1d5/0x640 [ 875.819806] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 875.825077] RIP: 0033:0x7f2645954fc7 [ 875.828875] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 875.836585] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 875.843847] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 875.851113] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 875.858384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 875.865651] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 875.881206] XFS (loop2): Invalid superblock magic number 22:39:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 15) 22:39:12 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @null, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xfffffff8, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040), 0x4) 22:39:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:12 executing program 1: bind$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 15) [ 875.966588] XFS (loop4): Invalid superblock magic number 22:39:12 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) 22:39:12 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:12 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) [ 876.070214] FAULT_INJECTION: forcing a failure. [ 876.070214] name failslab, interval 1, probability 0, space 0, times 0 [ 876.093776] FAULT_INJECTION: forcing a failure. [ 876.093776] name failslab, interval 1, probability 0, space 0, times 0 [ 876.141899] CPU: 1 PID: 1678 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 876.149718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 876.159069] Call Trace: [ 876.161662] dump_stack+0x1b2/0x281 [ 876.165289] should_fail.cold+0x10a/0x149 [ 876.169432] should_failslab+0xd6/0x130 [ 876.173406] kmem_cache_alloc+0x28e/0x3c0 [ 876.177555] __kernfs_new_node+0x6f/0x470 [ 876.181785] kernfs_new_node+0x7b/0xe0 [ 876.185754] __kernfs_create_file+0x3d/0x320 [ 876.190183] sysfs_add_file_mode_ns+0x1e1/0x450 [ 876.194845] ? kernfs_create_dir_ns+0x171/0x200 [ 876.199521] internal_create_group+0x22b/0x710 [ 876.204112] lo_ioctl+0x1137/0x1cd0 [ 876.208264] ? loop_set_status64+0xe0/0xe0 [ 876.212507] blkdev_ioctl+0x540/0x1830 [ 876.216530] ? blkpg_ioctl+0x8d0/0x8d0 [ 876.220411] ? trace_hardirqs_on+0x10/0x10 [ 876.224733] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 876.229866] ? debug_check_no_obj_freed+0x2c0/0x680 [ 876.234881] block_ioctl+0xd9/0x120 [ 876.238597] ? blkdev_fallocate+0x3a0/0x3a0 [ 876.242917] do_vfs_ioctl+0x75a/0xff0 [ 876.246832] ? lock_acquire+0x170/0x3f0 [ 876.250814] ? ioctl_preallocate+0x1a0/0x1a0 [ 876.255214] ? __fget+0x265/0x3e0 [ 876.258681] ? do_vfs_ioctl+0xff0/0xff0 [ 876.262676] ? security_file_ioctl+0x83/0xb0 [ 876.267073] SyS_ioctl+0x7f/0xb0 [ 876.270428] ? do_vfs_ioctl+0xff0/0xff0 [ 876.274471] do_syscall_64+0x1d5/0x640 [ 876.278366] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 876.283546] RIP: 0033:0x7f2645954fc7 [ 876.287246] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 876.294948] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 876.302229] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 876.309489] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 876.316746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 876.324010] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 876.337299] CPU: 0 PID: 1687 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 876.345117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 876.354509] Call Trace: [ 876.357093] dump_stack+0x1b2/0x281 [ 876.360721] should_fail.cold+0x10a/0x149 [ 876.364866] should_failslab+0xd6/0x130 [ 876.368895] kmem_cache_alloc+0x28e/0x3c0 [ 876.373042] __kernfs_new_node+0x6f/0x470 [ 876.377189] kernfs_new_node+0x7b/0xe0 [ 876.381083] __kernfs_create_file+0x3d/0x320 [ 876.385490] sysfs_add_file_mode_ns+0x1e1/0x450 22:39:12 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:12 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:12 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) [ 876.390156] ? kernfs_create_dir_ns+0x171/0x200 [ 876.394823] internal_create_group+0x22b/0x710 [ 876.399405] lo_ioctl+0x1137/0x1cd0 [ 876.403029] ? loop_set_status64+0xe0/0xe0 [ 876.407268] blkdev_ioctl+0x540/0x1830 [ 876.411158] ? blkpg_ioctl+0x8d0/0x8d0 [ 876.415046] ? trace_hardirqs_on+0x10/0x10 [ 876.419279] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 876.424383] ? debug_check_no_obj_freed+0x2c0/0x680 [ 876.429402] block_ioctl+0xd9/0x120 [ 876.433031] ? blkdev_fallocate+0x3a0/0x3a0 [ 876.437352] do_vfs_ioctl+0x75a/0xff0 [ 876.441148] ? lock_acquire+0x170/0x3f0 [ 876.445204] ? ioctl_preallocate+0x1a0/0x1a0 [ 876.449612] ? __fget+0x265/0x3e0 [ 876.453062] ? do_vfs_ioctl+0xff0/0xff0 [ 876.457038] ? security_file_ioctl+0x83/0xb0 [ 876.461447] SyS_ioctl+0x7f/0xb0 [ 876.464808] ? do_vfs_ioctl+0xff0/0xff0 [ 876.468779] do_syscall_64+0x1d5/0x640 [ 876.472663] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 876.477843] RIP: 0033:0x7f91fb945fc7 [ 876.481542] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 876.489247] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 876.496506] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 876.503771] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 876.511034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 876.518303] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 16) 22:39:12 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$can_raw(0x1d, 0x3, 0x1) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) getsockname$netrom(r3, &(0x7f0000000240)={{0x3, @bcast}, [@default, @netrom, @bcast, @null, @null, @rose, @bcast, @rose]}, &(0x7f0000000180)=0x48) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@canfd={{0x3}, 0x16, 0x0, 0x0, 0x0, "1be2723761b4ec085ec4241580f20334f8c7797329c32e023b4e6d39cbd1c8acf17ed1e97f53f28390ce1b8dadba13956d9dbdb185629564dc7435c898e70f41"}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x400c0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:12 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:12 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) 22:39:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), 0x0, 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 16) [ 876.602238] XFS (loop4): Invalid superblock magic number [ 876.618814] XFS (loop2): Invalid superblock magic number 22:39:12 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) (async) getsockname$netrom(r3, &(0x7f0000000240)={{0x3, @bcast}, [@default, @netrom, @bcast, @null, @null, @rose, @bcast, @rose]}, &(0x7f0000000180)=0x48) (async, rerun: 32) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async, rerun: 32) sendmsg$can_raw(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@canfd={{0x3}, 0x16, 0x0, 0x0, 0x0, "1be2723761b4ec085ec4241580f20334f8c7797329c32e023b4e6d39cbd1c8acf17ed1e97f53f28390ce1b8dadba13956d9dbdb185629564dc7435c898e70f41"}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x400c0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:12 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) 22:39:12 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:12 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:12 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x8b, 0x0, '\x00', &(0x7f0000000040)=0x3}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 876.733975] FAULT_INJECTION: forcing a failure. [ 876.733975] name failslab, interval 1, probability 0, space 0, times 0 [ 876.751406] FAULT_INJECTION: forcing a failure. [ 876.751406] name failslab, interval 1, probability 0, space 0, times 0 [ 876.782628] CPU: 1 PID: 1751 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 876.790445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 876.799798] Call Trace: [ 876.802382] dump_stack+0x1b2/0x281 [ 876.806004] should_fail.cold+0x10a/0x149 [ 876.810145] should_failslab+0xd6/0x130 [ 876.814119] kmem_cache_alloc+0x28e/0x3c0 [ 876.818271] __kernfs_new_node+0x6f/0x470 [ 876.822429] kernfs_new_node+0x7b/0xe0 [ 876.826317] __kernfs_create_file+0x3d/0x320 22:39:12 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) [ 876.830725] sysfs_add_file_mode_ns+0x1e1/0x450 [ 876.835382] ? kernfs_create_dir_ns+0x171/0x200 [ 876.840043] internal_create_group+0x22b/0x710 [ 876.844617] lo_ioctl+0x1137/0x1cd0 [ 876.848238] ? loop_set_status64+0xe0/0xe0 [ 876.852470] blkdev_ioctl+0x540/0x1830 [ 876.856355] ? blkpg_ioctl+0x8d0/0x8d0 [ 876.860231] ? trace_hardirqs_on+0x10/0x10 [ 876.864452] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 876.869537] ? debug_check_no_obj_freed+0x2c0/0x680 [ 876.874542] block_ioctl+0xd9/0x120 [ 876.878348] ? blkdev_fallocate+0x3a0/0x3a0 [ 876.882665] do_vfs_ioctl+0x75a/0xff0 [ 876.886455] ? lock_acquire+0x170/0x3f0 [ 876.890415] ? ioctl_preallocate+0x1a0/0x1a0 [ 876.894810] ? __fget+0x265/0x3e0 [ 876.898302] ? do_vfs_ioctl+0xff0/0xff0 [ 876.902263] ? security_file_ioctl+0x83/0xb0 [ 876.906655] SyS_ioctl+0x7f/0xb0 [ 876.910088] ? do_vfs_ioctl+0xff0/0xff0 [ 876.914043] do_syscall_64+0x1d5/0x640 [ 876.917915] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 876.923094] RIP: 0033:0x7f2645954fc7 [ 876.926883] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 876.934612] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 876.941882] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 876.949146] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 876.956413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 876.963781] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 876.971058] CPU: 0 PID: 1749 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 876.978848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 876.988312] Call Trace: [ 876.990903] dump_stack+0x1b2/0x281 [ 876.994536] should_fail.cold+0x10a/0x149 [ 876.998944] should_failslab+0xd6/0x130 [ 877.002920] kmem_cache_alloc+0x28e/0x3c0 [ 877.007067] __kernfs_new_node+0x6f/0x470 [ 877.011218] kernfs_new_node+0x7b/0xe0 [ 877.015104] __kernfs_create_file+0x3d/0x320 [ 877.019515] sysfs_add_file_mode_ns+0x1e1/0x450 [ 877.024183] ? kernfs_create_dir_ns+0x171/0x200 [ 877.028853] internal_create_group+0x22b/0x710 [ 877.033442] lo_ioctl+0x1137/0x1cd0 [ 877.037251] ? loop_set_status64+0xe0/0xe0 [ 877.041489] blkdev_ioctl+0x540/0x1830 [ 877.045375] ? blkpg_ioctl+0x8d0/0x8d0 [ 877.049263] ? trace_hardirqs_on+0x10/0x10 [ 877.053499] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 877.058946] ? debug_check_no_obj_freed+0x2c0/0x680 [ 877.063973] block_ioctl+0xd9/0x120 [ 877.067603] ? blkdev_fallocate+0x3a0/0x3a0 [ 877.071924] do_vfs_ioctl+0x75a/0xff0 [ 877.075721] ? lock_acquire+0x170/0x3f0 [ 877.079692] ? ioctl_preallocate+0x1a0/0x1a0 [ 877.084100] ? __fget+0x265/0x3e0 [ 877.087554] ? do_vfs_ioctl+0xff0/0xff0 [ 877.091532] ? security_file_ioctl+0x83/0xb0 [ 877.095941] SyS_ioctl+0x7f/0xb0 [ 877.099304] ? do_vfs_ioctl+0xff0/0xff0 [ 877.103280] do_syscall_64+0x1d5/0x640 [ 877.107172] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 877.112352] RIP: 0033:0x7f91fb945fc7 [ 877.116057] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.123759] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 877.131032] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 877.138298] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 877.145561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 877.152823] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 877.272557] XFS (loop4): Invalid superblock magic number [ 877.286216] XFS (loop2): Invalid superblock magic number 22:39:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 17) 22:39:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}]}) 22:39:13 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:13 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x8b, 0x0, '\x00', &(0x7f0000000040)=0x3}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x8b, 0x0, '\x00', &(0x7f0000000040)=0x3}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) 22:39:13 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) getsockname$netrom(r3, &(0x7f0000000240)={{0x3, @bcast}, [@default, @netrom, @bcast, @null, @null, @rose, @bcast, @rose]}, &(0x7f0000000180)=0x48) (async) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) sendmsg$can_raw(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@canfd={{0x3}, 0x16, 0x0, 0x0, 0x0, "1be2723761b4ec085ec4241580f20334f8c7797329c32e023b4e6d39cbd1c8acf17ed1e97f53f28390ce1b8dadba13956d9dbdb185629564dc7435c898e70f41"}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x400c0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 17) 22:39:13 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000080)={0x0, 0x8b, 0x0, '\x00', &(0x7f0000000040)=0x3}) (async, rerun: 64) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (rerun: 64) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:13 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x1, 0xffff7fff, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x7881, 0x8000, 0x7, 0x7}}) 22:39:13 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003940)={[{@inode32}]}) [ 877.410882] FAULT_INJECTION: forcing a failure. [ 877.410882] name failslab, interval 1, probability 0, space 0, times 0 [ 877.442371] FAULT_INJECTION: forcing a failure. [ 877.442371] name failslab, interval 1, probability 0, space 0, times 0 [ 877.457380] CPU: 0 PID: 1814 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 877.465189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 877.474536] Call Trace: [ 877.477122] dump_stack+0x1b2/0x281 [ 877.480753] should_fail.cold+0x10a/0x149 [ 877.484898] should_failslab+0xd6/0x130 [ 877.488881] kmem_cache_alloc+0x28e/0x3c0 [ 877.493029] __kernfs_new_node+0x6f/0x470 [ 877.497178] kernfs_new_node+0x7b/0xe0 [ 877.501314] __kernfs_create_file+0x3d/0x320 [ 877.505727] sysfs_add_file_mode_ns+0x1e1/0x450 [ 877.510394] ? kernfs_create_dir_ns+0x171/0x200 [ 877.515067] internal_create_group+0x22b/0x710 [ 877.519657] lo_ioctl+0x1137/0x1cd0 [ 877.523284] ? loop_set_status64+0xe0/0xe0 [ 877.527511] blkdev_ioctl+0x540/0x1830 [ 877.531387] ? blkpg_ioctl+0x8d0/0x8d0 [ 877.535270] ? trace_hardirqs_on+0x10/0x10 [ 877.539501] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 877.544595] ? debug_check_no_obj_freed+0x2c0/0x680 [ 877.549614] block_ioctl+0xd9/0x120 [ 877.553242] ? blkdev_fallocate+0x3a0/0x3a0 [ 877.557557] do_vfs_ioctl+0x75a/0xff0 [ 877.561350] ? lock_acquire+0x170/0x3f0 [ 877.565323] ? ioctl_preallocate+0x1a0/0x1a0 [ 877.569731] ? __fget+0x265/0x3e0 [ 877.573185] ? do_vfs_ioctl+0xff0/0xff0 [ 877.577240] ? security_file_ioctl+0x83/0xb0 [ 877.581637] SyS_ioctl+0x7f/0xb0 [ 877.584993] ? do_vfs_ioctl+0xff0/0xff0 [ 877.589058] do_syscall_64+0x1d5/0x640 [ 877.592933] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 877.598105] RIP: 0033:0x7f91fb945fc7 [ 877.601797] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.609485] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 877.616739] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 877.623990] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 877.631248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 877.638498] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 877.645765] CPU: 1 PID: 1819 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 22:39:13 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) [ 877.653561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 877.663086] Call Trace: [ 877.665669] dump_stack+0x1b2/0x281 [ 877.669297] should_fail.cold+0x10a/0x149 [ 877.673445] should_failslab+0xd6/0x130 [ 877.677416] kmem_cache_alloc+0x28e/0x3c0 [ 877.681561] __kernfs_new_node+0x6f/0x470 [ 877.685718] kernfs_new_node+0x7b/0xe0 [ 877.689607] __kernfs_create_file+0x3d/0x320 [ 877.694018] sysfs_add_file_mode_ns+0x1e1/0x450 [ 877.698688] ? kernfs_create_dir_ns+0x171/0x200 [ 877.703447] internal_create_group+0x22b/0x710 [ 877.708033] lo_ioctl+0x1137/0x1cd0 22:39:13 executing program 3: pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000400)=0x1) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x5, 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x700, 0x198, 0x69, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x68, 0x0, 0x24, 0x4, 0x0, @private=0xa010102, @multicast1, {[@end, @timestamp_prespec={0x44, 0x24, 0x9b, 0x3, 0x7, [{@rand_addr=0x64010101, 0x2}, {@broadcast, 0x88}, {@broadcast, 0xb0fa7eca}, {@loopback, 0x8}]}]}}}}}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={r3}) r4 = accept4$netrom(r1, &(0x7f0000000080)={{0x3, @rose}, [@default, @netrom, @rose, @remote, @default, @null, @null, @netrom]}, &(0x7f0000000000)=0x48, 0x80800) getpeername$netrom(r4, &(0x7f0000000300)={{0x3, @bcast}, [@bcast, @rose, @remote, @null, @default, @default, @null, @rose]}, &(0x7f00000003c0)=0x48) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={0x1, @default, @rose={'rose', 0x0}, 0x1, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xc2a, 0x8, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) [ 877.711681] ? loop_set_status64+0xe0/0xe0 [ 877.716027] blkdev_ioctl+0x540/0x1830 [ 877.719902] ? blkpg_ioctl+0x8d0/0x8d0 [ 877.723778] ? trace_hardirqs_on+0x10/0x10 [ 877.728013] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 877.733164] ? debug_check_no_obj_freed+0x2c0/0x680 [ 877.738190] block_ioctl+0xd9/0x120 [ 877.741820] ? blkdev_fallocate+0x3a0/0x3a0 [ 877.746159] do_vfs_ioctl+0x75a/0xff0 [ 877.749966] ? lock_acquire+0x170/0x3f0 [ 877.754722] ? ioctl_preallocate+0x1a0/0x1a0 [ 877.759130] ? __fget+0x265/0x3e0 [ 877.762582] ? do_vfs_ioctl+0xff0/0xff0 [ 877.766557] ? security_file_ioctl+0x83/0xb0 [ 877.770964] SyS_ioctl+0x7f/0xb0 [ 877.774327] ? do_vfs_ioctl+0xff0/0xff0 [ 877.778304] do_syscall_64+0x1d5/0x640 [ 877.782197] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 877.787386] RIP: 0033:0x7f2645954fc7 [ 877.791090] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.798796] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 877.806101] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 877.813365] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 877.820629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 877.827897] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 877.849376] XFS (loop2): Invalid superblock magic number [ 877.869653] XFS (loop4): Invalid superblock magic number 22:39:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 18) 22:39:14 executing program 3: pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000400)=0x1) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x5, 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x700, 0x198, 0x69, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x68, 0x0, 0x24, 0x4, 0x0, @private=0xa010102, @multicast1, {[@end, @timestamp_prespec={0x44, 0x24, 0x9b, 0x3, 0x7, [{@rand_addr=0x64010101, 0x2}, {@broadcast, 0x88}, {@broadcast, 0xb0fa7eca}, {@loopback, 0x8}]}]}}}}}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={r3}) r4 = accept4$netrom(r1, &(0x7f0000000080)={{0x3, @rose}, [@default, @netrom, @rose, @remote, @default, @null, @null, @netrom]}, &(0x7f0000000000)=0x48, 0x80800) getpeername$netrom(r4, &(0x7f0000000300)={{0x3, @bcast}, [@bcast, @rose, @remote, @null, @default, @default, @null, @rose]}, &(0x7f00000003c0)=0x48) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={0x1, @default, @rose={'rose', 0x0}, 0x1, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xc2a, 0x8, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) (async) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000400)=0x1) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x5, 0x4) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x700, 0x198, 0x69, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x68, 0x0, 0x24, 0x4, 0x0, @private=0xa010102, @multicast1, {[@end, @timestamp_prespec={0x44, 0x24, 0x9b, 0x3, 0x7, [{@rand_addr=0x64010101, 0x2}, {@broadcast, 0x88}, {@broadcast, 0xb0fa7eca}, {@loopback, 0x8}]}]}}}}}) (async) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={r3}) (async) accept4$netrom(r1, &(0x7f0000000080)={{0x3, @rose}, [@default, @netrom, @rose, @remote, @default, @null, @null, @netrom]}, &(0x7f0000000000)=0x48, 0x80800) (async) getpeername$netrom(r4, &(0x7f0000000300)={{0x3, @bcast}, [@bcast, @rose, @remote, @null, @default, @default, @null, @rose]}, &(0x7f00000003c0)=0x48) (async) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={0x1, @default, @rose={'rose', 0x0}, 0x1, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xc2a, 0x8, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) (async) 22:39:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:14 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x1, 0xffff7fff, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x7881, 0x8000, 0x7, 0x7}}) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x1, 0xffff7fff, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x7881, 0x8000, 0x7, 0x7}}) (async) 22:39:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 18) 22:39:14 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x4, 0x7, 0x1, 0xffff7fff, 0x22, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x7881, 0x8000, 0x7, 0x7}}) 22:39:14 executing program 3: pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) (async) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000400)=0x1) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x5, 0x4) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x700, 0x198, 0x69, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x68, 0x0, 0x24, 0x4, 0x0, @private=0xa010102, @multicast1, {[@end, @timestamp_prespec={0x44, 0x24, 0x9b, 0x3, 0x7, [{@rand_addr=0x64010101, 0x2}, {@broadcast, 0x88}, {@broadcast, 0xb0fa7eca}, {@loopback, 0x8}]}]}}}}}) (async) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={r3}) r4 = accept4$netrom(r1, &(0x7f0000000080)={{0x3, @rose}, [@default, @netrom, @rose, @remote, @default, @null, @null, @netrom]}, &(0x7f0000000000)=0x48, 0x80800) getpeername$netrom(r4, &(0x7f0000000300)={{0x3, @bcast}, [@bcast, @rose, @remote, @null, @default, @default, @null, @rose]}, &(0x7f00000003c0)=0x48) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={0x1, @default, @rose={'rose', 0x0}, 0x1, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xc2a, 0x8, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) 22:39:14 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) [ 878.047208] FAULT_INJECTION: forcing a failure. [ 878.047208] name failslab, interval 1, probability 0, space 0, times 0 [ 878.054689] FAULT_INJECTION: forcing a failure. [ 878.054689] name failslab, interval 1, probability 0, space 0, times 0 [ 878.093103] CPU: 1 PID: 1885 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 878.100929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 878.110371] Call Trace: [ 878.112958] dump_stack+0x1b2/0x281 [ 878.116583] should_fail.cold+0x10a/0x149 [ 878.120721] should_failslab+0xd6/0x130 [ 878.124686] kmem_cache_alloc+0x28e/0x3c0 [ 878.128861] __kernfs_new_node+0x6f/0x470 [ 878.133008] kernfs_new_node+0x7b/0xe0 [ 878.136892] __kernfs_create_file+0x3d/0x320 22:39:14 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000)=0x9, 0x4) [ 878.141300] sysfs_add_file_mode_ns+0x1e1/0x450 [ 878.146058] ? kernfs_create_dir_ns+0x171/0x200 [ 878.150727] internal_create_group+0x22b/0x710 [ 878.155312] lo_ioctl+0x1137/0x1cd0 [ 878.158939] ? loop_set_status64+0xe0/0xe0 [ 878.163169] blkdev_ioctl+0x540/0x1830 [ 878.167051] ? blkpg_ioctl+0x8d0/0x8d0 [ 878.170930] ? trace_hardirqs_on+0x10/0x10 [ 878.175179] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 878.180278] ? debug_check_no_obj_freed+0x2c0/0x680 [ 878.185328] block_ioctl+0xd9/0x120 [ 878.188946] ? blkdev_fallocate+0x3a0/0x3a0 [ 878.193264] do_vfs_ioctl+0x75a/0xff0 [ 878.197056] ? lock_acquire+0x170/0x3f0 [ 878.201021] ? ioctl_preallocate+0x1a0/0x1a0 [ 878.205422] ? __fget+0x265/0x3e0 [ 878.208879] ? do_vfs_ioctl+0xff0/0xff0 [ 878.212856] ? security_file_ioctl+0x83/0xb0 [ 878.217258] SyS_ioctl+0x7f/0xb0 [ 878.220614] ? do_vfs_ioctl+0xff0/0xff0 [ 878.224602] do_syscall_64+0x1d5/0x640 [ 878.228484] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 878.233668] RIP: 0033:0x7f91fb945fc7 22:39:14 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) [ 878.237369] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 878.245070] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 878.252418] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 878.259762] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 878.267283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 878.274536] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 878.281808] CPU: 0 PID: 1878 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 22:39:14 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000100)={0x3, 0x7f, 0x9d, 0x0, 0x532, 0x7}) [ 878.289611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 878.298955] Call Trace: [ 878.301542] dump_stack+0x1b2/0x281 [ 878.305173] should_fail.cold+0x10a/0x149 [ 878.309323] should_failslab+0xd6/0x130 [ 878.313297] kmem_cache_alloc_trace+0x29a/0x3d0 [ 878.317969] ? dev_uevent_filter+0xd0/0xd0 [ 878.322210] kobject_uevent_env+0x20c/0xf30 [ 878.326530] ? internal_create_group+0x48f/0x710 [ 878.331272] lo_ioctl+0x11a6/0x1cd0 [ 878.334892] ? loop_set_status64+0xe0/0xe0 [ 878.339123] blkdev_ioctl+0x540/0x1830 [ 878.343012] ? blkpg_ioctl+0x8d0/0x8d0 [ 878.346982] ? trace_hardirqs_on+0x10/0x10 [ 878.351201] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 878.356313] ? debug_check_no_obj_freed+0x2c0/0x680 [ 878.361309] block_ioctl+0xd9/0x120 [ 878.364917] ? blkdev_fallocate+0x3a0/0x3a0 [ 878.369218] do_vfs_ioctl+0x75a/0xff0 [ 878.373016] ? lock_acquire+0x170/0x3f0 [ 878.376967] ? ioctl_preallocate+0x1a0/0x1a0 [ 878.381381] ? __fget+0x265/0x3e0 [ 878.384818] ? do_vfs_ioctl+0xff0/0xff0 [ 878.388769] ? security_file_ioctl+0x83/0xb0 [ 878.393160] SyS_ioctl+0x7f/0xb0 [ 878.396502] ? do_vfs_ioctl+0xff0/0xff0 [ 878.400458] do_syscall_64+0x1d5/0x640 [ 878.404327] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 878.409496] RIP: 0033:0x7f2645954fc7 [ 878.413185] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 878.420883] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 878.428136] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 878.435382] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 878.442633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 878.449988] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 878.545879] XFS (loop4): Invalid superblock magic number 22:39:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 19) 22:39:14 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, 0x0) 22:39:14 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000)=0x9, 0x4) 22:39:14 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:14 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000100)={0x3, 0x7f, 0x9d, 0x0, 0x532, 0x7}) socket$l2tp(0x2, 0x2, 0x73) (async) pipe(&(0x7f00000000c0)) (async) openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000100)={0x3, 0x7f, 0x9d, 0x0, 0x532, 0x7}) (async) 22:39:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 19) 22:39:14 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000100)={0x3, 0x7f, 0x9d, 0x0, 0x532, 0x7}) socket$l2tp(0x2, 0x2, 0x73) (async) pipe(&(0x7f00000000c0)) (async) openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000100)={0x3, 0x7f, 0x9d, 0x0, 0x532, 0x7}) (async) [ 878.622144] XFS (loop2): Invalid superblock magic number 22:39:14 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000)=0x9, 0x4) 22:39:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 22:39:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 22:39:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x10, 0x10, 0x2, 0xc1, {{0x6, 0x4, 0x0, 0x1, 0x18, 0x65, 0x0, 0x80, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x39}, @loopback, {[@ssrr={0x89, 0x3, 0x9f}]}}}}}) 22:39:14 executing program 5: socket$l2tp(0x2, 0x2, 0x73) [ 878.743657] FAULT_INJECTION: forcing a failure. [ 878.743657] name failslab, interval 1, probability 0, space 0, times 0 [ 878.770337] CPU: 1 PID: 1978 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 878.778155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 878.787600] Call Trace: [ 878.790194] dump_stack+0x1b2/0x281 [ 878.793928] should_fail.cold+0x10a/0x149 [ 878.798113] should_failslab+0xd6/0x130 [ 878.802093] __kmalloc+0x2c1/0x400 [ 878.805635] ? kobject_get_path+0xb5/0x230 [ 878.809870] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 878.815325] kobject_get_path+0xb5/0x230 [ 878.819398] kobject_uevent_env+0x230/0xf30 [ 878.823725] ? internal_create_group+0x48f/0x710 [ 878.828487] lo_ioctl+0x11a6/0x1cd0 [ 878.832140] ? loop_set_status64+0xe0/0xe0 [ 878.836382] blkdev_ioctl+0x540/0x1830 [ 878.840279] ? blkpg_ioctl+0x8d0/0x8d0 [ 878.844165] ? trace_hardirqs_on+0x10/0x10 [ 878.848487] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 878.853605] ? debug_check_no_obj_freed+0x2c0/0x680 [ 878.858629] block_ioctl+0xd9/0x120 [ 878.862273] ? blkdev_fallocate+0x3a0/0x3a0 [ 878.866604] do_vfs_ioctl+0x75a/0xff0 [ 878.870410] ? lock_acquire+0x170/0x3f0 [ 878.874388] ? ioctl_preallocate+0x1a0/0x1a0 [ 878.878805] ? __fget+0x265/0x3e0 [ 878.882528] ? do_vfs_ioctl+0xff0/0xff0 [ 878.886587] ? security_file_ioctl+0x83/0xb0 [ 878.887277] FAULT_INJECTION: forcing a failure. [ 878.887277] name failslab, interval 1, probability 0, space 0, times 0 [ 878.890991] SyS_ioctl+0x7f/0xb0 [ 878.890999] ? do_vfs_ioctl+0xff0/0xff0 [ 878.891010] do_syscall_64+0x1d5/0x640 [ 878.891024] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 878.891031] RIP: 0033:0x7f2645954fc7 [ 878.891043] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 878.929965] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 878.937219] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 878.944478] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 878.951755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 878.959101] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 878.966383] CPU: 0 PID: 1989 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 878.974189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 878.983546] Call Trace: [ 878.986129] dump_stack+0x1b2/0x281 [ 878.989763] should_fail.cold+0x10a/0x149 [ 878.993912] should_failslab+0xd6/0x130 [ 878.997888] kmem_cache_alloc_trace+0x29a/0x3d0 [ 879.002559] ? dev_uevent_filter+0xd0/0xd0 [ 879.006793] kobject_uevent_env+0x20c/0xf30 [ 879.011118] ? internal_create_group+0x48f/0x710 [ 879.015875] lo_ioctl+0x11a6/0x1cd0 [ 879.019516] ? loop_set_status64+0xe0/0xe0 [ 879.023754] blkdev_ioctl+0x540/0x1830 [ 879.027641] ? blkpg_ioctl+0x8d0/0x8d0 [ 879.031531] ? trace_hardirqs_on+0x10/0x10 [ 879.035765] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 879.040866] ? debug_check_no_obj_freed+0x2c0/0x680 [ 879.045888] block_ioctl+0xd9/0x120 [ 879.049507] ? blkdev_fallocate+0x3a0/0x3a0 [ 879.053822] do_vfs_ioctl+0x75a/0xff0 [ 879.057620] ? lock_acquire+0x170/0x3f0 [ 879.061585] ? ioctl_preallocate+0x1a0/0x1a0 [ 879.065973] ? __fget+0x265/0x3e0 [ 879.069585] ? do_vfs_ioctl+0xff0/0xff0 [ 879.073546] ? security_file_ioctl+0x83/0xb0 [ 879.077937] SyS_ioctl+0x7f/0xb0 [ 879.081369] ? do_vfs_ioctl+0xff0/0xff0 [ 879.085322] do_syscall_64+0x1d5/0x640 [ 879.089198] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 879.094363] RIP: 0033:0x7f91fb945fc7 [ 879.098053] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 879.100698] XFS (loop4): Invalid superblock magic number [ 879.105763] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 879.105769] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 879.105773] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 879.105779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:39:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 20) 22:39:15 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)) 22:39:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x10, 0x10, 0x2, 0xc1, {{0x6, 0x4, 0x0, 0x1, 0x18, 0x65, 0x0, 0x80, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x39}, @loopback, {[@ssrr={0x89, 0x3, 0x9f}]}}}}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x10, 0x10, 0x2, 0xc1, {{0x6, 0x4, 0x0, 0x1, 0x18, 0x65, 0x0, 0x80, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x39}, @loopback, {[@ssrr={0x89, 0x3, 0x9f}]}}}}}) (async) 22:39:15 executing program 5: socket$l2tp(0x2, 0x2, 0x73) 22:39:15 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 22:39:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 20) [ 879.105784] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 879.155887] XFS (loop2): Invalid superblock magic number 22:39:15 executing program 5: socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) (async) 22:39:15 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 879.240399] FAULT_INJECTION: forcing a failure. [ 879.240399] name failslab, interval 1, probability 0, space 0, times 0 [ 879.262823] CPU: 1 PID: 2049 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 879.270634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 879.279992] Call Trace: [ 879.282581] dump_stack+0x1b2/0x281 [ 879.286215] should_fail.cold+0x10a/0x149 [ 879.290371] should_failslab+0xd6/0x130 [ 879.294348] kmem_cache_alloc_trace+0x29a/0x3d0 [ 879.299026] ? dev_uevent_filter+0xd0/0xd0 [ 879.303260] kobject_uevent_env+0x20c/0xf30 [ 879.307583] ? internal_create_group+0x48f/0x710 [ 879.312340] lo_ioctl+0x11a6/0x1cd0 [ 879.315980] ? loop_set_status64+0xe0/0xe0 [ 879.320212] blkdev_ioctl+0x540/0x1830 [ 879.324100] ? blkpg_ioctl+0x8d0/0x8d0 [ 879.327985] ? trace_hardirqs_on+0x10/0x10 [ 879.332329] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 879.337426] ? debug_check_no_obj_freed+0x2c0/0x680 [ 879.342444] block_ioctl+0xd9/0x120 [ 879.346069] ? blkdev_fallocate+0x3a0/0x3a0 [ 879.350380] do_vfs_ioctl+0x75a/0xff0 [ 879.354329] ? lock_acquire+0x170/0x3f0 [ 879.358297] ? ioctl_preallocate+0x1a0/0x1a0 [ 879.360646] FAULT_INJECTION: forcing a failure. [ 879.360646] name failslab, interval 1, probability 0, space 0, times 0 [ 879.362697] ? __fget+0x265/0x3e0 [ 879.362711] ? do_vfs_ioctl+0xff0/0xff0 [ 879.362722] ? security_file_ioctl+0x83/0xb0 [ 879.362731] SyS_ioctl+0x7f/0xb0 [ 879.362737] ? do_vfs_ioctl+0xff0/0xff0 [ 879.362749] do_syscall_64+0x1d5/0x640 [ 879.362768] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 879.362777] RIP: 0033:0x7f91fb945fc7 [ 879.362782] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 879.413562] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 879.420912] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 879.428166] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 22:39:15 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:15 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) [ 879.435432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 879.442681] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 879.460810] CPU: 0 PID: 2054 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 879.468706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 879.478059] Call Trace: [ 879.480648] dump_stack+0x1b2/0x281 [ 879.484279] should_fail.cold+0x10a/0x149 22:39:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x10, 0x10, 0x2, 0xc1, {{0x6, 0x4, 0x0, 0x1, 0x18, 0x65, 0x0, 0x80, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x39}, @loopback, {[@ssrr={0x89, 0x3, 0x9f}]}}}}}) 22:39:15 executing program 3: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba616", 0x8f, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529", 0x22, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbf", 0x3a, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b0756", 0xa3, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000007c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x0, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff]}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000100)=r3) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r4, &(0x7f0000000040)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default]}, 0x48) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x2f680000, 0xdbc6, {{0x7, 0x4, 0x0, 0x3d, 0x1c, 0x68, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, {[@ra={0x94, 0x4}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', r5, 0x8000, 0x8000, 0xfffffffd, 0x80, {{0xb, 0x4, 0x3, 0x4, 0x2c, 0x68, 0x0, 0x8, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}, @multicast1, {[@lsrr={0x83, 0x7, 0x3a, [@dev={0xac, 0x14, 0x14, 0x2d}]}, @noop, @timestamp_prespec={0x44, 0xc, 0xdc, 0x3, 0x3, [{@multicast1, 0x5}]}, @rr={0x7, 0x3, 0x83}, @noop]}}}}}) [ 879.488421] should_failslab+0xd6/0x130 [ 879.492395] kmem_cache_alloc_node+0x263/0x410 [ 879.497089] __alloc_skb+0x5c/0x510 [ 879.500718] kobject_uevent_env+0x882/0xf30 [ 879.505044] lo_ioctl+0x11a6/0x1cd0 [ 879.508672] ? loop_set_status64+0xe0/0xe0 [ 879.512910] blkdev_ioctl+0x540/0x1830 [ 879.516787] ? blkpg_ioctl+0x8d0/0x8d0 [ 879.520658] ? trace_hardirqs_on+0x10/0x10 [ 879.524879] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 879.529974] ? debug_check_no_obj_freed+0x2c0/0x680 [ 879.535078] block_ioctl+0xd9/0x120 [ 879.538708] ? blkdev_fallocate+0x3a0/0x3a0 [ 879.543030] do_vfs_ioctl+0x75a/0xff0 [ 879.546831] ? lock_acquire+0x170/0x3f0 [ 879.550813] ? ioctl_preallocate+0x1a0/0x1a0 [ 879.555220] ? __fget+0x265/0x3e0 [ 879.558663] ? do_vfs_ioctl+0xff0/0xff0 [ 879.562635] ? security_file_ioctl+0x83/0xb0 [ 879.567037] SyS_ioctl+0x7f/0xb0 [ 879.570385] ? do_vfs_ioctl+0xff0/0xff0 [ 879.574339] do_syscall_64+0x1d5/0x640 [ 879.578208] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 879.583394] RIP: 0033:0x7f2645954fc7 [ 879.587090] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 879.594782] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 879.602034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 879.609292] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 879.616553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 879.623822] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 879.630159] XFS (loop2): Invalid superblock magic number [ 879.735691] XFS (loop4): Invalid superblock magic number 22:39:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 21) [ 879.779356] XFS (loop0): Invalid superblock magic number [ 879.812362] FAULT_INJECTION: forcing a failure. [ 879.812362] name failslab, interval 1, probability 0, space 0, times 0 [ 879.824157] CPU: 0 PID: 2123 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 879.832062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 879.841401] Call Trace: [ 879.843979] dump_stack+0x1b2/0x281 [ 879.847592] should_fail.cold+0x10a/0x149 [ 879.851733] should_failslab+0xd6/0x130 [ 879.855702] kmem_cache_alloc_node+0x263/0x410 [ 879.860305] __alloc_skb+0x5c/0x510 [ 879.863931] kobject_uevent_env+0x882/0xf30 [ 879.868244] lo_ioctl+0x11a6/0x1cd0 [ 879.871856] ? loop_set_status64+0xe0/0xe0 [ 879.876081] blkdev_ioctl+0x540/0x1830 [ 879.879957] ? blkpg_ioctl+0x8d0/0x8d0 [ 879.883845] ? trace_hardirqs_on+0x10/0x10 [ 879.888080] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 879.893184] ? debug_check_no_obj_freed+0x2c0/0x680 [ 879.898535] block_ioctl+0xd9/0x120 [ 879.902283] ? blkdev_fallocate+0x3a0/0x3a0 [ 879.906587] do_vfs_ioctl+0x75a/0xff0 [ 879.910380] ? lock_acquire+0x170/0x3f0 [ 879.914354] ? ioctl_preallocate+0x1a0/0x1a0 [ 879.918762] ? __fget+0x265/0x3e0 [ 879.922212] ? do_vfs_ioctl+0xff0/0xff0 [ 879.926287] ? security_file_ioctl+0x83/0xb0 [ 879.930684] SyS_ioctl+0x7f/0xb0 [ 879.934035] ? do_vfs_ioctl+0xff0/0xff0 [ 879.938004] do_syscall_64+0x1d5/0x640 [ 879.942345] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 879.947543] RIP: 0033:0x7f2645954fc7 [ 879.951240] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 879.958947] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 879.966267] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:39:16 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)) 22:39:16 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async, rerun: 64) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000080)=0x1, 0x4) (async, rerun: 64) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) 22:39:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 21) 22:39:16 executing program 3: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba616", 0x8f, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529", 0x22, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbf", 0x3a, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b0756", 0xa3, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000007c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x0, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff]}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000100)=r3) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r4, &(0x7f0000000040)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default]}, 0x48) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x2f680000, 0xdbc6, {{0x7, 0x4, 0x0, 0x3d, 0x1c, 0x68, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, {[@ra={0x94, 0x4}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', r5, 0x8000, 0x8000, 0xfffffffd, 0x80, {{0xb, 0x4, 0x3, 0x4, 0x2c, 0x68, 0x0, 0x8, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}, @multicast1, {[@lsrr={0x83, 0x7, 0x3a, [@dev={0xac, 0x14, 0x14, 0x2d}]}, @noop, @timestamp_prespec={0x44, 0xc, 0xdc, 0x3, 0x3, [{@multicast1, 0x5}]}, @rr={0x7, 0x3, 0x83}, @noop]}}}}}) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async) syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba616", 0x8f, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529", 0x22, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbf", 0x3a, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b0756", 0xa3, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000007c0)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x0, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff]}) (async) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000100)=r3) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) bind$netrom(r4, &(0x7f0000000040)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x2f680000, 0xdbc6, {{0x7, 0x4, 0x0, 0x3d, 0x1c, 0x68, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, {[@ra={0x94, 0x4}, @noop]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', r5, 0x8000, 0x8000, 0xfffffffd, 0x80, {{0xb, 0x4, 0x3, 0x4, 0x2c, 0x68, 0x0, 0x8, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}, @multicast1, {[@lsrr={0x83, 0x7, 0x3a, [@dev={0xac, 0x14, 0x14, 0x2d}]}, @noop, @timestamp_prespec={0x44, 0xc, 0xdc, 0x3, 0x3, [{@multicast1, 0x5}]}, @rr={0x7, 0x3, 0x83}, @noop]}}}}}) (async) [ 879.973561] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 879.980811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 879.988083] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async, rerun: 64) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000080)=0x1, 0x4) (rerun: 64) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) setsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) 22:39:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)) [ 880.054389] __ntfs_warning: 17 callbacks suppressed [ 880.054395] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 880.086179] ntfs: (device loop3): parse_options(): Unrecognized mount option func. [ 880.107114] FAULT_INJECTION: forcing a failure. [ 880.107114] name failslab, interval 1, probability 0, space 0, times 0 [ 880.110496] ntfs: (device loop3): parse_options(): Unrecognized mount option subj_user. [ 880.126538] CPU: 0 PID: 2145 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 880.134333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 880.142441] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 880.143765] Call Trace: [ 880.143780] dump_stack+0x1b2/0x281 [ 880.143793] should_fail.cold+0x10a/0x149 [ 880.161558] should_failslab+0xd6/0x130 [ 880.165542] kmem_cache_alloc_node_trace+0x25a/0x400 [ 880.170640] __kmalloc_node_track_caller+0x38/0x70 [ 880.175551] __alloc_skb+0x96/0x510 [ 880.179161] kobject_uevent_env+0x882/0xf30 [ 880.183472] lo_ioctl+0x11a6/0x1cd0 [ 880.187078] ? loop_set_status64+0xe0/0xe0 [ 880.191292] blkdev_ioctl+0x540/0x1830 [ 880.195160] ? blkpg_ioctl+0x8d0/0x8d0 [ 880.199024] ? trace_hardirqs_on+0x10/0x10 [ 880.203240] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 880.208436] ? debug_check_no_obj_freed+0x2c0/0x680 [ 880.213445] block_ioctl+0xd9/0x120 [ 880.217054] ? blkdev_fallocate+0x3a0/0x3a0 [ 880.221354] do_vfs_ioctl+0x75a/0xff0 [ 880.225141] ? lock_acquire+0x170/0x3f0 [ 880.229094] ? ioctl_preallocate+0x1a0/0x1a0 [ 880.233480] ? __fget+0x265/0x3e0 [ 880.236911] ? do_vfs_ioctl+0xff0/0xff0 [ 880.240863] ? security_file_ioctl+0x83/0xb0 [ 880.245337] SyS_ioctl+0x7f/0xb0 [ 880.248704] ? do_vfs_ioctl+0xff0/0xff0 [ 880.252665] do_syscall_64+0x1d5/0x640 [ 880.256546] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 880.262169] RIP: 0033:0x7f91fb945fc7 [ 880.265855] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 880.273553] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 880.280815] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 880.288091] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 880.295355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:39:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c00ebff", @ANYRES16=r1, @ANYBLOB="08002bbd7000fddbdf250300000006001a004e22000005002100010000000600010004000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40001}, 0x4055) [ 880.302609] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:16 executing program 3: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r2 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba616", 0x8f, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529", 0x22, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbf", 0x3a, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b0756", 0xa3, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000007c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x0, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff]}) (async) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000100)=r3) (async) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r4, &(0x7f0000000040)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x2f680000, 0xdbc6, {{0x7, 0x4, 0x0, 0x3d, 0x1c, 0x68, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, {[@ra={0x94, 0x4}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', r5, 0x8000, 0x8000, 0xfffffffd, 0x80, {{0xb, 0x4, 0x3, 0x4, 0x2c, 0x68, 0x0, 0x8, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}, @multicast1, {[@lsrr={0x83, 0x7, 0x3a, [@dev={0xac, 0x14, 0x14, 0x2d}]}, @noop, @timestamp_prespec={0x44, 0xc, 0xdc, 0x3, 0x3, [{@multicast1, 0x5}]}, @rr={0x7, 0x3, 0x83}, @noop]}}}}}) 22:39:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c00ebff", @ANYRES16=r1, @ANYBLOB="08002bbd7000fddbdf250300000006001a004e22000005002100010000000600010004000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40001}, 0x4055) [ 880.341176] XFS (loop0): Invalid superblock magic number [ 880.357609] XFS (loop4): Invalid superblock magic number 22:39:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 22) 22:39:16 executing program 0: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba616", 0x8f, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529", 0x22, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbf", 0x3a, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b0756", 0xa3, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000007c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x0, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff]}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000100)=r3) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r4, &(0x7f0000000040)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default]}, 0x48) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x2f680000, 0xdbc6, {{0x7, 0x4, 0x0, 0x3d, 0x1c, 0x68, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, {[@ra={0x94, 0x4}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', r5, 0x8000, 0x8000, 0xfffffffd, 0x80, {{0xb, 0x4, 0x3, 0x4, 0x2c, 0x68, 0x0, 0x8, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}, @multicast1, {[@lsrr={0x83, 0x7, 0x3a, [@dev={0xac, 0x14, 0x14, 0x2d}]}, @noop, @timestamp_prespec={0x44, 0xc, 0xdc, 0x3, 0x3, [{@multicast1, 0x5}]}, @rr={0x7, 0x3, 0x83}, @noop]}}}}}) 22:39:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c00ebff", @ANYRES16=r1, @ANYBLOB="08002bbd7000fddbdf250300000006001a004e22000005002100010000000600010004000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40001}, 0x4055) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c00ebff", @ANYRES16=r1, @ANYBLOB="08002bbd7000fddbdf250300000006001a004e22000005002100010000000600010004000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40001}, 0x4055) (async) [ 880.469503] FAULT_INJECTION: forcing a failure. [ 880.469503] name failslab, interval 1, probability 0, space 0, times 0 [ 880.492314] CPU: 1 PID: 2214 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 880.497191] XFS (loop2): Invalid superblock magic number [ 880.500400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 880.500405] Call Trace: [ 880.500420] dump_stack+0x1b2/0x281 [ 880.500434] should_fail.cold+0x10a/0x149 [ 880.500449] should_failslab+0xd6/0x130 [ 880.500464] kmem_cache_alloc_node+0x263/0x410 [ 880.500480] __alloc_skb+0x5c/0x510 [ 880.500493] kobject_uevent_env+0x882/0xf30 [ 880.500509] lo_ioctl+0x11a6/0x1cd0 [ 880.500522] ? loop_set_status64+0xe0/0xe0 [ 880.500535] blkdev_ioctl+0x540/0x1830 [ 880.500546] ? blkpg_ioctl+0x8d0/0x8d0 [ 880.500555] ? trace_hardirqs_on+0x10/0x10 [ 880.500568] ? _raw_spin_unlock_irqrestore+0x66/0xe0 22:39:16 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @private}, &(0x7f0000001580)=0xc) [ 880.500578] ? debug_check_no_obj_freed+0x2c0/0x680 [ 880.500592] block_ioctl+0xd9/0x120 [ 880.500601] ? blkdev_fallocate+0x3a0/0x3a0 [ 880.500610] do_vfs_ioctl+0x75a/0xff0 [ 880.500622] ? lock_acquire+0x170/0x3f0 [ 880.523883] XFS (loop1): Invalid superblock magic number [ 880.525902] ? ioctl_preallocate+0x1a0/0x1a0 [ 880.525917] ? __fget+0x265/0x3e0 [ 880.525929] ? do_vfs_ioctl+0xff0/0xff0 [ 880.525941] ? security_file_ioctl+0x83/0xb0 [ 880.525950] SyS_ioctl+0x7f/0xb0 [ 880.525960] ? do_vfs_ioctl+0xff0/0xff0 [ 880.616913] do_syscall_64+0x1d5/0x640 [ 880.620786] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 880.625979] RIP: 0033:0x7f2645954fc7 [ 880.629677] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 880.637375] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 880.644632] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 880.651882] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 880.659244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:39:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dafcbe481207fd10d3ead6fa98f4a98ce9909701d7c8a1f4b73a089192624a704974783ab43fe05f12409516b137635f4ab06ae06f9431d59b0b769628d37be46f19231257e4bed6a610a85a4eeacdc01d8751dff41368378f3c19f97ca187399559d8cf845ab7656eb6bfcb782d719248d8ca8f521ae56388614c96f5725836ab89d8a8b8847e3703eecc130df2b00439ad1254093df66572a44d5aabc588e83feeb6545a29a16c51a8bb90e3be3485e2671765c22f25bd8ee31ee2deffe03c44f0fd63a970", @ANYRES16=r1, @ANYBLOB="080025bd7000fbdbdf25020000001400020076657468315f746f5f627269646765000900010073797a32000000000900030073797a32000000000900030073797a30000000000900010073797a30000000000900030073797a32000000000900010073797a310000000005000400010000000500040002000000"], 0x80}, 0x1, 0x0, 0x0, 0x4010}, 0x801) [ 880.666524] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 22) 22:39:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dafcbe481207fd10d3ead6fa98f4a98ce9909701d7c8a1f4b73a089192624a704974783ab43fe05f12409516b137635f4ab06ae06f9431d59b0b769628d37be46f19231257e4bed6a610a85a4eeacdc01d8751dff41368378f3c19f97ca187399559d8cf845ab7656eb6bfcb782d719248d8ca8f521ae56388614c96f5725836ab89d8a8b8847e3703eecc130df2b00439ad1254093df66572a44d5aabc588e83feeb6545a29a16c51a8bb90e3be3485e2671765c22f25bd8ee31ee2deffe03c44f0fd63a970", @ANYRES16=r1, @ANYBLOB="080025bd7000fbdbdf25020000001400020076657468315f746f5f627269646765000900010073797a32000000000900030073797a32000000000900030073797a30000000000900010073797a30000000000900030073797a32000000000900010073797a310000000005000400010000000500040002000000"], 0x80}, 0x1, 0x0, 0x0, 0x4010}, 0x801) 22:39:16 executing program 0: pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba616", 0x8f, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529", 0x22, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbf", 0x3a, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b0756", 0xa3, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000007c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x0, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff]}) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000100)=r3) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$netrom(r4, &(0x7f0000000040)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default]}, 0x48) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x40, 0x80, 0x2f680000, 0xdbc6, {{0x7, 0x4, 0x0, 0x3d, 0x1c, 0x68, 0x0, 0x6, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, {[@ra={0x94, 0x4}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'gretap0\x00', r5, 0x8000, 0x8000, 0xfffffffd, 0x80, {{0xb, 0x4, 0x3, 0x4, 0x2c, 0x68, 0x0, 0x8, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x3a}, @multicast1, {[@lsrr={0x83, 0x7, 0x3a, [@dev={0xac, 0x14, 0x14, 0x2d}]}, @noop, @timestamp_prespec={0x44, 0xc, 0xdc, 0x3, 0x3, [{@multicast1, 0x5}]}, @rr={0x7, 0x3, 0x83}, @noop]}}}}}) 22:39:16 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dafcbe481207fd10d3ead6fa98f4a98ce9909701d7c8a1f4b73a089192624a704974783ab43fe05f12409516b137635f4ab06ae06f9431d59b0b769628d37be46f19231257e4bed6a610a85a4eeacdc01d8751dff41368378f3c19f97ca187399559d8cf845ab7656eb6bfcb782d719248d8ca8f521ae56388614c96f5725836ab89d8a8b8847e3703eecc130df2b00439ad1254093df66572a44d5aabc588e83feeb6545a29a16c51a8bb90e3be3485e2671765c22f25bd8ee31ee2deffe03c44f0fd63a970", @ANYRES16=r1, @ANYBLOB="080025bd7000fbdbdf25020000001400020076657468315f746f5f627269646765000900010073797a32000000000900030073797a32000000000900030073797a30000000000900010073797a30000000000900030073797a32000000000900010073797a310000000005000400010000000500040002000000"], 0x80}, 0x1, 0x0, 0x0, 0x4010}, 0x801) 22:39:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 23) 22:39:16 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dafcbe481207fd10d3ead6fa98f4a98ce9909701d7c8a1f4b73a089192624a704974783ab43fe05f12409516b137635f4ab06ae06f9431d59b0b769628d37be46f19231257e4bed6a610a85a4eeacdc01d8751dff41368378f3c19f97ca187399559d8cf845ab7656eb6bfcb782d719248d8ca8f521ae56388614c96f5725836ab89d8a8b8847e3703eecc130df2b00439ad1254093df66572a44d5aabc588e83feeb6545a29a16c51a8bb90e3be3485e2671765c22f25bd8ee31ee2deffe03c44f0fd63a970", @ANYRES16=r1, @ANYBLOB="080025bd7000fbdbdf25020000001400020076657468315f746f5f627269646765000900010073797a32000000000900030073797a32000000000900030073797a30000000000900010073797a30000000000900030073797a32000000000900010073797a310000000005000400010000000500040002000000"], 0x80}, 0x1, 0x0, 0x0, 0x4010}, 0x801) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="dafcbe481207fd10d3ead6fa98f4a98ce9909701d7c8a1f4b73a089192624a704974783ab43fe05f12409516b137635f4ab06ae06f9431d59b0b769628d37be46f19231257e4bed6a610a85a4eeacdc01d8751dff41368378f3c19f97ca187399559d8cf845ab7656eb6bfcb782d719248d8ca8f521ae56388614c96f5725836ab89d8a8b8847e3703eecc130df2b00439ad1254093df66572a44d5aabc588e83feeb6545a29a16c51a8bb90e3be3485e2671765c22f25bd8ee31ee2deffe03c44f0fd63a970", @ANYRES16=r1, @ANYBLOB="080025bd7000fbdbdf25020000001400020076657468315f746f5f627269646765000900010073797a32000000000900030073797a32000000000900030073797a30000000000900010073797a30000000000900030073797a32000000000900010073797a310000000005000400010000000500040002000000"], 0x80}, 0x1, 0x0, 0x0, 0x4010}, 0x801) (async) [ 880.755738] XFS (loop4): Invalid superblock magic number 22:39:16 executing program 1: pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000400)=0x1) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x5, 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000004c0)={'gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x700, 0x198, 0x69, {{0xf, 0x4, 0x0, 0x4, 0x3c, 0x68, 0x0, 0x24, 0x4, 0x0, @private=0xa010102, @multicast1, {[@end, @timestamp_prespec={0x44, 0x24, 0x9b, 0x3, 0x7, [{@rand_addr=0x64010101, 0x2}, {@broadcast, 0x88}, {@broadcast, 0xb0fa7eca}, {@loopback, 0x8}]}]}}}}}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={r3}) r4 = accept4$netrom(r1, &(0x7f0000000080)={{0x3, @rose}, [@default, @netrom, @rose, @remote, @default, @null, @null, @netrom]}, &(0x7f0000000000)=0x48, 0x80800) getpeername$netrom(r4, &(0x7f0000000300)={{0x3, @bcast}, [@bcast, @rose, @remote, @null, @default, @default, @null, @rose]}, &(0x7f00000003c0)=0x48) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={0x1, @default, @rose={'rose', 0x0}, 0x1, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xc2a, 0x8, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) [ 880.846716] ntfs: (device loop0): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 880.846994] FAULT_INJECTION: forcing a failure. [ 880.846994] name failslab, interval 1, probability 0, space 0, times 0 [ 880.888545] ntfs: (device loop0): parse_options(): Unrecognized mount option func. [ 880.905607] CPU: 0 PID: 2259 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 880.911832] ntfs: (device loop0): parse_options(): Unrecognized mount option subj_user. [ 880.913416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 880.913421] Call Trace: [ 880.913436] dump_stack+0x1b2/0x281 [ 880.913450] should_fail.cold+0x10a/0x149 [ 880.932676] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 880.933503] should_failslab+0xd6/0x130 22:39:16 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000000)=0xfc, 0x4) 22:39:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}]}) [ 880.933515] kmem_cache_alloc_node+0x263/0x410 [ 880.933528] __alloc_skb+0x5c/0x510 [ 880.960780] kobject_uevent_env+0x882/0xf30 [ 880.965118] lo_ioctl+0x11a6/0x1cd0 [ 880.968750] ? loop_set_status64+0xe0/0xe0 [ 880.972988] blkdev_ioctl+0x540/0x1830 [ 880.976877] ? blkpg_ioctl+0x8d0/0x8d0 [ 880.980760] ? trace_hardirqs_on+0x10/0x10 [ 880.984999] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 880.990094] ? debug_check_no_obj_freed+0x2c0/0x680 [ 880.995103] block_ioctl+0xd9/0x120 [ 880.998723] ? blkdev_fallocate+0x3a0/0x3a0 [ 881.003026] do_vfs_ioctl+0x75a/0xff0 [ 881.006808] ? lock_acquire+0x170/0x3f0 [ 881.010763] ? ioctl_preallocate+0x1a0/0x1a0 [ 881.015241] ? __fget+0x265/0x3e0 [ 881.018681] ? do_vfs_ioctl+0xff0/0xff0 [ 881.022635] ? security_file_ioctl+0x83/0xb0 [ 881.027050] SyS_ioctl+0x7f/0xb0 [ 881.030409] ? do_vfs_ioctl+0xff0/0xff0 [ 881.034373] do_syscall_64+0x1d5/0x640 [ 881.038253] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 881.043432] RIP: 0033:0x7f91fb945fc7 [ 881.047131] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 881.054836] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 881.062177] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 881.069431] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 881.076689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 881.083972] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 881.098383] FAULT_INJECTION: forcing a failure. [ 881.098383] name failslab, interval 1, probability 0, space 0, times 0 [ 881.120952] CPU: 1 PID: 2270 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 881.128789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 881.138150] Call Trace: [ 881.140728] dump_stack+0x1b2/0x281 [ 881.144357] should_fail.cold+0x10a/0x149 [ 881.148506] should_failslab+0xd6/0x130 [ 881.152473] kmem_cache_alloc_node_trace+0x25a/0x400 [ 881.157569] __kmalloc_node_track_caller+0x38/0x70 [ 881.162486] __alloc_skb+0x96/0x510 [ 881.166097] kobject_uevent_env+0x882/0xf30 [ 881.170422] lo_ioctl+0x11a6/0x1cd0 [ 881.174042] ? loop_set_status64+0xe0/0xe0 [ 881.178265] blkdev_ioctl+0x540/0x1830 [ 881.182138] ? blkpg_ioctl+0x8d0/0x8d0 [ 881.186012] ? trace_hardirqs_on+0x10/0x10 [ 881.190239] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 881.195510] ? debug_check_no_obj_freed+0x2c0/0x680 [ 881.200565] block_ioctl+0xd9/0x120 [ 881.204262] ? blkdev_fallocate+0x3a0/0x3a0 [ 881.207771] XFS (loop2): Invalid superblock magic number [ 881.208698] do_vfs_ioctl+0x75a/0xff0 [ 881.208711] ? lock_acquire+0x170/0x3f0 [ 881.208725] ? ioctl_preallocate+0x1a0/0x1a0 [ 881.226317] ? __fget+0x265/0x3e0 [ 881.229780] ? do_vfs_ioctl+0xff0/0xff0 [ 881.233743] ? security_file_ioctl+0x83/0xb0 [ 881.238143] SyS_ioctl+0x7f/0xb0 [ 881.241667] ? do_vfs_ioctl+0xff0/0xff0 [ 881.245635] do_syscall_64+0x1d5/0x640 [ 881.249523] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 881.254693] RIP: 0033:0x7f2645954fc7 [ 881.258386] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 881.266083] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 881.273335] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 881.280583] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 881.287839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 881.295096] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:17 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async, rerun: 64) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) (async, rerun: 32) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) (async, rerun: 32) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) (async) r3 = socket$can_raw(0x1d, 0x3, 0x1) (async) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) (async) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @private}, &(0x7f0000001580)=0xc) 22:39:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) accept4$netrom(r1, &(0x7f0000000040)={{0x3, @default}, [@netrom, @null, @netrom, @rose, @bcast, @null, @default]}, &(0x7f00000000c0)=0x48, 0x80000) 22:39:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 23) 22:39:17 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}]}) 22:39:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 24) [ 881.413394] XFS (loop4): Invalid superblock magic number [ 881.446010] XFS (loop1): Invalid superblock magic number 22:39:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) accept4$netrom(r1, &(0x7f0000000040)={{0x3, @default}, [@netrom, @null, @netrom, @rose, @bcast, @null, @default]}, &(0x7f00000000c0)=0x48, 0x80000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) accept4$netrom(r1, &(0x7f0000000040)={{0x3, @default}, [@netrom, @null, @netrom, @rose, @bcast, @null, @default]}, &(0x7f00000000c0)=0x48, 0x80000) (async) [ 881.496740] FAULT_INJECTION: forcing a failure. [ 881.496740] name failslab, interval 1, probability 0, space 0, times 0 [ 881.514196] CPU: 1 PID: 2328 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 881.522006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 881.531371] Call Trace: [ 881.533962] dump_stack+0x1b2/0x281 [ 881.537595] should_fail.cold+0x10a/0x149 [ 881.541746] should_failslab+0xd6/0x130 [ 881.545976] kmem_cache_alloc_node+0x263/0x410 [ 881.550545] __alloc_skb+0x5c/0x510 [ 881.554152] kobject_uevent_env+0x882/0xf30 [ 881.558467] lo_ioctl+0x11a6/0x1cd0 [ 881.562080] ? loop_set_status64+0xe0/0xe0 [ 881.566297] blkdev_ioctl+0x540/0x1830 [ 881.570171] ? blkpg_ioctl+0x8d0/0x8d0 [ 881.574044] ? trace_hardirqs_on+0x10/0x10 [ 881.578281] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 881.583380] ? debug_check_no_obj_freed+0x2c0/0x680 [ 881.588378] block_ioctl+0xd9/0x120 [ 881.591983] ? blkdev_fallocate+0x3a0/0x3a0 [ 881.596289] do_vfs_ioctl+0x75a/0xff0 [ 881.600078] ? lock_acquire+0x170/0x3f0 [ 881.604038] ? ioctl_preallocate+0x1a0/0x1a0 [ 881.608427] ? __fget+0x265/0x3e0 [ 881.611859] ? do_vfs_ioctl+0xff0/0xff0 [ 881.615821] ? security_file_ioctl+0x83/0xb0 [ 881.620216] SyS_ioctl+0x7f/0xb0 [ 881.623567] ? do_vfs_ioctl+0xff0/0xff0 [ 881.627520] do_syscall_64+0x1d5/0x640 [ 881.631398] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 881.636565] RIP: 0033:0x7f2645954fc7 22:39:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) accept4$netrom(r1, &(0x7f0000000040)={{0x3, @default}, [@netrom, @null, @netrom, @rose, @bcast, @null, @default]}, &(0x7f00000000c0)=0x48, 0x80000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) accept4$netrom(r1, &(0x7f0000000040)={{0x3, @default}, [@netrom, @null, @netrom, @rose, @bcast, @null, @default]}, &(0x7f00000000c0)=0x48, 0x80000) (async) [ 881.640257] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 881.647961] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 881.655210] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 881.662456] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 881.669705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 881.676955] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) socket$inet_udp(0x2, 0x2, 0x0) [ 881.700454] FAULT_INJECTION: forcing a failure. [ 881.700454] name failslab, interval 1, probability 0, space 0, times 0 [ 881.719404] CPU: 0 PID: 2330 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 881.727216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 881.736570] Call Trace: [ 881.739162] dump_stack+0x1b2/0x281 [ 881.742800] should_fail.cold+0x10a/0x149 [ 881.747037] should_failslab+0xd6/0x130 22:39:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) socket$inet_udp(0x2, 0x2, 0x0) 22:39:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) socket$inet_udp(0x2, 0x2, 0x0) [ 881.751011] kmem_cache_alloc_node+0x263/0x410 [ 881.755593] __alloc_skb+0x5c/0x510 [ 881.759224] kobject_uevent_env+0x882/0xf30 [ 881.763554] lo_ioctl+0x11a6/0x1cd0 [ 881.767183] ? loop_set_status64+0xe0/0xe0 [ 881.771416] blkdev_ioctl+0x540/0x1830 [ 881.775301] ? blkpg_ioctl+0x8d0/0x8d0 [ 881.779185] ? trace_hardirqs_on+0x10/0x10 [ 881.783420] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 881.788532] ? debug_check_no_obj_freed+0x2c0/0x680 [ 881.793548] block_ioctl+0xd9/0x120 22:39:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000180)={{0x0, 0xcdbb, 0x1, 0x7ff, 0xffffffff, 0xffffffffffffff57, 0x8, 0x4, 0x4, 0xfffffffd, 0x7, 0x3, 0x5, 0x6, 0x100}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f00000003c0)={{r3, 0x80, 0x1ff, 0x7, 0x9, 0x6, 0x6e90, 0x4041, 0x9, 0x9, 0xfffffffc, 0x9, 0x5, 0x3a76, 0x8000000000000001}}) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000240)=0xfb8f, 0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) sendto$netrom(r1, &(0x7f0000000040)="21bc4773a8e79985066d4206b1ec33a112a6e25955948137f73fa8db2cdafd56357f060aa50d169f172c4b3959726b7448601428d39df85894ee58b3bf3a9fcdf74bbcb15af17c7dde297a2931ff57a32d8f1a241cbdb71f6acc9f9d7aee49d6fd5cb5d0c8489cbd9920be2df547032399a68b8417e1a1ebbce1bbb795c01e8a0aae6120843c99b7c959ac149a480439d1b73b6d4c7e787286fae88f2bb2e56f930524b6d7b204b4bf150abf7b71dfdc2b731337bdb0f2", 0xb7, 0x24044000, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r4 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r4, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x20, 0x10, 0x1, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x65, 0x0, 0x4, 0x29, 0x0, @loopback, @broadcast, {[@end, @rr={0x7, 0xf, 0xfc, [@empty, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) bind$can_raw(r4, &(0x7f0000000340)={0x1d, r5}, 0x10) [ 881.797170] ? blkdev_fallocate+0x3a0/0x3a0 [ 881.801488] do_vfs_ioctl+0x75a/0xff0 [ 881.805295] ? lock_acquire+0x170/0x3f0 [ 881.809267] ? ioctl_preallocate+0x1a0/0x1a0 [ 881.813674] ? __fget+0x265/0x3e0 [ 881.817132] ? do_vfs_ioctl+0xff0/0xff0 [ 881.821103] ? security_file_ioctl+0x83/0xb0 [ 881.825509] SyS_ioctl+0x7f/0xb0 [ 881.828874] ? do_vfs_ioctl+0xff0/0xff0 [ 881.832853] do_syscall_64+0x1d5/0x640 [ 881.836735] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 881.841903] RIP: 0033:0x7f91fb945fc7 22:39:17 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @private}, &(0x7f0000001580)=0xc) [ 881.845593] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 881.847316] XFS (loop0): Invalid superblock magic number [ 881.853285] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 881.853290] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 881.853295] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 881.853300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 881.853305] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 881.914934] XFS (loop4): Invalid superblock magic number [ 881.961570] XFS (loop2): Invalid superblock magic number 22:39:18 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) (async) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) (async) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) (async, rerun: 32) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @private}, &(0x7f0000001580)=0xc) (rerun: 32) 22:39:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 64) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000180)={{0x0, 0xcdbb, 0x1, 0x7ff, 0xffffffff, 0xffffffffffffff57, 0x8, 0x4, 0x4, 0xfffffffd, 0x7, 0x3, 0x5, 0x6, 0x100}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f00000003c0)={{r3, 0x80, 0x1ff, 0x7, 0x9, 0x6, 0x6e90, 0x4041, 0x9, 0x9, 0xfffffffc, 0x9, 0x5, 0x3a76, 0x8000000000000001}}) (async, rerun: 32) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000240)=0xfb8f, 0x4) (async, rerun: 32) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendto$netrom(r1, &(0x7f0000000040)="21bc4773a8e79985066d4206b1ec33a112a6e25955948137f73fa8db2cdafd56357f060aa50d169f172c4b3959726b7448601428d39df85894ee58b3bf3a9fcdf74bbcb15af17c7dde297a2931ff57a32d8f1a241cbdb71f6acc9f9d7aee49d6fd5cb5d0c8489cbd9920be2df547032399a68b8417e1a1ebbce1bbb795c01e8a0aae6120843c99b7c959ac149a480439d1b73b6d4c7e787286fae88f2bb2e56f930524b6d7b204b4bf150abf7b71dfdc2b731337bdb0f2", 0xb7, 0x24044000, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) r4 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r4, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x20, 0x10, 0x1, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x65, 0x0, 0x4, 0x29, 0x0, @loopback, @broadcast, {[@end, @rr={0x7, 0xf, 0xfc, [@empty, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) bind$can_raw(r4, &(0x7f0000000340)={0x1d, r5}, 0x10) 22:39:18 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}]}) 22:39:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 25) 22:39:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 24) [ 882.352707] FAULT_INJECTION: forcing a failure. [ 882.352707] name failslab, interval 1, probability 0, space 0, times 0 [ 882.370219] CPU: 1 PID: 2407 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 882.378032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 882.387391] Call Trace: [ 882.389974] dump_stack+0x1b2/0x281 [ 882.393604] should_fail.cold+0x10a/0x149 [ 882.397763] should_failslab+0xd6/0x130 [ 882.401736] kmem_cache_alloc_node+0x263/0x410 [ 882.406323] __alloc_skb+0x5c/0x510 [ 882.409952] kobject_uevent_env+0x882/0xf30 [ 882.414286] lo_ioctl+0x11a6/0x1cd0 [ 882.417923] ? loop_set_status64+0xe0/0xe0 [ 882.422147] blkdev_ioctl+0x540/0x1830 [ 882.426036] ? blkpg_ioctl+0x8d0/0x8d0 [ 882.429909] ? trace_hardirqs_on+0x10/0x10 [ 882.434147] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 882.439241] ? debug_check_no_obj_freed+0x2c0/0x680 [ 882.444302] block_ioctl+0xd9/0x120 [ 882.447920] ? blkdev_fallocate+0x3a0/0x3a0 [ 882.452230] do_vfs_ioctl+0x75a/0xff0 [ 882.456014] ? lock_acquire+0x170/0x3f0 [ 882.459972] ? ioctl_preallocate+0x1a0/0x1a0 [ 882.464361] ? __fget+0x265/0x3e0 [ 882.467804] ? do_vfs_ioctl+0xff0/0xff0 [ 882.471782] ? security_file_ioctl+0x83/0xb0 [ 882.476183] SyS_ioctl+0x7f/0xb0 [ 882.479524] ? do_vfs_ioctl+0xff0/0xff0 [ 882.483562] do_syscall_64+0x1d5/0x640 [ 882.487454] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 882.492629] RIP: 0033:0x7f91fb945fc7 22:39:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000180)={{0x0, 0xcdbb, 0x1, 0x7ff, 0xffffffff, 0xffffffffffffff57, 0x8, 0x4, 0x4, 0xfffffffd, 0x7, 0x3, 0x5, 0x6, 0x100}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f00000003c0)={{r3, 0x80, 0x1ff, 0x7, 0x9, 0x6, 0x6e90, 0x4041, 0x9, 0x9, 0xfffffffc, 0x9, 0x5, 0x3a76, 0x8000000000000001}}) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000240)=0xfb8f, 0x4) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendto$netrom(r1, &(0x7f0000000040)="21bc4773a8e79985066d4206b1ec33a112a6e25955948137f73fa8db2cdafd56357f060aa50d169f172c4b3959726b7448601428d39df85894ee58b3bf3a9fcdf74bbcb15af17c7dde297a2931ff57a32d8f1a241cbdb71f6acc9f9d7aee49d6fd5cb5d0c8489cbd9920be2df547032399a68b8417e1a1ebbce1bbb795c01e8a0aae6120843c99b7c959ac149a480439d1b73b6d4c7e787286fae88f2bb2e56f930524b6d7b204b4bf150abf7b71dfdc2b731337bdb0f2", 0xb7, 0x24044000, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) r4 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r4, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x20, 0x10, 0x1, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x65, 0x0, 0x4, 0x29, 0x0, @loopback, @broadcast, {[@end, @rr={0x7, 0xf, 0xfc, [@empty, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) bind$can_raw(r4, &(0x7f0000000340)={0x1d, r5}, 0x10) [ 882.496315] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 882.504032] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 882.511285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 882.518539] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 882.525804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 882.533058] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 882.556242] FAULT_INJECTION: forcing a failure. [ 882.556242] name failslab, interval 1, probability 0, space 0, times 0 [ 882.568455] CPU: 0 PID: 2415 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 882.576255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 882.585781] Call Trace: [ 882.588374] dump_stack+0x1b2/0x281 [ 882.592016] should_fail.cold+0x10a/0x149 [ 882.596168] should_failslab+0xd6/0x130 [ 882.600143] kmem_cache_alloc_node+0x263/0x410 22:39:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, &(0x7f0000000040)="e74fbd196ad5f16737ca5928c792b4e59c567b52acead50691d63c5d2d43b9ac96946140e5b2cbcedf34ba5cd50fa186fc1bf8891edbceee8b703568e6c609bb6cde699e47b3ed48b81321a60eb78f62358aacc3850a2dc0e3aa7d29f44349dd6218e053a76e22014b249cef4d23bc19", 0x70, 0x880, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5}, [@default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null]}, 0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000140)=0x8, 0x4) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 22:39:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, &(0x7f0000000040)="e74fbd196ad5f16737ca5928c792b4e59c567b52acead50691d63c5d2d43b9ac96946140e5b2cbcedf34ba5cd50fa186fc1bf8891edbceee8b703568e6c609bb6cde699e47b3ed48b81321a60eb78f62358aacc3850a2dc0e3aa7d29f44349dd6218e053a76e22014b249cef4d23bc19", 0x70, 0x880, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5}, [@default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000140)=0x8, 0x4) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 22:39:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, &(0x7f0000000040)="e74fbd196ad5f16737ca5928c792b4e59c567b52acead50691d63c5d2d43b9ac96946140e5b2cbcedf34ba5cd50fa186fc1bf8891edbceee8b703568e6c609bb6cde699e47b3ed48b81321a60eb78f62358aacc3850a2dc0e3aa7d29f44349dd6218e053a76e22014b249cef4d23bc19", 0x70, 0x880, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x5}, [@default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000140)=0x8, 0x4) (async) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 882.604727] __alloc_skb+0x5c/0x510 [ 882.608358] kobject_uevent_env+0x882/0xf30 [ 882.612686] lo_ioctl+0x11a6/0x1cd0 [ 882.616320] ? loop_set_status64+0xe0/0xe0 [ 882.620553] blkdev_ioctl+0x540/0x1830 [ 882.624439] ? blkpg_ioctl+0x8d0/0x8d0 [ 882.628321] ? trace_hardirqs_on+0x10/0x10 [ 882.632562] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 882.637664] ? debug_check_no_obj_freed+0x2c0/0x680 [ 882.642686] block_ioctl+0xd9/0x120 [ 882.646504] ? blkdev_fallocate+0x3a0/0x3a0 [ 882.650822] do_vfs_ioctl+0x75a/0xff0 22:39:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7fffffffffffffff, 0x0, 0x8001, 0x9, 0x7, 0x9, 0x9, 0x2, 0x2, 0x0, 0x1, 0x9, 0xc6, 0x3}}) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7fffffffffffffff, 0x0, 0x8001, 0x9, 0x7, 0x9, 0x9, 0x2, 0x2, 0x0, 0x1, 0x9, 0xc6, 0x3}}) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7fffffffffffffff, 0x0, 0x8001, 0x9, 0x7, 0x9, 0x9, 0x2, 0x2, 0x0, 0x1, 0x9, 0xc6, 0x3}}) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) [ 882.654668] ? lock_acquire+0x170/0x3f0 [ 882.658640] ? ioctl_preallocate+0x1a0/0x1a0 [ 882.663042] ? __fget+0x265/0x3e0 [ 882.666501] ? do_vfs_ioctl+0xff0/0xff0 [ 882.670471] ? security_file_ioctl+0x83/0xb0 [ 882.674871] SyS_ioctl+0x7f/0xb0 [ 882.678326] ? do_vfs_ioctl+0xff0/0xff0 [ 882.682304] do_syscall_64+0x1d5/0x640 [ 882.686192] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 882.691377] RIP: 0033:0x7f2645954fc7 [ 882.695101] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 882.702807] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 882.702940] XFS (loop0): Invalid superblock magic number [ 882.710070] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 882.710076] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 882.710081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 882.710086] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:18 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @private}, &(0x7f0000001580)=0xc) [ 882.753110] XFS (loop2): Invalid superblock magic number [ 882.779258] XFS (loop4): Invalid superblock magic number 22:39:19 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x7, 0x8f3, 0x21, @private0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x8, 0x40, 0x3ff, 0x7f}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'gre0\x00', r1, 0x8000, 0x7, 0x100, 0xfffffffc, {{0xf, 0x4, 0x3, 0x20, 0x3c, 0x68, 0x0, 0x81, 0x2d, 0x0, @rand_addr=0x64010102, @multicast1, {[@lsrr={0x83, 0x27, 0xd0, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @private=0xa010101, @rand_addr=0x64010101, @empty, @multicast2, @broadcast, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0xf}]}]}}}}}) 22:39:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7fffffffffffffff, 0x0, 0x8001, 0x9, 0x7, 0x9, 0x9, 0x2, 0x2, 0x0, 0x1, 0x9, 0xc6, 0x3}}) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 26) 22:39:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 25) 22:39:19 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7fffffffffffffff, 0x0, 0x8001, 0x9, 0x7, 0x9, 0x9, 0x2, 0x2, 0x0, 0x1, 0x9, 0xc6, 0x3}}) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:19 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x7, 0x8f3, 0x21, @private0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x8, 0x40, 0x3ff, 0x7f}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'gre0\x00', r1, 0x8000, 0x7, 0x100, 0xfffffffc, {{0xf, 0x4, 0x3, 0x20, 0x3c, 0x68, 0x0, 0x81, 0x2d, 0x0, @rand_addr=0x64010102, @multicast1, {[@lsrr={0x83, 0x27, 0xd0, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @private=0xa010101, @rand_addr=0x64010101, @empty, @multicast2, @broadcast, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0xf}]}]}}}}}) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x7, 0x8f3, 0x21, @private0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x8, 0x40, 0x3ff, 0x7f}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'gre0\x00', r1, 0x8000, 0x7, 0x100, 0xfffffffc, {{0xf, 0x4, 0x3, 0x20, 0x3c, 0x68, 0x0, 0x81, 0x2d, 0x0, @rand_addr=0x64010102, @multicast1, {[@lsrr={0x83, 0x27, 0xd0, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @private=0xa010101, @rand_addr=0x64010101, @empty, @multicast2, @broadcast, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0xf}]}]}}}}}) (async) 22:39:19 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) accept4$netrom(r4, &(0x7f0000000240)={{0x3, @netrom}, [@default, @remote, @bcast, @remote, @default, @null, @netrom, @default]}, &(0x7f00000002c0)=0x48, 0x80000) 22:39:19 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x7, 0x101, 0x5, 0x2, 0xd6, 0x9}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:19 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x7, 0x8f3, 0x21, @private0, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x8, 0x40, 0x3ff, 0x7f}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'gre0\x00', r1, 0x8000, 0x7, 0x100, 0xfffffffc, {{0xf, 0x4, 0x3, 0x20, 0x3c, 0x68, 0x0, 0x81, 0x2d, 0x0, @rand_addr=0x64010102, @multicast1, {[@lsrr={0x83, 0x27, 0xd0, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @private=0xa010101, @rand_addr=0x64010101, @empty, @multicast2, @broadcast, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0xf}]}]}}}}}) 22:39:19 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 883.265730] FAULT_INJECTION: forcing a failure. [ 883.265730] name failslab, interval 1, probability 0, space 0, times 0 [ 883.286475] CPU: 1 PID: 2505 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 883.294292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 883.303644] Call Trace: [ 883.306238] dump_stack+0x1b2/0x281 [ 883.309872] should_fail.cold+0x10a/0x149 22:39:19 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x7, 0x101, 0x5, 0x2, 0xd6, 0x9}) (async) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 883.314024] should_failslab+0xd6/0x130 [ 883.318000] kmem_cache_alloc_node_trace+0x25a/0x400 [ 883.323112] __kmalloc_node_track_caller+0x38/0x70 [ 883.328044] __alloc_skb+0x96/0x510 [ 883.331783] kobject_uevent_env+0x882/0xf30 [ 883.336118] lo_ioctl+0x11a6/0x1cd0 [ 883.339796] ? loop_set_status64+0xe0/0xe0 [ 883.344033] blkdev_ioctl+0x540/0x1830 [ 883.347922] ? blkpg_ioctl+0x8d0/0x8d0 [ 883.351827] ? trace_hardirqs_on+0x10/0x10 [ 883.356065] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 883.361169] ? debug_check_no_obj_freed+0x2c0/0x680 [ 883.366183] block_ioctl+0xd9/0x120 [ 883.369928] ? blkdev_fallocate+0x3a0/0x3a0 [ 883.374371] do_vfs_ioctl+0x75a/0xff0 [ 883.378171] ? lock_acquire+0x170/0x3f0 [ 883.382253] ? ioctl_preallocate+0x1a0/0x1a0 [ 883.386655] ? __fget+0x265/0x3e0 [ 883.390094] ? do_vfs_ioctl+0xff0/0xff0 [ 883.394062] ? security_file_ioctl+0x83/0xb0 [ 883.398455] SyS_ioctl+0x7f/0xb0 [ 883.401801] ? do_vfs_ioctl+0xff0/0xff0 [ 883.405764] do_syscall_64+0x1d5/0x640 [ 883.409644] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 883.414815] RIP: 0033:0x7f91fb945fc7 [ 883.418506] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 883.426195] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 883.433450] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 883.440699] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 883.447951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 883.455199] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 883.471961] FAULT_INJECTION: forcing a failure. [ 883.471961] name failslab, interval 1, probability 0, space 0, times 0 [ 883.483776] CPU: 0 PID: 2506 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 883.491665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 883.501117] Call Trace: [ 883.503691] dump_stack+0x1b2/0x281 [ 883.507313] should_fail.cold+0x10a/0x149 [ 883.511452] should_failslab+0xd6/0x130 [ 883.515410] kmem_cache_alloc_node+0x263/0x410 [ 883.519978] __alloc_skb+0x5c/0x510 [ 883.523590] kobject_uevent_env+0x882/0xf30 [ 883.527899] lo_ioctl+0x11a6/0x1cd0 [ 883.531512] ? loop_set_status64+0xe0/0xe0 [ 883.535759] blkdev_ioctl+0x540/0x1830 [ 883.539730] ? blkpg_ioctl+0x8d0/0x8d0 [ 883.543599] ? trace_hardirqs_on+0x10/0x10 [ 883.547926] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 883.553095] ? debug_check_no_obj_freed+0x2c0/0x680 [ 883.558097] block_ioctl+0xd9/0x120 [ 883.561747] ? blkdev_fallocate+0x3a0/0x3a0 [ 883.566060] do_vfs_ioctl+0x75a/0xff0 [ 883.569940] ? lock_acquire+0x170/0x3f0 [ 883.573999] ? ioctl_preallocate+0x1a0/0x1a0 [ 883.578392] ? __fget+0x265/0x3e0 [ 883.581829] ? do_vfs_ioctl+0xff0/0xff0 [ 883.585789] ? security_file_ioctl+0x83/0xb0 [ 883.590185] SyS_ioctl+0x7f/0xb0 [ 883.593540] ? do_vfs_ioctl+0xff0/0xff0 [ 883.597857] do_syscall_64+0x1d5/0x640 [ 883.599193] XFS (loop2): Invalid superblock magic number [ 883.601782] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 883.601792] RIP: 0033:0x7f2645954fc7 22:39:19 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001440)={0x0, @private}, &(0x7f0000001580)=0xc) 22:39:19 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) socket$l2tp(0x2, 0x2, 0x73) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) 22:39:19 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x7, 0x101, 0x5, 0x2, 0xd6, 0x9}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x7, 0x101, 0x5, 0x2, 0xd6, 0x9}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) [ 883.601797] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 883.601808] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 883.601814] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 883.601819] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 883.601823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 883.601827] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 27) 22:39:19 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) accept4$netrom(r4, &(0x7f0000000240)={{0x3, @netrom}, [@default, @remote, @bcast, @remote, @default, @null, @netrom, @default]}, &(0x7f00000002c0)=0x48, 0x80000) 22:39:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 26) 22:39:19 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:19 executing program 3: connect$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x1}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 883.716001] XFS (loop4): Invalid superblock magic number 22:39:19 executing program 3: connect$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x1}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) (async) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 883.815328] FAULT_INJECTION: forcing a failure. [ 883.815328] name failslab, interval 1, probability 0, space 0, times 0 [ 883.836162] CPU: 1 PID: 2576 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 883.843979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 883.853337] Call Trace: [ 883.855926] dump_stack+0x1b2/0x281 [ 883.859677] should_fail.cold+0x10a/0x149 22:39:19 executing program 3: connect$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @bcast, 0x1}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) (async) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 883.863827] should_failslab+0xd6/0x130 [ 883.867830] kmem_cache_alloc_node+0x263/0x410 [ 883.872427] __alloc_skb+0x5c/0x510 [ 883.876057] kobject_uevent_env+0x882/0xf30 [ 883.880509] lo_ioctl+0x11a6/0x1cd0 [ 883.884138] ? loop_set_status64+0xe0/0xe0 [ 883.888375] blkdev_ioctl+0x540/0x1830 [ 883.892280] ? blkpg_ioctl+0x8d0/0x8d0 [ 883.896165] ? trace_hardirqs_on+0x10/0x10 [ 883.900386] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 883.905477] ? debug_check_no_obj_freed+0x2c0/0x680 [ 883.910505] block_ioctl+0xd9/0x120 [ 883.914138] ? blkdev_fallocate+0x3a0/0x3a0 [ 883.918471] do_vfs_ioctl+0x75a/0xff0 [ 883.922262] ? lock_acquire+0x170/0x3f0 [ 883.926242] ? ioctl_preallocate+0x1a0/0x1a0 [ 883.930635] ? __fget+0x265/0x3e0 [ 883.939205] ? do_vfs_ioctl+0xff0/0xff0 [ 883.943195] ? security_file_ioctl+0x83/0xb0 [ 883.947587] SyS_ioctl+0x7f/0xb0 [ 883.950935] ? do_vfs_ioctl+0xff0/0xff0 [ 883.954920] do_syscall_64+0x1d5/0x640 [ 883.958798] entry_SYSCALL_64_after_hwframe+0x46/0xbb 22:39:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:20 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) accept4$netrom(r4, &(0x7f0000000240)={{0x3, @netrom}, [@default, @remote, @bcast, @remote, @default, @null, @netrom, @default]}, &(0x7f00000002c0)=0x48, 0x80000) [ 883.963970] RIP: 0033:0x7f91fb945fc7 [ 883.967715] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 883.975405] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 883.982658] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 883.989960] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 883.997406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 884.004657] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 884.046378] FAULT_INJECTION: forcing a failure. [ 884.046378] name failslab, interval 1, probability 0, space 0, times 0 [ 884.061511] CPU: 1 PID: 2578 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 884.069323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 884.078943] Call Trace: [ 884.081532] dump_stack+0x1b2/0x281 [ 884.085168] should_fail.cold+0x10a/0x149 [ 884.089391] should_failslab+0xd6/0x130 [ 884.093349] kmem_cache_alloc_node_trace+0x25a/0x400 [ 884.098447] __kmalloc_node_track_caller+0x38/0x70 [ 884.103364] __alloc_skb+0x96/0x510 [ 884.106984] kobject_uevent_env+0x882/0xf30 [ 884.111383] lo_ioctl+0x11a6/0x1cd0 [ 884.114995] ? loop_set_status64+0xe0/0xe0 [ 884.119218] blkdev_ioctl+0x540/0x1830 [ 884.123099] ? blkpg_ioctl+0x8d0/0x8d0 [ 884.125865] XFS (loop2): Invalid superblock magic number [ 884.126973] ? trace_hardirqs_on+0x10/0x10 [ 884.126990] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 884.127001] ? debug_check_no_obj_freed+0x2c0/0x680 [ 884.127015] block_ioctl+0xd9/0x120 [ 884.150459] ? blkdev_fallocate+0x3a0/0x3a0 [ 884.154788] do_vfs_ioctl+0x75a/0xff0 [ 884.158660] ? lock_acquire+0x170/0x3f0 [ 884.162616] ? ioctl_preallocate+0x1a0/0x1a0 [ 884.167032] ? __fget+0x265/0x3e0 [ 884.170465] ? do_vfs_ioctl+0xff0/0xff0 [ 884.174517] ? security_file_ioctl+0x83/0xb0 [ 884.178927] SyS_ioctl+0x7f/0xb0 [ 884.182285] ? do_vfs_ioctl+0xff0/0xff0 [ 884.186245] do_syscall_64+0x1d5/0x640 [ 884.190117] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 884.195414] RIP: 0033:0x7f2645954fc7 [ 884.199141] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 884.206836] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 884.214095] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 884.221346] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 884.228795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 884.236061] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 884.316587] XFS (loop4): Invalid superblock magic number 22:39:20 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r3, 0x65, 0x2, &(0x7f0000000300)=0x400, 0x4) 22:39:20 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) 22:39:20 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x30, r3, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x100000000}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x63}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x4004051) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)={{0x0, 0x8000, 0xcfc9, 0x6, 0x9, 0x7, 0x9e, 0x2, 0x9, 0xffffffff, 0x3, 0xfffffffffffffffa, 0x7ff, 0x5, 0x7}, 0x50, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000100)={{r4, 0xf2, 0x9, 0x3f, 0x5, 0x6e, 0xfff, 0x3, 0xd203, 0x0, 0x0, 0x5, 0xe828, 0x6, 0x53}}) 22:39:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 27) 22:39:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 28) 22:39:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 884.594785] FAULT_INJECTION: forcing a failure. [ 884.594785] name failslab, interval 1, probability 0, space 0, times 0 22:39:20 executing program 5: ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x0, @null, @netrom={'nr', 0x0}, 0xb, 'syz0\x00', @bcast, 0x1e, 0x3, [@bcast, @null, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:20 executing program 5: ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x0, @null, @netrom={'nr', 0x0}, 0xb, 'syz0\x00', @bcast, 0x1e, 0x3, [@bcast, @null, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 884.635840] CPU: 0 PID: 2629 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 884.643652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 884.653436] Call Trace: [ 884.656028] dump_stack+0x1b2/0x281 [ 884.659667] should_fail.cold+0x10a/0x149 [ 884.663821] should_failslab+0xd6/0x130 [ 884.667806] kmem_cache_alloc_node_trace+0x25a/0x400 [ 884.672920] __kmalloc_node_track_caller+0x38/0x70 [ 884.677864] __alloc_skb+0x96/0x510 [ 884.681494] kobject_uevent_env+0x882/0xf30 22:39:20 executing program 5: ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x0, @null, @netrom={'nr', 0x0}, 0xb, 'syz0\x00', @bcast, 0x1e, 0x3, [@bcast, @null, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) (async) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x0, 0xa9, "bdcf1643cb75bdb0f17e8bf387ae87217e3bfcc0c3db945e766aa087180f7679908343db0773a2a89246dc55eafd62ee9a177fae47e7e796b7aeaf1ed1f37b4f2d96d920fceda50578dc7d9ed3a4888ea1387e07851e2fcc478232eba5f005919a08e0547603f64ba22b9584cbda7482a91845fe11035ec1b3cc721f7d61a9c18b392cc01a457d7dc71c3a6c22634482be26b9623b3fc39a23b464d6833a3561ec3563a7d9f5c11618"}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 884.685947] lo_ioctl+0x11a6/0x1cd0 [ 884.689577] ? loop_set_status64+0xe0/0xe0 [ 884.693815] blkdev_ioctl+0x540/0x1830 [ 884.697720] ? blkpg_ioctl+0x8d0/0x8d0 [ 884.701608] ? trace_hardirqs_on+0x10/0x10 [ 884.705862] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 884.710969] ? debug_check_no_obj_freed+0x2c0/0x680 [ 884.716086] block_ioctl+0xd9/0x120 [ 884.719707] ? blkdev_fallocate+0x3a0/0x3a0 [ 884.724024] do_vfs_ioctl+0x75a/0xff0 [ 884.727830] ? lock_acquire+0x170/0x3f0 [ 884.731797] ? ioctl_preallocate+0x1a0/0x1a0 22:39:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x0, 0xa9, "bdcf1643cb75bdb0f17e8bf387ae87217e3bfcc0c3db945e766aa087180f7679908343db0773a2a89246dc55eafd62ee9a177fae47e7e796b7aeaf1ed1f37b4f2d96d920fceda50578dc7d9ed3a4888ea1387e07851e2fcc478232eba5f005919a08e0547603f64ba22b9584cbda7482a91845fe11035ec1b3cc721f7d61a9c18b392cc01a457d7dc71c3a6c22634482be26b9623b3fc39a23b464d6833a3561ec3563a7d9f5c11618"}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 884.736295] ? __fget+0x265/0x3e0 [ 884.739751] ? do_vfs_ioctl+0xff0/0xff0 [ 884.743722] ? security_file_ioctl+0x83/0xb0 [ 884.748129] SyS_ioctl+0x7f/0xb0 [ 884.751489] ? do_vfs_ioctl+0xff0/0xff0 [ 884.755453] do_syscall_64+0x1d5/0x640 [ 884.759350] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 884.764531] RIP: 0033:0x7f91fb945fc7 [ 884.768232] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 884.775928] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 22:39:20 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, 0x0, 0x0) [ 884.783180] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 884.790430] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 884.797679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 884.804930] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 884.837399] FAULT_INJECTION: forcing a failure. [ 884.837399] name failslab, interval 1, probability 0, space 0, times 0 [ 884.851651] CPU: 1 PID: 2638 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 884.859456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 884.868883] Call Trace: [ 884.871473] dump_stack+0x1b2/0x281 [ 884.875144] should_fail.cold+0x10a/0x149 [ 884.879401] should_failslab+0xd6/0x130 [ 884.883358] kmem_cache_alloc_node_trace+0x25a/0x400 [ 884.888463] __kmalloc_node_track_caller+0x38/0x70 [ 884.893376] __alloc_skb+0x96/0x510 [ 884.896984] kobject_uevent_env+0x882/0xf30 [ 884.901310] lo_ioctl+0x11a6/0x1cd0 [ 884.904931] ? loop_set_status64+0xe0/0xe0 [ 884.909157] blkdev_ioctl+0x540/0x1830 [ 884.913034] ? blkpg_ioctl+0x8d0/0x8d0 [ 884.917012] ? trace_hardirqs_on+0x10/0x10 [ 884.921230] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 884.926399] ? debug_check_no_obj_freed+0x2c0/0x680 [ 884.931418] block_ioctl+0xd9/0x120 [ 884.935030] ? blkdev_fallocate+0x3a0/0x3a0 [ 884.939350] do_vfs_ioctl+0x75a/0xff0 [ 884.943145] ? lock_acquire+0x170/0x3f0 [ 884.947107] ? ioctl_preallocate+0x1a0/0x1a0 [ 884.951512] ? __fget+0x265/0x3e0 [ 884.954954] ? do_vfs_ioctl+0xff0/0xff0 [ 884.958926] ? security_file_ioctl+0x83/0xb0 [ 884.963315] SyS_ioctl+0x7f/0xb0 [ 884.966661] ? do_vfs_ioctl+0xff0/0xff0 [ 884.970614] do_syscall_64+0x1d5/0x640 [ 884.974485] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 884.979653] RIP: 0033:0x7f2645954fc7 [ 884.983351] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 884.991036] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 884.998287] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 885.005720] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 885.012989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 885.020336] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 885.048147] XFS (loop2): Invalid superblock magic number [ 885.115047] XFS (loop4): Invalid superblock magic number 22:39:21 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) 22:39:21 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x80, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x0, 0xa9, "bdcf1643cb75bdb0f17e8bf387ae87217e3bfcc0c3db945e766aa087180f7679908343db0773a2a89246dc55eafd62ee9a177fae47e7e796b7aeaf1ed1f37b4f2d96d920fceda50578dc7d9ed3a4888ea1387e07851e2fcc478232eba5f005919a08e0547603f64ba22b9584cbda7482a91845fe11035ec1b3cc721f7d61a9c18b392cc01a457d7dc71c3a6c22634482be26b9623b3fc39a23b464d6833a3561ec3563a7d9f5c11618"}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x30, r3, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x100000000}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x63}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x4004051) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)={{0x0, 0x8000, 0xcfc9, 0x6, 0x9, 0x7, 0x9e, 0x2, 0x9, 0xffffffff, 0x3, 0xfffffffffffffffa, 0x7ff, 0x5, 0x7}, 0x50, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000100)={{r4, 0xf2, 0x9, 0x3f, 0x5, 0x6e, 0xfff, 0x3, 0xd203, 0x0, 0x0, 0x5, 0xe828, 0x6, 0x53}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) accept4$alg(r0, 0x0, 0x0, 0x800) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001140), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x30, r3, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x100000000}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x63}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x4004051) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)={{0x0, 0x8000, 0xcfc9, 0x6, 0x9, 0x7, 0x9e, 0x2, 0x9, 0xffffffff, 0x3, 0xfffffffffffffffa, 0x7ff, 0x5, 0x7}, 0x50, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000100)={{r4, 0xf2, 0x9, 0x3f, 0x5, 0x6e, 0xfff, 0x3, 0xd203, 0x0, 0x0, 0x5, 0xe828, 0x6, 0x53}}) (async) 22:39:21 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200), 0x80) pipe2$watch_queue(&(0x7f0000000380), 0x80) 22:39:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 28) 22:39:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 29) 22:39:21 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) pipe2$watch_queue(&(0x7f0000000200), 0x80) 22:39:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x30, r3, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x100000000}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x63}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x4004051) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)={{0x0, 0x8000, 0xcfc9, 0x6, 0x9, 0x7, 0x9e, 0x2, 0x9, 0xffffffff, 0x3, 0xfffffffffffffffa, 0x7ff, 0x5, 0x7}, 0x50, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000100)={{r4, 0xf2, 0x9, 0x3f, 0x5, 0x6e, 0xfff, 0x3, 0xd203, 0x0, 0x0, 0x5, 0xe828, 0x6, 0x53}}) 22:39:21 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYRES64=r0], 0x58}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000280), r1) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x38, 0x31, 0x61, 0x31, 0x39, 0x37, 0x65, 0x37, 0x39, 0x65, 0x61, 0x36, 0x54, 0x34, 0x0, 0x62]}, &(0x7f0000000200)={0x0, "7aee6a5ca7623cc9c070e520b61f795d4bb36f2b184ccee425f7171f9a0fd8e7542fb04a06a947031aaefc3d05dd11fdf304a261794b6fdc927199c1546cd3fd", 0x18}, 0x48, 0xffffffffffffffff) 22:39:21 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) [ 885.551853] FAULT_INJECTION: forcing a failure. [ 885.551853] name failslab, interval 1, probability 0, space 0, times 0 [ 885.575347] CPU: 0 PID: 2709 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 885.583273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 885.592621] Call Trace: [ 885.595211] dump_stack+0x1b2/0x281 22:39:21 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYRES64=r0], 0x58}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000280), r1) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x38, 0x31, 0x61, 0x31, 0x39, 0x37, 0x65, 0x37, 0x39, 0x65, 0x61, 0x36, 0x54, 0x34, 0x0, 0x62]}, &(0x7f0000000200)={0x0, "7aee6a5ca7623cc9c070e520b61f795d4bb36f2b184ccee425f7171f9a0fd8e7542fb04a06a947031aaefc3d05dd11fdf304a261794b6fdc927199c1546cd3fd", 0x18}, 0x48, 0xffffffffffffffff) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYRES64=r0], 0x58}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000280), r1) (async) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x38, 0x31, 0x61, 0x31, 0x39, 0x37, 0x65, 0x37, 0x39, 0x65, 0x61, 0x36, 0x54, 0x34, 0x0, 0x62]}, &(0x7f0000000200)={0x0, "7aee6a5ca7623cc9c070e520b61f795d4bb36f2b184ccee425f7171f9a0fd8e7542fb04a06a947031aaefc3d05dd11fdf304a261794b6fdc927199c1546cd3fd", 0x18}, 0x48, 0xffffffffffffffff) (async) 22:39:21 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYRES64=r0], 0x58}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000280), r1) (async) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @auto=[0x38, 0x31, 0x61, 0x31, 0x39, 0x37, 0x65, 0x37, 0x39, 0x65, 0x61, 0x36, 0x54, 0x34, 0x0, 0x62]}, &(0x7f0000000200)={0x0, "7aee6a5ca7623cc9c070e520b61f795d4bb36f2b184ccee425f7171f9a0fd8e7542fb04a06a947031aaefc3d05dd11fdf304a261794b6fdc927199c1546cd3fd", 0x18}, 0x48, 0xffffffffffffffff) [ 885.598849] should_fail.cold+0x10a/0x149 [ 885.603003] should_failslab+0xd6/0x130 [ 885.606984] kmem_cache_alloc_node_trace+0x25a/0x400 [ 885.612092] __kmalloc_node_track_caller+0x38/0x70 [ 885.617020] __alloc_skb+0x96/0x510 [ 885.620651] kobject_uevent_env+0x882/0xf30 [ 885.624984] lo_ioctl+0x11a6/0x1cd0 [ 885.628655] ? loop_set_status64+0xe0/0xe0 [ 885.633930] blkdev_ioctl+0x540/0x1830 [ 885.637815] ? blkpg_ioctl+0x8d0/0x8d0 [ 885.641698] ? trace_hardirqs_on+0x10/0x10 [ 885.645934] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 885.651032] ? debug_check_no_obj_freed+0x2c0/0x680 [ 885.656051] block_ioctl+0xd9/0x120 [ 885.659670] ? blkdev_fallocate+0x3a0/0x3a0 [ 885.663971] do_vfs_ioctl+0x75a/0xff0 [ 885.667893] ? lock_acquire+0x170/0x3f0 [ 885.671855] ? ioctl_preallocate+0x1a0/0x1a0 [ 885.676242] ? __fget+0x265/0x3e0 [ 885.679677] ? do_vfs_ioctl+0xff0/0xff0 [ 885.683637] ? security_file_ioctl+0x83/0xb0 [ 885.688022] SyS_ioctl+0x7f/0xb0 [ 885.691364] ? do_vfs_ioctl+0xff0/0xff0 [ 885.695491] do_syscall_64+0x1d5/0x640 [ 885.699365] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 885.704531] RIP: 0033:0x7f2645954fc7 [ 885.708219] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 885.716025] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 885.723374] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 885.730644] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 885.737898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 885.745192] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 885.762987] FAULT_INJECTION: forcing a failure. [ 885.762987] name failslab, interval 1, probability 0, space 0, times 0 [ 885.776064] CPU: 1 PID: 2712 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 885.783974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 885.793317] Call Trace: [ 885.795890] dump_stack+0x1b2/0x281 [ 885.799511] should_fail.cold+0x10a/0x149 [ 885.803640] should_failslab+0xd6/0x130 [ 885.807600] kmem_cache_alloc_node_trace+0x25a/0x400 [ 885.812692] __kmalloc_node_track_caller+0x38/0x70 [ 885.817724] __alloc_skb+0x96/0x510 [ 885.821348] kobject_uevent_env+0x882/0xf30 [ 885.825668] lo_ioctl+0x11a6/0x1cd0 [ 885.829285] ? loop_set_status64+0xe0/0xe0 [ 885.833509] blkdev_ioctl+0x540/0x1830 [ 885.837388] ? blkpg_ioctl+0x8d0/0x8d0 [ 885.841259] ? trace_hardirqs_on+0x10/0x10 [ 885.845570] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 885.850661] ? debug_check_no_obj_freed+0x2c0/0x680 [ 885.855706] block_ioctl+0xd9/0x120 [ 885.859317] ? blkdev_fallocate+0x3a0/0x3a0 [ 885.863637] do_vfs_ioctl+0x75a/0xff0 [ 885.867448] ? lock_acquire+0x170/0x3f0 [ 885.871406] ? ioctl_preallocate+0x1a0/0x1a0 [ 885.875798] ? __fget+0x265/0x3e0 [ 885.879268] ? do_vfs_ioctl+0xff0/0xff0 [ 885.883235] ? security_file_ioctl+0x83/0xb0 [ 885.887638] SyS_ioctl+0x7f/0xb0 [ 885.890997] ? do_vfs_ioctl+0xff0/0xff0 [ 885.894957] do_syscall_64+0x1d5/0x640 [ 885.898850] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 885.904020] RIP: 0033:0x7f91fb945fc7 [ 885.907709] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 885.916089] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 885.923339] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 885.930587] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 885.937970] XFS (loop4): Invalid superblock magic number [ 885.938188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 885.950968] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 886.026933] XFS (loop2): Invalid superblock magic number 22:39:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfffffbff, 0x4) bind$netrom(r0, &(0x7f0000000040)={{0x3, @bcast, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 22:39:22 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) 22:39:22 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)) 22:39:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 30) 22:39:22 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) 22:39:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 29) [ 886.407296] FAULT_INJECTION: forcing a failure. [ 886.407296] name failslab, interval 1, probability 0, space 0, times 0 [ 886.418987] CPU: 1 PID: 2772 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 886.426787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 886.436138] Call Trace: [ 886.438735] dump_stack+0x1b2/0x281 [ 886.442365] should_fail.cold+0x10a/0x149 [ 886.446530] should_failslab+0xd6/0x130 [ 886.450535] kmem_cache_alloc_node_trace+0x25a/0x400 [ 886.455751] __kmalloc_node_track_caller+0x38/0x70 [ 886.460906] __alloc_skb+0x96/0x510 [ 886.464537] kobject_uevent_env+0x882/0xf30 [ 886.468867] lo_ioctl+0x11a6/0x1cd0 [ 886.472498] ? loop_set_status64+0xe0/0xe0 [ 886.476821] blkdev_ioctl+0x540/0x1830 [ 886.480705] ? blkpg_ioctl+0x8d0/0x8d0 [ 886.484590] ? trace_hardirqs_on+0x10/0x10 [ 886.488825] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 886.493927] ? debug_check_no_obj_freed+0x2c0/0x680 [ 886.498947] block_ioctl+0xd9/0x120 [ 886.502657] ? blkdev_fallocate+0x3a0/0x3a0 22:39:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfffffbff, 0x4) (async, rerun: 32) bind$netrom(r0, &(0x7f0000000040)={{0x3, @bcast, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) (rerun: 32) 22:39:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0xfffffbff, 0x4) bind$netrom(r0, &(0x7f0000000040)={{0x3, @bcast, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 886.506977] do_vfs_ioctl+0x75a/0xff0 [ 886.511123] ? lock_acquire+0x170/0x3f0 [ 886.515099] ? ioctl_preallocate+0x1a0/0x1a0 [ 886.519510] ? __fget+0x265/0x3e0 [ 886.522960] ? do_vfs_ioctl+0xff0/0xff0 [ 886.526930] ? security_file_ioctl+0x83/0xb0 [ 886.531329] SyS_ioctl+0x7f/0xb0 [ 886.534684] ? do_vfs_ioctl+0xff0/0xff0 [ 886.538750] do_syscall_64+0x1d5/0x640 [ 886.542719] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 886.547987] RIP: 0033:0x7f91fb945fc7 [ 886.551829] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 886.559551] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 886.566803] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 886.574059] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 886.581312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 886.588561] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 886.601283] FAULT_INJECTION: forcing a failure. 22:39:22 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async, rerun: 64) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) (async, rerun: 64) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) (async) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) 22:39:22 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)) 22:39:22 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 886.601283] name failslab, interval 1, probability 0, space 0, times 0 [ 886.634061] CPU: 0 PID: 2781 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 886.641967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 886.652017] Call Trace: [ 886.654606] dump_stack+0x1b2/0x281 [ 886.658341] should_fail.cold+0x10a/0x149 [ 886.662490] should_failslab+0xd6/0x130 [ 886.666465] kmem_cache_alloc_node_trace+0x25a/0x400 [ 886.671659] __kmalloc_node_track_caller+0x38/0x70 [ 886.676588] __alloc_skb+0x96/0x510 [ 886.680213] kobject_uevent_env+0x882/0xf30 22:39:22 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) (async) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) pipe(&(0x7f0000000200)) (async) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) (async) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) (async) 22:39:22 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)) 22:39:22 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)) [ 886.684574] lo_ioctl+0x11a6/0x1cd0 [ 886.688208] ? loop_set_status64+0xe0/0xe0 [ 886.692453] blkdev_ioctl+0x540/0x1830 [ 886.696345] ? blkpg_ioctl+0x8d0/0x8d0 [ 886.700229] ? trace_hardirqs_on+0x10/0x10 [ 886.704462] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 886.709659] ? debug_check_no_obj_freed+0x2c0/0x680 [ 886.714692] block_ioctl+0xd9/0x120 [ 886.718316] ? blkdev_fallocate+0x3a0/0x3a0 [ 886.722638] do_vfs_ioctl+0x75a/0xff0 [ 886.726443] ? lock_acquire+0x170/0x3f0 [ 886.730420] ? ioctl_preallocate+0x1a0/0x1a0 22:39:22 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 886.734942] ? __fget+0x265/0x3e0 [ 886.738407] ? do_vfs_ioctl+0xff0/0xff0 [ 886.742383] ? security_file_ioctl+0x83/0xb0 [ 886.746798] SyS_ioctl+0x7f/0xb0 [ 886.750158] ? do_vfs_ioctl+0xff0/0xff0 [ 886.754150] do_syscall_64+0x1d5/0x640 [ 886.758043] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 886.763224] RIP: 0033:0x7f2645954fc7 [ 886.767044] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 886.774751] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 886.782016] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 886.789279] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 886.796535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 886.803809] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 886.805257] XFS (loop2): Invalid superblock magic number [ 886.863043] XFS (loop4): Invalid superblock magic number 22:39:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 31) [ 886.951995] FAULT_INJECTION: forcing a failure. [ 886.951995] name failslab, interval 1, probability 0, space 0, times 0 [ 886.963843] CPU: 1 PID: 2847 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 886.971651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 886.980987] Call Trace: [ 886.983558] dump_stack+0x1b2/0x281 [ 886.987169] should_fail.cold+0x10a/0x149 [ 886.991559] should_failslab+0xd6/0x130 [ 886.995603] kmem_cache_alloc_node_trace+0x25a/0x400 [ 887.000703] __kmalloc_node_track_caller+0x38/0x70 [ 887.005756] __alloc_skb+0x96/0x510 [ 887.009381] kobject_uevent_env+0x882/0xf30 [ 887.013694] lo_ioctl+0x11a6/0x1cd0 [ 887.017307] ? loop_set_status64+0xe0/0xe0 [ 887.021525] blkdev_ioctl+0x540/0x1830 [ 887.025391] ? blkpg_ioctl+0x8d0/0x8d0 [ 887.029270] ? trace_hardirqs_on+0x10/0x10 [ 887.033486] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 887.038567] ? debug_check_no_obj_freed+0x2c0/0x680 [ 887.043565] block_ioctl+0xd9/0x120 [ 887.047169] ? blkdev_fallocate+0x3a0/0x3a0 [ 887.051468] do_vfs_ioctl+0x75a/0xff0 [ 887.055249] ? lock_acquire+0x170/0x3f0 [ 887.059214] ? ioctl_preallocate+0x1a0/0x1a0 [ 887.063689] ? __fget+0x265/0x3e0 [ 887.067124] ? do_vfs_ioctl+0xff0/0xff0 [ 887.071097] ? security_file_ioctl+0x83/0xb0 [ 887.075486] SyS_ioctl+0x7f/0xb0 [ 887.078844] ? do_vfs_ioctl+0xff0/0xff0 [ 887.082800] do_syscall_64+0x1d5/0x640 [ 887.086668] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.091836] RIP: 0033:0x7f2645954fc7 [ 887.095523] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 887.103209] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 887.110471] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 887.117718] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 887.124965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 887.132213] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 887.159059] XFS (loop4): Invalid superblock magic number 22:39:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) 22:39:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r1) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) 22:39:23 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async, rerun: 32) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (rerun: 32) 22:39:23 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000080)) 22:39:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 30) 22:39:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 32) 22:39:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)) 22:39:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:23 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) 22:39:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) socket$can_raw(0x1d, 0x3, 0x1) socket$inet(0x2, 0x800, 0x8) [ 887.365537] FAULT_INJECTION: forcing a failure. [ 887.365537] name failslab, interval 1, probability 0, space 0, times 0 [ 887.394579] CPU: 0 PID: 2882 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 887.402495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 887.411852] Call Trace: 22:39:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @dev}, &(0x7f0000000080)=0xc) 22:39:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @dev}, &(0x7f0000000080)=0xc) [ 887.414449] dump_stack+0x1b2/0x281 [ 887.418082] should_fail.cold+0x10a/0x149 [ 887.422232] should_failslab+0xd6/0x130 [ 887.426307] kmem_cache_alloc_node+0x263/0x410 [ 887.430891] __alloc_skb+0x5c/0x510 [ 887.434520] kobject_uevent_env+0x882/0xf30 [ 887.438847] lo_ioctl+0x11a6/0x1cd0 [ 887.442478] ? loop_set_status64+0xe0/0xe0 [ 887.446716] blkdev_ioctl+0x540/0x1830 [ 887.450690] ? blkpg_ioctl+0x8d0/0x8d0 [ 887.454581] ? trace_hardirqs_on+0x10/0x10 [ 887.458821] ? _raw_spin_unlock_irqrestore+0x66/0xe0 22:39:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) socket$can_raw(0x1d, 0x3, 0x1) 22:39:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) 22:39:23 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @dev}, &(0x7f0000000080)=0xc) [ 887.463925] ? debug_check_no_obj_freed+0x2c0/0x680 [ 887.468951] block_ioctl+0xd9/0x120 [ 887.472587] ? blkdev_fallocate+0x3a0/0x3a0 [ 887.476909] do_vfs_ioctl+0x75a/0xff0 [ 887.480710] ? lock_acquire+0x170/0x3f0 [ 887.484690] ? ioctl_preallocate+0x1a0/0x1a0 [ 887.489097] ? __fget+0x265/0x3e0 [ 887.492549] ? do_vfs_ioctl+0xff0/0xff0 [ 887.496524] ? security_file_ioctl+0x83/0xb0 [ 887.500937] SyS_ioctl+0x7f/0xb0 [ 887.504308] ? do_vfs_ioctl+0xff0/0xff0 [ 887.508287] do_syscall_64+0x1d5/0x640 22:39:23 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) [ 887.512177] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.517367] RIP: 0033:0x7f91fb945fc7 [ 887.521074] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 887.528958] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 887.536222] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 887.543489] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 887.550759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 887.558035] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 887.580992] FAULT_INJECTION: forcing a failure. [ 887.580992] name failslab, interval 1, probability 0, space 0, times 0 [ 887.605622] CPU: 0 PID: 2884 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 887.613442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 887.622799] Call Trace: [ 887.625389] dump_stack+0x1b2/0x281 [ 887.629033] should_fail.cold+0x10a/0x149 [ 887.633190] should_failslab+0xd6/0x130 [ 887.637173] kmem_cache_alloc_node_trace+0x25a/0x400 [ 887.642390] __kmalloc_node_track_caller+0x38/0x70 [ 887.647298] __alloc_skb+0x96/0x510 [ 887.650904] kobject_uevent_env+0x882/0xf30 [ 887.655223] lo_ioctl+0x11a6/0x1cd0 [ 887.658842] ? loop_set_status64+0xe0/0xe0 [ 887.662614] XFS (loop2): Invalid superblock magic number [ 887.663066] blkdev_ioctl+0x540/0x1830 [ 887.672496] ? blkpg_ioctl+0x8d0/0x8d0 [ 887.676368] ? trace_hardirqs_on+0x10/0x10 [ 887.680611] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 887.685707] ? debug_check_no_obj_freed+0x2c0/0x680 [ 887.690722] block_ioctl+0xd9/0x120 [ 887.694341] ? blkdev_fallocate+0x3a0/0x3a0 [ 887.698651] do_vfs_ioctl+0x75a/0xff0 [ 887.702433] ? lock_acquire+0x170/0x3f0 [ 887.706389] ? ioctl_preallocate+0x1a0/0x1a0 [ 887.710791] ? __fget+0x265/0x3e0 [ 887.714226] ? do_vfs_ioctl+0xff0/0xff0 [ 887.718180] ? security_file_ioctl+0x83/0xb0 [ 887.722568] SyS_ioctl+0x7f/0xb0 [ 887.725915] ? do_vfs_ioctl+0xff0/0xff0 [ 887.729868] do_syscall_64+0x1d5/0x640 [ 887.733745] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.738920] RIP: 0033:0x7f2645954fc7 [ 887.742609] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 887.750390] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 887.757673] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 887.765013] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 887.772376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 887.779627] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 31) [ 887.816454] XFS (loop4): Invalid superblock magic number [ 887.860396] FAULT_INJECTION: forcing a failure. [ 887.860396] name failslab, interval 1, probability 0, space 0, times 0 [ 887.875942] CPU: 1 PID: 2943 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 887.883745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 887.893082] Call Trace: [ 887.895653] dump_stack+0x1b2/0x281 [ 887.899270] should_fail.cold+0x10a/0x149 [ 887.903424] should_failslab+0xd6/0x130 [ 887.907391] kmem_cache_alloc_node+0x263/0x410 [ 887.911977] __alloc_skb+0x5c/0x510 [ 887.915667] kobject_uevent_env+0x882/0xf30 [ 887.919978] lo_ioctl+0x11a6/0x1cd0 [ 887.923590] ? loop_set_status64+0xe0/0xe0 [ 887.927824] blkdev_ioctl+0x540/0x1830 [ 887.931777] ? blkpg_ioctl+0x8d0/0x8d0 [ 887.935647] ? trace_hardirqs_on+0x10/0x10 [ 887.939880] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 887.944984] ? debug_check_no_obj_freed+0x2c0/0x680 [ 887.949994] block_ioctl+0xd9/0x120 [ 887.953685] ? blkdev_fallocate+0x3a0/0x3a0 [ 887.957985] do_vfs_ioctl+0x75a/0xff0 [ 887.961764] ? lock_acquire+0x170/0x3f0 [ 887.965813] ? ioctl_preallocate+0x1a0/0x1a0 [ 887.970208] ? __fget+0x265/0x3e0 [ 887.973639] ? do_vfs_ioctl+0xff0/0xff0 [ 887.977597] ? security_file_ioctl+0x83/0xb0 [ 887.981986] SyS_ioctl+0x7f/0xb0 [ 887.985328] ? do_vfs_ioctl+0xff0/0xff0 [ 887.989464] do_syscall_64+0x1d5/0x640 [ 887.993334] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 887.998500] RIP: 0033:0x7f91fb945fc7 [ 888.002202] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:39:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 33) 22:39:24 executing program 5: socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000001c0)=0x1, 0x4) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000200)=0x9, &(0x7f0000000240)=0x4) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000100)=0x100, 0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fddbdf25030000000900010073797a32000010000900010073797a32000000000900030073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x80c4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:24 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)) 22:39:24 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) 22:39:24 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x80000001, &(0x7f00000000c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3, 0x4) [ 888.009886] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 888.017139] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 888.024387] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 888.031634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 888.038932] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 888.085939] FAULT_INJECTION: forcing a failure. [ 888.085939] name failslab, interval 1, probability 0, space 0, times 0 [ 888.098186] CPU: 1 PID: 2956 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 888.105983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 888.115339] Call Trace: [ 888.117929] dump_stack+0x1b2/0x281 [ 888.121557] should_fail.cold+0x10a/0x149 [ 888.125704] should_failslab+0xd6/0x130 [ 888.129677] kmem_cache_alloc_node+0x263/0x410 [ 888.134260] __alloc_skb+0x5c/0x510 [ 888.137890] kobject_uevent_env+0x882/0xf30 [ 888.142217] lo_ioctl+0x11a6/0x1cd0 [ 888.145846] ? loop_set_status64+0xe0/0xe0 [ 888.150083] blkdev_ioctl+0x540/0x1830 [ 888.153969] ? blkpg_ioctl+0x8d0/0x8d0 [ 888.157857] ? trace_hardirqs_on+0x10/0x10 [ 888.162097] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 888.167196] ? debug_check_no_obj_freed+0x2c0/0x680 [ 888.172212] block_ioctl+0xd9/0x120 [ 888.175838] ? blkdev_fallocate+0x3a0/0x3a0 [ 888.180154] do_vfs_ioctl+0x75a/0xff0 [ 888.183958] ? lock_acquire+0x170/0x3f0 [ 888.187983] ? ioctl_preallocate+0x1a0/0x1a0 [ 888.192384] ? __fget+0x265/0x3e0 [ 888.195818] ? do_vfs_ioctl+0xff0/0xff0 [ 888.199777] ? security_file_ioctl+0x83/0xb0 [ 888.204174] SyS_ioctl+0x7f/0xb0 [ 888.207544] ? do_vfs_ioctl+0xff0/0xff0 [ 888.211501] do_syscall_64+0x1d5/0x640 [ 888.215370] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 888.220537] RIP: 0033:0x7f2645954fc7 [ 888.222160] XFS (loop2): Invalid superblock magic number 22:39:24 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x80000001, &(0x7f00000000c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x80000001, &(0x7f00000000c0)=0x4) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3, 0x4) (async) 22:39:24 executing program 5: socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000001c0)=0x1, 0x4) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000200)=0x9, &(0x7f0000000240)=0x4) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000100)=0x100, 0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fddbdf25030000000900010073797a32000010000900010073797a32000000000900030073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x80c4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000001c0)=0x1, 0x4) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000200)=0x9, &(0x7f0000000240)=0x4) (async) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000100)=0x100, 0x4) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) (async) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fddbdf25030000000900010073797a32000010000900010073797a32000000000900030073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x80c4) (async) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) 22:39:24 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) 22:39:24 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)) [ 888.224229] RSP: 002b:00007f26442c9f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 888.224240] RAX: ffffffffffffffda RBX: 00007f264599ea20 RCX: 00007f2645954fc7 [ 888.224246] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 888.224251] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 888.224259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 888.266422] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 32) 22:39:24 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)) 22:39:24 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) [ 888.386537] FAULT_INJECTION: forcing a failure. [ 888.386537] name failslab, interval 1, probability 0, space 0, times 0 [ 888.404417] CPU: 1 PID: 2990 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 888.412234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 888.421861] Call Trace: [ 888.424433] dump_stack+0x1b2/0x281 [ 888.428484] should_fail.cold+0x10a/0x149 [ 888.432624] should_failslab+0xd6/0x130 [ 888.436599] kmem_cache_alloc_node_trace+0x25a/0x400 [ 888.441690] __kmalloc_node_track_caller+0x38/0x70 [ 888.446638] __alloc_skb+0x96/0x510 [ 888.450259] kobject_uevent_env+0x882/0xf30 [ 888.454575] lo_ioctl+0x11a6/0x1cd0 [ 888.458190] ? loop_set_status64+0xe0/0xe0 [ 888.462414] blkdev_ioctl+0x540/0x1830 [ 888.466302] ? blkpg_ioctl+0x8d0/0x8d0 [ 888.470167] ? trace_hardirqs_on+0x10/0x10 [ 888.474406] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 888.479585] ? debug_check_no_obj_freed+0x2c0/0x680 [ 888.484668] block_ioctl+0xd9/0x120 [ 888.488302] ? blkdev_fallocate+0x3a0/0x3a0 [ 888.492616] do_vfs_ioctl+0x75a/0xff0 [ 888.496396] ? lock_acquire+0x170/0x3f0 [ 888.500348] ? ioctl_preallocate+0x1a0/0x1a0 [ 888.504828] ? __fget+0x265/0x3e0 [ 888.508264] ? do_vfs_ioctl+0xff0/0xff0 [ 888.512224] ? security_file_ioctl+0x83/0xb0 [ 888.516614] SyS_ioctl+0x7f/0xb0 [ 888.519958] ? do_vfs_ioctl+0xff0/0xff0 [ 888.523924] do_syscall_64+0x1d5/0x640 [ 888.527802] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 888.532976] RIP: 0033:0x7f91fb945fc7 [ 888.536662] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 888.544362] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 888.551625] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 888.558872] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 888.566116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 888.573363] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 [ 888.585519] XFS (loop4): Invalid superblock magic number 22:39:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 34) 22:39:24 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x80000001, &(0x7f00000000c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3, 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x80000001, &(0x7f00000000c0)=0x4) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x3, 0x4) (async) 22:39:24 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)) 22:39:24 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) 22:39:24 executing program 5: socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000001c0)=0x1, 0x4) r2 = socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000200)=0x9, &(0x7f0000000240)=0x4) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000100)=0x100, 0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fddbdf25030000000900010073797a32000010000900010073797a32000000000900030073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x80c4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) socket$l2tp(0x2, 0x2, 0x73) (async) socket$l2tp(0x2, 0x2, 0x73) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000001c0)=0x1, 0x4) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000280)=""/128, &(0x7f0000000300)=0x80) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000200)=0x9, &(0x7f0000000240)=0x4) (async) setsockopt$CAN_RAW_ERR_FILTER(0xffffffffffffffff, 0x65, 0x2, &(0x7f0000000100)=0x100, 0x4) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) (async) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fddbdf25030000000900010073797a32000010000900010073797a32000000000900030073797a3100000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x80c4) (async) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) 22:39:24 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) 22:39:24 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@canfd={{0x1, 0x1, 0x0, 0x1}, 0x22, 0x2, 0x0, 0x0, "e25e57a6f5e3d9dd843709b462709cd7a39c48dc8807e4a2370f2235968ae06b74dc074a3c8f4d195ad29d0cbc2e9142a6461e4f294296633ddd98795ae84df7"}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) 22:39:24 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)) [ 888.691394] XFS (loop2): Invalid superblock magic number 22:39:24 executing program 1: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) 22:39:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 33) 22:39:24 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000080)={"dac784594671160ed9d3fa82b8dbf10aa7cbb415010fdca2c9867352b086", 0xffff, 0x8, 0xcb2, [0x4, 0x0, 0x4, 0xb59a, 0x6, 0x4, 0x5, 0x37a, 0x88, 0x101, 0xea, 0x1, 0xebc6, 0x45ee, 0x5, 0x3, 0x0, 0x8]}) [ 888.731740] FAULT_INJECTION: forcing a failure. [ 888.731740] name failslab, interval 1, probability 0, space 0, times 0 [ 888.763914] CPU: 1 PID: 3050 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 888.771755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 22:39:24 executing program 1: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) [ 888.781103] Call Trace: [ 888.783692] dump_stack+0x1b2/0x281 [ 888.787325] should_fail.cold+0x10a/0x149 [ 888.791476] should_failslab+0xd6/0x130 [ 888.795452] kmem_cache_alloc+0x28e/0x3c0 [ 888.799601] getname_flags+0xc8/0x550 [ 888.803402] SyS_mkdirat+0x83/0x270 [ 888.807026] ? SyS_mknod+0x30/0x30 [ 888.810568] ? fput_many+0xe/0x140 [ 888.814102] ? do_syscall_64+0x4c/0x640 [ 888.818086] ? SyS_mknod+0x30/0x30 [ 888.821622] do_syscall_64+0x1d5/0x640 [ 888.825513] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 888.830708] RIP: 0033:0x7f2645954317 [ 888.834409] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 888.842110] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 888.849371] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 888.856639] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 888.863914] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 888.871180] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 888.919528] FAULT_INJECTION: forcing a failure. [ 888.919528] name failslab, interval 1, probability 0, space 0, times 0 [ 888.931856] CPU: 1 PID: 3076 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 888.939646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 888.949096] Call Trace: [ 888.951675] dump_stack+0x1b2/0x281 [ 888.955294] should_fail.cold+0x10a/0x149 [ 888.959434] should_failslab+0xd6/0x130 [ 888.963397] kmem_cache_alloc_node_trace+0x25a/0x400 [ 888.968495] __kmalloc_node_track_caller+0x38/0x70 [ 888.973423] __alloc_skb+0x96/0x510 [ 888.977037] kobject_uevent_env+0x882/0xf30 [ 888.981352] lo_ioctl+0x11a6/0x1cd0 [ 888.984960] ? loop_set_status64+0xe0/0xe0 [ 888.989192] blkdev_ioctl+0x540/0x1830 [ 888.993087] ? blkpg_ioctl+0x8d0/0x8d0 [ 888.997481] ? trace_hardirqs_on+0x10/0x10 [ 889.001709] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 889.006809] ? debug_check_no_obj_freed+0x2c0/0x680 [ 889.011821] block_ioctl+0xd9/0x120 [ 889.015434] ? blkdev_fallocate+0x3a0/0x3a0 [ 889.019748] do_vfs_ioctl+0x75a/0xff0 [ 889.023541] ? lock_acquire+0x170/0x3f0 [ 889.027504] ? ioctl_preallocate+0x1a0/0x1a0 [ 889.031900] ? __fget+0x265/0x3e0 [ 889.035340] ? do_vfs_ioctl+0xff0/0xff0 [ 889.039299] ? security_file_ioctl+0x83/0xb0 [ 889.043690] SyS_ioctl+0x7f/0xb0 [ 889.047066] ? do_vfs_ioctl+0xff0/0xff0 [ 889.051032] do_syscall_64+0x1d5/0x640 [ 889.054902] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.060072] RIP: 0033:0x7f91fb945fc7 22:39:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 35) 22:39:25 executing program 1: getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) 22:39:25 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@canfd={{0x1, 0x1, 0x0, 0x1}, 0x22, 0x2, 0x0, 0x0, "e25e57a6f5e3d9dd843709b462709cd7a39c48dc8807e4a2370f2235968ae06b74dc074a3c8f4d195ad29d0cbc2e9142a6461e4f294296633ddd98795ae84df7"}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@canfd={{0x1, 0x1, 0x0, 0x1}, 0x22, 0x2, 0x0, 0x0, "e25e57a6f5e3d9dd843709b462709cd7a39c48dc8807e4a2370f2235968ae06b74dc074a3c8f4d195ad29d0cbc2e9142a6461e4f294296633ddd98795ae84df7"}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) (async) 22:39:25 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)) 22:39:25 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000080)={"dac784594671160ed9d3fa82b8dbf10aa7cbb415010fdca2c9867352b086", 0xffff, 0x8, 0xcb2, [0x4, 0x0, 0x4, 0xb59a, 0x6, 0x4, 0x5, 0x37a, 0x88, 0x101, 0xea, 0x1, 0xebc6, 0x45ee, 0x5, 0x3, 0x0, 0x8]}) [ 889.063767] RSP: 002b:00007f91fa2baf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 889.071459] RAX: ffffffffffffffda RBX: 00007f91fb98fa20 RCX: 00007f91fb945fc7 [ 889.078709] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 889.085961] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 889.093212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 889.100468] R13: 0000000000000004 R14: 00000000200037c0 R15: 0000000000000000 22:39:25 executing program 1: socket$l2tp(0x2, 0x2, 0x73) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) 22:39:25 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@canfd={{0x1, 0x1, 0x0, 0x1}, 0x22, 0x2, 0x0, 0x0, "e25e57a6f5e3d9dd843709b462709cd7a39c48dc8807e4a2370f2235968ae06b74dc074a3c8f4d195ad29d0cbc2e9142a6461e4f294296633ddd98795ae84df7"}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) [ 889.171157] FAULT_INJECTION: forcing a failure. [ 889.171157] name failslab, interval 1, probability 0, space 0, times 0 [ 889.187498] CPU: 1 PID: 3092 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 889.195327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 889.204948] Call Trace: [ 889.207551] dump_stack+0x1b2/0x281 [ 889.211188] should_fail.cold+0x10a/0x149 [ 889.215342] should_failslab+0xd6/0x130 22:39:25 executing program 1: socket$l2tp(0x2, 0x2, 0x73) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) [ 889.219316] kmem_cache_alloc+0x28e/0x3c0 [ 889.223466] __d_alloc+0x2a/0xa20 [ 889.226930] ? d_lookup+0x172/0x220 [ 889.230914] d_alloc+0x46/0x240 [ 889.234197] __lookup_hash+0x101/0x270 [ 889.238170] filename_create+0x156/0x3f0 [ 889.242237] ? kern_path_mountpoint+0x40/0x40 [ 889.246911] SyS_mkdirat+0x95/0x270 [ 889.250553] ? SyS_mknod+0x30/0x30 [ 889.254089] ? fput_many+0xe/0x140 [ 889.257715] ? do_syscall_64+0x4c/0x640 [ 889.261695] ? SyS_mknod+0x30/0x30 [ 889.265258] do_syscall_64+0x1d5/0x640 22:39:25 executing program 3: getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) keyctl$chown(0x4, 0x0, 0xee01, r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 889.269148] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.274330] RIP: 0033:0x7f2645954317 [ 889.278033] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 889.285739] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 889.293004] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 889.300271] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 889.307624] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 889.314889] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 34) 22:39:25 executing program 1: socket$l2tp(0x2, 0x2, 0x73) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) 22:39:25 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000000080)={"dac784594671160ed9d3fa82b8dbf10aa7cbb415010fdca2c9867352b086", 0xffff, 0x8, 0xcb2, [0x4, 0x0, 0x4, 0xb59a, 0x6, 0x4, 0x5, 0x37a, 0x88, 0x101, 0xea, 0x1, 0xebc6, 0x45ee, 0x5, 0x3, 0x0, 0x8]}) 22:39:25 executing program 3: getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) keyctl$chown(0x4, 0x0, 0xee01, r0) (async) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:25 executing program 0: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)) 22:39:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 36) [ 889.350159] XFS (loop2): Invalid superblock magic number 22:39:25 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 22:39:25 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, &(0x7f0000001080)) [ 889.451447] FAULT_INJECTION: forcing a failure. [ 889.451447] name failslab, interval 1, probability 0, space 0, times 0 [ 889.465597] FAULT_INJECTION: forcing a failure. [ 889.465597] name failslab, interval 1, probability 0, space 0, times 0 [ 889.480456] CPU: 1 PID: 3133 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 889.488259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 889.497609] Call Trace: [ 889.500201] dump_stack+0x1b2/0x281 [ 889.503842] should_fail.cold+0x10a/0x149 [ 889.507991] should_failslab+0xd6/0x130 [ 889.511970] kmem_cache_alloc+0x28e/0x3c0 [ 889.516118] ? ext4_sync_fs+0x7e0/0x7e0 [ 889.520097] ext4_alloc_inode+0x1a/0x640 [ 889.524159] ? ext4_sync_fs+0x7e0/0x7e0 [ 889.528127] alloc_inode+0x5d/0x170 [ 889.531751] new_inode+0x1d/0xf0 [ 889.535119] __ext4_new_inode+0x360/0x4eb0 [ 889.539352] ? kmem_cache_free+0x7c/0x2b0 [ 889.543526] ? putname+0xcd/0x110 [ 889.546980] ? SyS_mkdirat+0x95/0x270 [ 889.550784] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.556242] ? ext4_free_inode+0x1460/0x1460 [ 889.560655] ? lock_downgrade+0x740/0x740 [ 889.564807] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 889.569906] ? dquot_initialize_needed+0x240/0x240 [ 889.574842] ext4_mkdir+0x2e4/0xbd0 [ 889.578478] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 889.583149] ? security_inode_mkdir+0xca/0x100 [ 889.587732] vfs_mkdir+0x463/0x6e0 [ 889.591271] SyS_mkdirat+0x1fd/0x270 [ 889.594983] ? SyS_mknod+0x30/0x30 [ 889.598520] ? fput_many+0xe/0x140 22:39:25 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) [ 889.602054] ? do_syscall_64+0x4c/0x640 [ 889.606026] ? SyS_mknod+0x30/0x30 [ 889.609579] do_syscall_64+0x1d5/0x640 [ 889.613469] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.618658] RIP: 0033:0x7f2645954317 [ 889.622367] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 889.630072] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 889.637427] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 889.644696] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 889.651966] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 889.659231] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 889.666512] CPU: 0 PID: 3135 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 889.674316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 889.683676] Call Trace: [ 889.686266] dump_stack+0x1b2/0x281 [ 889.689986] should_fail.cold+0x10a/0x149 [ 889.694293] should_failslab+0xd6/0x130 [ 889.698359] kmem_cache_alloc+0x28e/0x3c0 [ 889.702507] getname_flags+0xc8/0x550 [ 889.706313] SyS_mkdirat+0x83/0x270 [ 889.709941] ? SyS_mknod+0x30/0x30 [ 889.713481] ? fput_many+0xe/0x140 [ 889.717028] ? do_syscall_64+0x4c/0x640 [ 889.721002] ? SyS_mknod+0x30/0x30 [ 889.724552] do_syscall_64+0x1d5/0x640 [ 889.728444] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 889.733636] RIP: 0033:0x7f91fb945317 [ 889.737342] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 889.745086] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 22:39:25 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) 22:39:25 executing program 3: getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) keyctl$chown(0x4, 0x0, 0xee01, r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:25 executing program 5: mq_open(&(0x7f0000000000)='&\x00', 0x40, 0x120, &(0x7f0000000080)={0x2, 0x2, 0x6, 0xe31}) socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000000c0), 0x80) socket$inet_udplite(0x2, 0x2, 0x88) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000100)=0xfffffffffffffea9) [ 889.752349] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 889.759618] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 889.766882] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 889.774152] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 35) 22:39:25 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000001400)={&(0x7f0000001200)=@x25={0x9, @remote}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001280)=""/203, 0xcb}], 0x1, &(0x7f00000013c0)=""/10, 0xa}, 0x40000300) r2 = accept4$netrom(r0, &(0x7f0000001180)={{0x3, @netrom}, [@rose, @default, @default, @rose, @netrom, @bcast, @rose, @netrom]}, &(0x7f00000000c0)=0x48, 0x80000) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) recvfrom$netrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x0, &(0x7f0000001100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 22:39:25 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 22:39:25 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@null, @rose, @bcast, @netrom, @bcast, @default, @remote, @rose]}, &(0x7f0000000140)=0x48, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000080)) 22:39:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 37) 22:39:25 executing program 5: mq_open(&(0x7f0000000000)='&\x00', 0x40, 0x120, &(0x7f0000000080)={0x2, 0x2, 0x6, 0xe31}) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000000c0), 0x80) socket$inet_udplite(0x2, 0x2, 0x88) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 32) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000100)=0xfffffffffffffea9) (rerun: 32) 22:39:25 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) 22:39:25 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) [ 889.916066] FAULT_INJECTION: forcing a failure. [ 889.916066] name failslab, interval 1, probability 0, space 0, times 0 [ 889.928956] FAULT_INJECTION: forcing a failure. [ 889.928956] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 889.940932] CPU: 1 PID: 3179 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 889.948812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 889.958165] Call Trace: [ 889.960764] dump_stack+0x1b2/0x281 22:39:26 executing program 5: mq_open(&(0x7f0000000000)='&\x00', 0x40, 0x120, &(0x7f0000000080)={0x2, 0x2, 0x6, 0xe31}) (async) socket$l2tp(0x2, 0x2, 0x73) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async, rerun: 64) socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000100)=0xfffffffffffffea9) [ 889.964399] should_fail.cold+0x10a/0x149 [ 889.968542] __alloc_pages_nodemask+0x22c/0x2720 [ 889.973296] ? kobject_uevent_env+0x274/0xf30 [ 889.977798] ? __lock_acquire+0x5fc/0x3f20 [ 889.982032] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 889.986872] ? blkdev_ioctl+0xf4/0x1830 [ 889.990837] ? blkpg_ioctl+0x8d0/0x8d0 [ 889.994717] ? trace_hardirqs_on+0x10/0x10 [ 889.998952] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 890.004055] cache_grow_begin+0x91/0x700 [ 890.008199] ? fs_reclaim_release+0xd0/0x110 22:39:26 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0, 0x8, 'syz1\x00', @default, 0xebb7, 0x1, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) [ 890.012602] ? check_preemption_disabled+0x35/0x240 [ 890.017618] cache_alloc_refill+0x273/0x350 [ 890.021942] kmem_cache_alloc+0x333/0x3c0 [ 890.026088] getname_flags+0xc8/0x550 [ 890.029889] SyS_mkdirat+0x83/0x270 [ 890.033515] ? SyS_mknod+0x30/0x30 [ 890.037051] ? fput_many+0xe/0x140 [ 890.040584] ? do_syscall_64+0x4c/0x640 [ 890.044546] ? SyS_mknod+0x30/0x30 [ 890.048079] do_syscall_64+0x1d5/0x640 [ 890.051972] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 890.057154] RIP: 0033:0x7f2645954317 [ 890.060860] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 890.068563] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 890.075827] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 890.083091] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 890.090356] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 890.097631] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 890.105185] CPU: 0 PID: 3180 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 890.112987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 890.122339] Call Trace: [ 890.124929] dump_stack+0x1b2/0x281 [ 890.128561] should_fail.cold+0x10a/0x149 [ 890.132713] should_failslab+0xd6/0x130 [ 890.136697] kmem_cache_alloc+0x28e/0x3c0 [ 890.140843] getname_flags+0xc8/0x550 [ 890.145087] SyS_mkdirat+0x83/0x270 [ 890.148713] ? SyS_mknod+0x30/0x30 [ 890.152252] ? fput_many+0xe/0x140 [ 890.155789] ? do_syscall_64+0x4c/0x640 [ 890.159756] ? SyS_mknod+0x30/0x30 [ 890.163391] do_syscall_64+0x1d5/0x640 [ 890.167287] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 890.172471] RIP: 0033:0x7f91fb945317 [ 890.176274] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 890.183976] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 890.191241] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 890.198601] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 890.205871] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 22:39:26 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) 22:39:26 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) [ 890.213137] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 36) [ 890.295369] XFS (loop4): Invalid superblock magic number [ 890.320896] FAULT_INJECTION: forcing a failure. [ 890.320896] name failslab, interval 1, probability 0, space 0, times 0 [ 890.336001] CPU: 1 PID: 3226 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 890.343817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 890.353256] Call Trace: [ 890.355844] dump_stack+0x1b2/0x281 [ 890.359478] should_fail.cold+0x10a/0x149 [ 890.363633] should_failslab+0xd6/0x130 [ 890.367614] kmem_cache_alloc+0x28e/0x3c0 [ 890.371764] getname_flags+0xc8/0x550 [ 890.375570] SyS_mkdirat+0x83/0x270 [ 890.379237] ? SyS_mknod+0x30/0x30 [ 890.382768] ? fput_many+0xe/0x140 [ 890.386572] ? do_syscall_64+0x4c/0x640 [ 890.390558] ? SyS_mknod+0x30/0x30 [ 890.394077] do_syscall_64+0x1d5/0x640 [ 890.397959] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 890.403128] RIP: 0033:0x7f91fb945317 [ 890.406849] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 890.414541] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 890.421789] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 890.429037] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 890.436285] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 890.443531] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:26 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000001400)={&(0x7f0000001200)=@x25={0x9, @remote}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001280)=""/203, 0xcb}], 0x1, &(0x7f00000013c0)=""/10, 0xa}, 0x40000300) r2 = accept4$netrom(r0, &(0x7f0000001180)={{0x3, @netrom}, [@rose, @default, @default, @rose, @netrom, @bcast, @rose, @netrom]}, &(0x7f00000000c0)=0x48, 0x80000) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x3, 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) recvfrom$netrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x0, &(0x7f0000001100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) recvmsg$can_raw(r1, &(0x7f0000001400)={&(0x7f0000001200)=@x25={0x9, @remote}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001280)=""/203, 0xcb}], 0x1, &(0x7f00000013c0)=""/10, 0xa}, 0x40000300) (async) accept4$netrom(r0, &(0x7f0000001180)={{0x3, @netrom}, [@rose, @default, @default, @rose, @netrom, @bcast, @rose, @netrom]}, &(0x7f00000000c0)=0x48, 0x80000) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x3, 0x4) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) recvfrom$netrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x0, &(0x7f0000001100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) (async) 22:39:26 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) 22:39:26 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0, 0x8, 'syz1\x00', @default, 0xebb7, 0x1, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) 22:39:26 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) 22:39:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 38) 22:39:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 37) 22:39:26 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pipe(&(0x7f0000000200)) r3 = mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) mq_timedsend(r3, &(0x7f0000000300)="f1e6659d4610c1f235023f88d2c7cb2ee583f8fcc95399b7bc5cf9ab3ae972019d5de631ee2ee095e7fe2e081dcb0f4528e1eb0d9b2ceb3fabe893db812d8b9ac3c314bc1afdb5569b3f5815a2eb4c12c68bfeeda2ed01b1f12e822411d9718159820709010fb78365a70ce69d919c6d01929e039351826a820600e810f6c56b9f286ee3b2ee7a8a08a6e3c5110a9a261a7e3c946f80bc6f9888563382b7aed35cdfa9", 0xa3, 0x532a, &(0x7f00000002c0)={r1, r2+10000000}) 22:39:26 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0, 0x8, 'syz1\x00', @default, 0xebb7, 0x1, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) [ 890.785014] FAULT_INJECTION: forcing a failure. [ 890.785014] name failslab, interval 1, probability 0, space 0, times 0 [ 890.801704] FAULT_INJECTION: forcing a failure. [ 890.801704] name failslab, interval 1, probability 0, space 0, times 0 [ 890.811897] CPU: 1 PID: 3244 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 890.820942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 890.830407] Call Trace: [ 890.833275] dump_stack+0x1b2/0x281 [ 890.836909] should_fail.cold+0x10a/0x149 [ 890.841062] should_failslab+0xd6/0x130 [ 890.845047] kmem_cache_alloc+0x28e/0x3c0 [ 890.849198] getname_flags+0xc8/0x550 [ 890.853006] SyS_mkdirat+0x83/0x270 [ 890.856728] ? SyS_mknod+0x30/0x30 [ 890.860263] ? fput_many+0xe/0x140 [ 890.863803] ? do_syscall_64+0x4c/0x640 [ 890.867774] ? SyS_mknod+0x30/0x30 [ 890.871309] do_syscall_64+0x1d5/0x640 [ 890.875195] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 890.880371] RIP: 0033:0x7f91fb945317 22:39:26 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x7, 0x8000, 0xffffffff, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x14, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0xb, 0x3, [{0x5, 0x5, "4d50a6"}]}, @generic={0x94, 0x12, "13ce33256e67f4d94e4bd72c07b0afaf"}, @lsrr={0x83, 0x1b, 0x2a, [@loopback, @local, @broadcast, @local, @remote, @dev={0xac, 0x14, 0x14, 0x3c}]}, @generic={0x82, 0x4, "2311"}, @end]}}}}}) [ 890.884075] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 890.891778] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 890.899051] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 890.906322] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 890.913587] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 890.920853] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 890.934640] CPU: 0 PID: 3246 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 890.942453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 890.951800] Call Trace: [ 890.954387] dump_stack+0x1b2/0x281 [ 890.958020] should_fail.cold+0x10a/0x149 [ 890.962167] should_failslab+0xd6/0x130 [ 890.966146] __kmalloc+0x2c1/0x400 [ 890.969690] ? ext4_find_extent+0x879/0xbc0 [ 890.974007] ext4_find_extent+0x879/0xbc0 [ 890.978154] ? rcu_lockdep_current_cpu_online+0xed/0x140 22:39:27 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)) pipe(&(0x7f0000000200)) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:27 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)) pipe(&(0x7f0000000200)) 22:39:27 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)) [ 890.983604] ext4_ext_map_blocks+0x19a/0x6b10 [ 890.988097] ? __lock_acquire+0x5fc/0x3f20 [ 890.992343] ? __lock_acquire+0x5fc/0x3f20 [ 890.996578] ? mark_buffer_dirty+0x95/0x480 [ 891.000893] ? trace_hardirqs_on+0x10/0x10 [ 891.005122] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 891.010485] ? ext4_find_delalloc_cluster+0x180/0x180 [ 891.015668] ? trace_hardirqs_on+0x10/0x10 [ 891.019907] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 891.024753] ? ext4_es_lookup_extent+0x321/0xac0 [ 891.029512] ? lock_acquire+0x170/0x3f0 [ 891.033493] ? lock_acquire+0x170/0x3f0 [ 891.037462] ? ext4_map_blocks+0x29f/0x1730 [ 891.041786] ext4_map_blocks+0xb19/0x1730 [ 891.045934] ? ext4_issue_zeroout+0x150/0x150 [ 891.050423] ? __ext4_new_inode+0x27c/0x4eb0 [ 891.054838] ext4_getblk+0x98/0x3f0 [ 891.058463] ? ext4_iomap_begin+0x7f0/0x7f0 [ 891.062783] ext4_bread+0x6c/0x1a0 [ 891.066312] ? ext4_getblk+0x3f0/0x3f0 [ 891.070176] ? dquot_initialize_needed+0x240/0x240 [ 891.075087] ext4_append+0x143/0x350 [ 891.078785] ext4_mkdir+0x4c9/0xbd0 [ 891.082397] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 891.087051] ? security_inode_mkdir+0xca/0x100 [ 891.091621] vfs_mkdir+0x463/0x6e0 [ 891.095144] SyS_mkdirat+0x1fd/0x270 [ 891.098840] ? SyS_mknod+0x30/0x30 [ 891.102485] ? fput_many+0xe/0x140 [ 891.106092] ? do_syscall_64+0x4c/0x640 [ 891.110066] ? SyS_mknod+0x30/0x30 [ 891.113587] do_syscall_64+0x1d5/0x640 [ 891.117456] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.122626] RIP: 0033:0x7f2645954317 [ 891.126313] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 22:39:27 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) recvmsg$can_raw(r1, &(0x7f0000001400)={&(0x7f0000001200)=@x25={0x9, @remote}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001280)=""/203, 0xcb}], 0x1, &(0x7f00000013c0)=""/10, 0xa}, 0x40000300) r2 = accept4$netrom(r0, &(0x7f0000001180)={{0x3, @netrom}, [@rose, @default, @default, @rose, @netrom, @bcast, @rose, @netrom]}, &(0x7f00000000c0)=0x48, 0x80000) (async) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x3, 0x4) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) recvfrom$netrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x0, &(0x7f0000001100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 22:39:27 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) 22:39:27 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)) pipe(&(0x7f0000000200)) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:27 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x7, 0x8000, 0xffffffff, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x14, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0xb, 0x3, [{0x5, 0x5, "4d50a6"}]}, @generic={0x94, 0x12, "13ce33256e67f4d94e4bd72c07b0afaf"}, @lsrr={0x83, 0x1b, 0x2a, [@loopback, @local, @broadcast, @local, @remote, @dev={0xac, 0x14, 0x14, 0x3c}]}, @generic={0x82, 0x4, "2311"}, @end]}}}}}) [ 891.134012] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 891.141263] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 891.148535] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 891.155928] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 891.163179] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 39) 22:39:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 38) 22:39:27 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) clock_gettime(0x0, &(0x7f0000000140)) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:27 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x7, 0x8000, 0xffffffff, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x14, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0xb, 0x3, [{0x5, 0x5, "4d50a6"}]}, @generic={0x94, 0x12, "13ce33256e67f4d94e4bd72c07b0afaf"}, @lsrr={0x83, 0x1b, 0x2a, [@loopback, @local, @broadcast, @local, @remote, @dev={0xac, 0x14, 0x14, 0x3c}]}, @generic={0x82, 0x4, "2311"}, @end]}}}}}) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000080)={'gretap0\x00', 0x0, 0x7, 0x8000, 0xffffffff, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x14, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@ra={0x94, 0x4, 0x1}, @noop, @cipso={0x86, 0xb, 0x3, [{0x5, 0x5, "4d50a6"}]}, @generic={0x94, 0x12, "13ce33256e67f4d94e4bd72c07b0afaf"}, @lsrr={0x83, 0x1b, 0x2a, [@loopback, @local, @broadcast, @local, @remote, @dev={0xac, 0x14, 0x14, 0x3c}]}, @generic={0x82, 0x4, "2311"}, @end]}}}}}) (async) 22:39:27 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) [ 891.260090] XFS (loop4): Invalid superblock magic number [ 891.343385] FAULT_INJECTION: forcing a failure. [ 891.343385] name failslab, interval 1, probability 0, space 0, times 0 [ 891.369833] CPU: 0 PID: 3324 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 891.377660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 891.385914] FAULT_INJECTION: forcing a failure. [ 891.385914] name failslab, interval 1, probability 0, space 0, times 0 [ 891.387012] Call Trace: [ 891.387060] dump_stack+0x1b2/0x281 [ 891.387074] should_fail.cold+0x10a/0x149 [ 891.387087] should_failslab+0xd6/0x130 [ 891.387098] __kmalloc+0x2c1/0x400 [ 891.387106] ? ext4_find_extent+0x879/0xbc0 [ 891.387120] ext4_find_extent+0x879/0xbc0 [ 891.424746] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 891.430185] ext4_ext_map_blocks+0x19a/0x6b10 [ 891.434925] ? __lock_acquire+0x5fc/0x3f20 [ 891.439241] ? __lock_acquire+0x5fc/0x3f20 [ 891.443478] ? mark_buffer_dirty+0x95/0x480 [ 891.447782] ? trace_hardirqs_on+0x10/0x10 [ 891.451997] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 891.457351] ? ext4_find_delalloc_cluster+0x180/0x180 [ 891.462543] ? trace_hardirqs_on+0x10/0x10 [ 891.466778] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 891.471622] ? ext4_es_lookup_extent+0x321/0xac0 [ 891.476367] ? lock_acquire+0x170/0x3f0 [ 891.480334] ? lock_acquire+0x170/0x3f0 [ 891.484292] ? ext4_map_blocks+0x29f/0x1730 [ 891.488607] ext4_map_blocks+0xb19/0x1730 [ 891.492744] ? ext4_issue_zeroout+0x150/0x150 [ 891.497224] ? __ext4_new_inode+0x27c/0x4eb0 [ 891.501622] ext4_getblk+0x98/0x3f0 [ 891.505235] ? ext4_iomap_begin+0x7f0/0x7f0 [ 891.509559] ext4_bread+0x6c/0x1a0 [ 891.513090] ? ext4_getblk+0x3f0/0x3f0 [ 891.516962] ? dquot_initialize_needed+0x240/0x240 [ 891.521966] ext4_append+0x143/0x350 [ 891.525664] ext4_mkdir+0x4c9/0xbd0 [ 891.529285] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 891.533943] ? security_inode_mkdir+0xca/0x100 [ 891.538512] vfs_mkdir+0x463/0x6e0 [ 891.542043] SyS_mkdirat+0x1fd/0x270 [ 891.545756] ? SyS_mknod+0x30/0x30 [ 891.549278] ? fput_many+0xe/0x140 [ 891.552818] ? do_syscall_64+0x4c/0x640 [ 891.556782] ? SyS_mknod+0x30/0x30 [ 891.560314] do_syscall_64+0x1d5/0x640 [ 891.564190] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.569375] RIP: 0033:0x7f2645954317 [ 891.573069] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 891.580857] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 891.588109] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 891.595385] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 891.602636] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 891.609902] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 891.617171] CPU: 1 PID: 3331 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 891.624972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 891.634323] Call Trace: [ 891.636910] dump_stack+0x1b2/0x281 [ 891.640542] should_fail.cold+0x10a/0x149 22:39:27 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f00000001c0), 0x4) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:27 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:27 executing program 0: socket$l2tp(0x2, 0x2, 0x73) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) [ 891.644692] should_failslab+0xd6/0x130 [ 891.648663] kmem_cache_alloc+0x28e/0x3c0 [ 891.652897] __d_alloc+0x2a/0xa20 [ 891.656346] ? d_lookup+0x172/0x220 [ 891.659978] d_alloc+0x46/0x240 [ 891.663263] __lookup_hash+0x101/0x270 [ 891.667152] filename_create+0x156/0x3f0 [ 891.671215] ? kern_path_mountpoint+0x40/0x40 [ 891.675712] SyS_mkdirat+0x95/0x270 [ 891.679340] ? SyS_mknod+0x30/0x30 [ 891.682875] ? fput_many+0xe/0x140 [ 891.686408] ? do_syscall_64+0x4c/0x640 [ 891.690380] ? SyS_mknod+0x30/0x30 [ 891.693915] do_syscall_64+0x1d5/0x640 [ 891.697803] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 891.702986] RIP: 0033:0x7f91fb945317 [ 891.706690] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 891.714396] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 891.721663] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 891.728936] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 891.736209] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 891.743565] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 891.772902] XFS (loop4): Invalid superblock magic number 22:39:28 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@bcast, @bcast, @rose, @default, @null, @netrom, @rose, @null]}, &(0x7f00000000c0)=0x48) 22:39:28 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:28 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 39) 22:39:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 40) 22:39:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:28 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:28 executing program 0: mq_open(0x0, 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:28 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@bcast, @bcast, @rose, @default, @null, @netrom, @rose, @null]}, &(0x7f00000000c0)=0x48) [ 892.114666] FAULT_INJECTION: forcing a failure. [ 892.114666] name failslab, interval 1, probability 0, space 0, times 0 22:39:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x16}, 'team0\x00'}}, 0x1e) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa, 0xa9d, 0xfffffffe, 0x3, 0x187, 0xffffffffffffffff, 0x9, '\x00', 0x0, r1, 0x1, 0x3, 0x4}, 0x48) 22:39:28 executing program 0: mq_open(0x0, 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:28 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async, rerun: 64) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@bcast, @bcast, @rose, @default, @null, @netrom, @rose, @null]}, &(0x7f00000000c0)=0x48) (rerun: 64) [ 892.179055] FAULT_INJECTION: forcing a failure. [ 892.179055] name failslab, interval 1, probability 0, space 0, times 0 [ 892.190645] CPU: 1 PID: 3380 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 892.198441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 892.207819] Call Trace: [ 892.210409] dump_stack+0x1b2/0x281 [ 892.214043] should_fail.cold+0x10a/0x149 [ 892.218191] should_failslab+0xd6/0x130 [ 892.222167] kmem_cache_alloc+0x40/0x3c0 22:39:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x16}, 'team0\x00'}}, 0x1e) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa, 0xa9d, 0xfffffffe, 0x3, 0x187, 0xffffffffffffffff, 0x9, '\x00', 0x0, r1, 0x1, 0x3, 0x4}, 0x48) 22:39:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0, 0x0}) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000013c0)=""/55, &(0x7f0000001400)=0x37) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000003c0)={r2, 0x0, "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", "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"}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000300)=0x5, &(0x7f0000000340)=0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000)=0xf3, 0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x9, 0x4) pipe2$watch_queue(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_DECODER_CMD(r5, 0xc0485660, &(0x7f0000001480)={0x0, 0x1, @start={0x8}}) [ 892.226228] __es_insert_extent+0x338/0x1360 [ 892.230632] ? __es_shrink+0x8c0/0x8c0 [ 892.234523] ? lock_acquire+0x170/0x3f0 [ 892.238519] ? ext4_es_insert_extent+0x11f/0x530 [ 892.243289] ext4_es_insert_extent+0x1b9/0x530 [ 892.247871] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 892.253666] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 892.259127] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 892.264924] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 892.269511] ? __lock_acquire+0x5fc/0x3f20 [ 892.273748] ? __lock_acquire+0x5fc/0x3f20 22:39:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x16}, 'team0\x00'}}, 0x1e) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa, 0xa9d, 0xfffffffe, 0x3, 0x187, 0xffffffffffffffff, 0x9, '\x00', 0x0, r1, 0x1, 0x3, 0x4}, 0x48) [ 892.277988] ? mark_buffer_dirty+0x95/0x480 [ 892.282310] ? trace_hardirqs_on+0x10/0x10 [ 892.286546] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 892.291909] ? ext4_find_delalloc_cluster+0x180/0x180 [ 892.297096] ? trace_hardirqs_on+0x10/0x10 [ 892.301324] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 892.306169] ? ext4_es_lookup_extent+0x321/0xac0 [ 892.310919] ? lock_acquire+0x170/0x3f0 [ 892.314888] ? lock_acquire+0x170/0x3f0 [ 892.318861] ? ext4_map_blocks+0x29f/0x1730 [ 892.323185] ext4_map_blocks+0xb19/0x1730 [ 892.327336] ? ext4_issue_zeroout+0x150/0x150 [ 892.331822] ? __ext4_new_inode+0x27c/0x4eb0 [ 892.336235] ext4_getblk+0x98/0x3f0 [ 892.339864] ? ext4_iomap_begin+0x7f0/0x7f0 [ 892.344207] ext4_bread+0x6c/0x1a0 [ 892.347742] ? ext4_getblk+0x3f0/0x3f0 [ 892.351621] ? dquot_initialize_needed+0x240/0x240 [ 892.356550] ext4_append+0x143/0x350 [ 892.360262] ext4_mkdir+0x4c9/0xbd0 [ 892.363989] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 892.368656] ? security_inode_mkdir+0xca/0x100 [ 892.373238] vfs_mkdir+0x463/0x6e0 [ 892.376776] SyS_mkdirat+0x1fd/0x270 [ 892.380488] ? SyS_mknod+0x30/0x30 [ 892.384028] ? fput_many+0xe/0x140 [ 892.387586] ? do_syscall_64+0x4c/0x640 [ 892.391555] ? SyS_mknod+0x30/0x30 [ 892.395096] do_syscall_64+0x1d5/0x640 [ 892.398984] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 892.404184] RIP: 0033:0x7f2645954317 [ 892.409287] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 892.416988] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 892.425037] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 892.432304] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 892.439567] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 892.446822] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 892.454101] CPU: 0 PID: 3372 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 892.461890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 892.471326] Call Trace: [ 892.473907] dump_stack+0x1b2/0x281 [ 892.477537] should_fail.cold+0x10a/0x149 [ 892.481673] should_failslab+0xd6/0x130 [ 892.485631] kmem_cache_alloc+0x28e/0x3c0 [ 892.489766] __d_alloc+0x2a/0xa20 [ 892.493199] ? d_lookup+0x172/0x220 [ 892.496813] d_alloc+0x46/0x240 [ 892.500082] __lookup_hash+0x101/0x270 [ 892.503954] filename_create+0x156/0x3f0 [ 892.508012] ? kern_path_mountpoint+0x40/0x40 [ 892.512490] SyS_mkdirat+0x95/0x270 [ 892.516095] ? SyS_mknod+0x30/0x30 [ 892.519619] ? fput_many+0xe/0x140 [ 892.523151] ? do_syscall_64+0x4c/0x640 [ 892.527101] ? SyS_mknod+0x30/0x30 [ 892.530621] do_syscall_64+0x1d5/0x640 [ 892.534488] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 892.539655] RIP: 0033:0x7f91fb945317 [ 892.543340] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 892.550286] XFS (loop4): Invalid superblock magic number [ 892.551051] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 892.551058] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 892.551063] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 22:39:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 40) [ 892.551071] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 892.585593] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async, rerun: 64) r1 = socket$can_raw(0x1d, 0x3, 0x1) (rerun: 64) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0, 0x0}) (async) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async, rerun: 32) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000013c0)=""/55, &(0x7f0000001400)=0x37) (rerun: 32) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000003c0)={r2, 0x0, "da70da181ac01acca45de7d0322dff6508e0f722642aa4dfd118eca4e1eef9e9808b45043850a19bea262108251b53aaa32e01858a9cdf901b7bcc854f234b0ea47b8ceeb423392480491084c778ea5eb2853eadab5ce469d254aa2d3bdf8f05b3dded612110877b2f3a1cf1c026601086d1b8eff0243c00b25209751f7647921d44348601b8277422d593e230047e226eaa4401ae56f74269d917b5cb63f9ac03f9eb70b708eb2a80f6b049643dc0b0e5cf8b6aa9350d11fd64cbf24f60a6b5804acfd2fd93b818ca9babdd52955551148d2d011f5ff5b3ec3e41142a206ded864487614131e704ca819934ebb48a610deabae7618bbffd7378cb034ebb6749", "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"}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000300)=0x5, &(0x7f0000000340)=0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000)=0xf3, 0x4) (async, rerun: 64) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x9, 0x4) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_DECODER_CMD(r5, 0xc0485660, &(0x7f0000001480)={0x0, 0x1, @start={0x8}}) 22:39:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000100)={0x0, 0x0, "88912cf2811ef080f8486350a1bfd4d4bb23b32e6a8b7eedb618a49033fbf35cc85a1a47c494f44fdeddf2cf1a02dba615efc7b3fff54cf42825a203003c16642c8bc8387a3f3e7c84e3897e2bb661d9891a0ed41dd859caae17cf012f84eb5158629981d16d174203581d98939a441da161288317b143986b1f48d9c927cc3f0d7461c60b868a6fba5a960831a66253b9627503c73f9584e7ff4ef95cd93846e2a1aa9f191239673a13c6c4c957dea604313827733bcb2737bae581ac503ceee4f8b2347366f937ab2a29421c7c0afdecadc7958720af03433dd72d0f01b65ba83e12bc0eb656588a66bb12fabf59f18e8ae22722a9a72d98f096347e466e80", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000001100)={{0x0, 0x3, 0x63d, 0xfff, 0x0, 0x7, 0x42, 0x8, 0x0, 0x101, 0x8, 0xfffffffffffffffe, 0x9, 0xaba1, 0x9}, 0x8, [0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001180)={r3, r4, "044cb7cfff4fb37905c0cd81fdad582cbd8a8b984f6e6c2c284b8b4b1c636090c577a4c7ee9a2422b96d81ad5671770b600035ca5a3e80cc5ec367fc54aa5c1026420323e0e9f8f553d389e3556af61d2f8de74066569fa52df305a858d58a567a45373f52eab69ce1d1c0d890d65c45d09ddefe28a64db3290fafcca276076a044685c7ee0c59d766ba0d277e86e503ad487cfe6fc0ae86b4c0a718b4f2afee7eddfb8a8e89adfb2fb1ce5173413333002749e5a3532c1abf3b41575ad6aeb08567c332e578d4cf95caa20f6d362ddf601f880e05e84af7b9e88545d877a200ade81b526fad90bc9db7a9bd5b50d8924668fb8b25657c9282c4bc686666a431", "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"}) bind$netrom(r1, &(0x7f0000000080)={{0x3, @bcast, 0x1}, [@null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @null]}, 0x48) 22:39:28 executing program 0: mq_open(0x0, 0x40, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:28 executing program 1: socket$l2tp(0x2, 0x2, 0x73) mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 41) 22:39:28 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000100)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000001100)={{0x0, 0x3, 0x63d, 0xfff, 0x0, 0x7, 0x42, 0x8, 0x0, 0x101, 0x8, 0xfffffffffffffffe, 0x9, 0xaba1, 0x9}, 0x8, [0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001180)={r3, r4, "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", "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"}) bind$netrom(r1, &(0x7f0000000080)={{0x3, @bcast, 0x1}, [@null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @null]}, 0x48) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe(&(0x7f0000000000)) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000100)={0x0, 0x0, "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", "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"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000001100)={{0x0, 0x3, 0x63d, 0xfff, 0x0, 0x7, 0x42, 0x8, 0x0, 0x101, 0x8, 0xfffffffffffffffe, 0x9, 0xaba1, 0x9}, 0x8, [0x0]}) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001180)={r3, r4, "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", "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"}) (async) bind$netrom(r1, &(0x7f0000000080)={{0x3, @bcast, 0x1}, [@null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @null]}, 0x48) (async) 22:39:28 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x0, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:28 executing program 1: mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) [ 892.712877] FAULT_INJECTION: forcing a failure. [ 892.712877] name failslab, interval 1, probability 0, space 0, times 0 [ 892.748600] FAULT_INJECTION: forcing a failure. [ 892.748600] name failslab, interval 1, probability 0, space 0, times 0 [ 892.754870] CPU: 0 PID: 3444 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 892.767588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 892.776922] Call Trace: [ 892.779496] dump_stack+0x1b2/0x281 [ 892.783108] should_fail.cold+0x10a/0x149 [ 892.787237] should_failslab+0xd6/0x130 [ 892.791191] __kmalloc+0x2c1/0x400 [ 892.794724] ? ext4_find_extent+0x879/0xbc0 [ 892.799033] ext4_find_extent+0x879/0xbc0 [ 892.803165] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 892.808598] ext4_ext_map_blocks+0x19a/0x6b10 [ 892.813079] ? __lock_acquire+0x5fc/0x3f20 [ 892.817332] ? __lock_acquire+0x5fc/0x3f20 [ 892.821551] ? mark_buffer_dirty+0x95/0x480 [ 892.825861] ? trace_hardirqs_on+0x10/0x10 [ 892.830078] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 892.835427] ? ext4_find_delalloc_cluster+0x180/0x180 [ 892.840599] ? trace_hardirqs_on+0x10/0x10 [ 892.844826] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 892.849653] ? ext4_es_lookup_extent+0x321/0xac0 [ 892.854389] ? lock_acquire+0x170/0x3f0 [ 892.858447] ? lock_acquire+0x170/0x3f0 [ 892.862406] ? ext4_map_blocks+0x29f/0x1730 [ 892.866716] ext4_map_blocks+0xb19/0x1730 [ 892.870853] ? ext4_issue_zeroout+0x150/0x150 [ 892.875333] ? __ext4_new_inode+0x27c/0x4eb0 [ 892.879724] ext4_getblk+0x98/0x3f0 [ 892.883334] ? ext4_iomap_begin+0x7f0/0x7f0 [ 892.887644] ext4_bread+0x6c/0x1a0 [ 892.891164] ? ext4_getblk+0x3f0/0x3f0 [ 892.895035] ? dquot_initialize_needed+0x240/0x240 [ 892.899947] ext4_append+0x143/0x350 [ 892.903649] ext4_mkdir+0x4c9/0xbd0 [ 892.907259] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 892.911910] ? security_inode_mkdir+0xca/0x100 [ 892.916480] vfs_mkdir+0x463/0x6e0 [ 892.920007] SyS_mkdirat+0x1fd/0x270 [ 892.923701] ? SyS_mknod+0x30/0x30 [ 892.927220] ? fput_many+0xe/0x140 [ 892.930744] ? do_syscall_64+0x4c/0x640 [ 892.934699] ? SyS_mknod+0x30/0x30 [ 892.938232] do_syscall_64+0x1d5/0x640 [ 892.942104] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 892.947276] RIP: 0033:0x7f2645954317 [ 892.950964] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 892.958657] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 892.965907] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 892.973155] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 892.980405] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 892.987658] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 892.995290] CPU: 1 PID: 3441 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 893.003090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 893.012439] Call Trace: [ 893.015023] dump_stack+0x1b2/0x281 [ 893.018649] should_fail.cold+0x10a/0x149 [ 893.022808] should_failslab+0xd6/0x130 [ 893.026783] kmem_cache_alloc+0x40/0x3c0 [ 893.030843] __es_insert_extent+0x338/0x1360 [ 893.035248] ? __es_shrink+0x8c0/0x8c0 [ 893.039133] ? lock_acquire+0x170/0x3f0 [ 893.043105] ? ext4_es_insert_extent+0x11f/0x530 [ 893.047860] ext4_es_insert_extent+0x1b9/0x530 [ 893.052441] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 893.058238] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 893.063691] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 893.069485] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 893.074071] ? __lock_acquire+0x5fc/0x3f20 [ 893.078311] ? __lock_acquire+0x5fc/0x3f20 [ 893.082545] ? mark_buffer_dirty+0x95/0x480 [ 893.086865] ? trace_hardirqs_on+0x10/0x10 [ 893.091103] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 893.096473] ? ext4_find_delalloc_cluster+0x180/0x180 [ 893.101663] ? trace_hardirqs_on+0x10/0x10 [ 893.105893] ? ext4_mark_iloc_dirty+0x1822/0x26a0 22:39:29 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000100)={0x0, 0x0, "88912cf2811ef080f8486350a1bfd4d4bb23b32e6a8b7eedb618a49033fbf35cc85a1a47c494f44fdeddf2cf1a02dba615efc7b3fff54cf42825a203003c16642c8bc8387a3f3e7c84e3897e2bb661d9891a0ed41dd859caae17cf012f84eb5158629981d16d174203581d98939a441da161288317b143986b1f48d9c927cc3f0d7461c60b868a6fba5a960831a66253b9627503c73f9584e7ff4ef95cd93846e2a1aa9f191239673a13c6c4c957dea604313827733bcb2737bae581ac503ceee4f8b2347366f937ab2a29421c7c0afdecadc7958720af03433dd72d0f01b65ba83e12bc0eb656588a66bb12fabf59f18e8ae22722a9a72d98f096347e466e80", "6a74c2eda51a077a4c0df094e1e0f7192738fc4c01df9af598720416f48debd9e1763256de2360e4c2246b6ccb14077dcf164439deb1b6a265c456f3d865912f0a6bef2419be6417ee83b0bfb90918bfbe682593e60705de9b322a3c8833b62de0b17bbf88c4dd0eb085ec5ee2c86d3216f0bc81367b1f8e466f4005a4d1a22fb9c0a681bbe214780f005d09b4cf08d9bde528cf31d246c456a74fcb0f0cdc427c90ff4b168e0fa969abc55741b9f303ee821f10d7178ba4685fc7bd0b2ed06bb33bec33957aa7d0d184d7c06b499ce4ea8be41c9472c134bcb5982ca79784d1118e75bfdf0001cdbd104dcc4298ea9cada1201aa84fefeaf41f6a6455b8c9f2e9cfe9b885d9b96a2f065ff3d0a8e8c0fcbf3b2d2a0bbaa9b79d1b46cae080951973123aa3d3f393c0757d8b92c3c80d227d9c10e592e129f7483fa45da6f75801fe90f4ec55200a5eee74d17194e862590e6f94b12dca73460d0b56474b350a41dc59a68b2e6a55805b07fef8ace6e5976c2f6876a1686d41ac7849273ce3b4f7abe40c5f146eeea8484ae61a9399552eaf0d9aaae18517794b16c13640984154fc24a554145cc5f00c0828542a1bb16055e9caf92d5d11d8ee9617b0a35375d45b9a62133034233703a3e55f6d565383647e849eb4c28199f85116cddfab62f0701654d7ef09ca666317ece6090c88985023f9a7de4ffa2a974893aee3438ab6c0da8855bb16b3b34cfe106887f0f165249b11f03fbf3b177f434ed8c95a1d3463b873d85534fcc633a8183277a8151c3923157ee0aa20a2c12bd934d0d5851cd9d3f59b4b4df324b7a13033e8891e7aaba6bd8cddec5588a55cf5f3d25152d71bfb15afb8a8178137a2ed363f645d433e285a86262402c78571fb8be385c85ccac20e8bd6862b92ad19435d2ebab3ca3be5c3bd16b7d3b2ff3b224babc3a3c11dd326590ef9749a290bd0cb4eff57aa79900aac59f3f8f71a49915b0b57fb63db14728ed73b0e96c54d79e01dd56a6591dcd1de32be7a92770847b7019c101429e63967b22cd181f60206e6d6b86848193f47271db45f71b62f27f8c24b8818989c3988b787b8a5efee894da1e6310cd6d0b19fe05f7f137b0a0a3f38f2a42c5258308c981090c0ee3fae9774ae45a8197f4de69a8af1b25f604fb0b748b9a391f902167fae6830f08d6e711e6d83263df37b448a3642138e1bf6e8fcda73ee64642b9746471b5be7992d9ddb934d121348262069625fb59c7d6cceb6d47dd15579cc2e79b9e477451004bf54f1a845f9daa8a16cff7e73d15277ea5586bbb15b2fd118dd2015c126d0adb7330e1cb131b2845424823f82a57f521b0159413303201c3917af7453ff18413e42f1ef6793438a13f7447dbb0e0e74b6c3d2cc154a9d3ce54c2166c3dc5e22db5057cbbf21c4901beccaa51d98b839467f180d646cbf935c83e2a46c7ade84511474acde02629667e5c860a63c079e2ca117bb8da738e4e1d4039682b6606977958c7609abd7f6e44f1aa98911050d8d43d79eb5be6e563def64f155ca4b4659bc3fe10ac78ba0e0667ad8ff79833b51b5a8234301c548365a3ee98f129f847dd9ee40988975546b56825e9a9e3671f6f8f9c7b0ca86217c556629935db5b0e376cbf1b7f46bf7add99a5ca5a31e45d495da0d8119ee76f3ef6023351402855f737401675719bcae0432a8bb1e1bc3800886e637ac46613dfc3c03762493b691805e9c7f5c5da6425d1a77f9c5faa425c30b4db92aa1cf609a22d62ad4526ba270779d08fa0d5b539c20d366ffffaace9ff318e893481e9f146165ce2869848845d6c286f5776bed507bdabeb50c3a90a910d787f274f16da2f45e25f3b5e7bb020b7d4c6a7817179f4f960e8bfe176b14a6a0a0efe43ea911219ba08c18ece346ab20b8f5069674f14fd6a785f14409a545577aa7011357681e20c8ed03d1dd38e6b5f914b2652996d95165991cdebd707e1a92f0ba01ed7be7434dda4dcee5a43da1e130176cbc06461988f3ad65672c306f83b0f782775b41cb4c321190644218004a75943201293274b2510beb813ae66265cb83b002f6208e90544bb99f135598f980d366cba05cf1a0f491616c66fd30f2f8288b1ffb4192bc0ac9baf9166c504694d2423c601895a87c4b3dc1282b29f837cc263874b2e2fa36adb6deddbba44a9b189c432153e30a4e7b8585e1870ac5a611b0839cc4cfd9d7f74a7d8198786acb7d88e8b220af6d34676bab8ecf20c7eaa75e63380612736caeda68c2e065c26480002b73b63e3458c55e6bfb53108c778963195795bb51860942587d512359dc3d68f91fc8c55ccf8b2f72f5f3745d32f894392c2c5c08c603947449e687c569e69f510724715453e7da11bd43f3604f87555c21f89ce3d33a0622a70e3a360e50d8e8f1344044d06e62450c655c0110becb8d3f13c18751d688c46f7a7eecda20ee078555ba2dc7c542b298db066380a24fbb31c9f04f55a475d73858b4245eefd664ba58e635db4f9e4fd324ed69350ac6329d844da9aa01abb03529928112f37a2b6b1d6d0016fa2dbf64c4f35190fc55997f25ca079e040d05e47e0667224d540d9d13bd94d47c1d0e88cf52a20c9bde220a894a84c0a009db222cd71bd545fafa840c6c1172167c795bdbc9f90a831f148cd885669edd4da441bdda0504e376b3953254715dc099ec6855d816cecdab0bed7eeeb911b647327d7240ded6490f3489c33ae706dd6ea91aea8677aaa890b072a3c4fd6c40cb21bcddfce866e6fb46abf79f21d41743ab67ff88e23722a8400711fd2e47a14c9b2cc25f70b476e7616791795ba33093f9438a0d6fa7dc0d6aefc8a3957a95abe7ef3abc367bed5e56024a51e4fdba0ca108a7db641ce06731a685a419466cb3e068d36f63fe680bf06412369fb49583e597978e5e04c2f6714bfaaec24ccf9a4015fdbd7324f7c7f6f671c5bf98ff7173021470ff90ae6c504f2fd0c85e8e75337ad915e6754fd73f3aa032c6d0fd6132074c250ee7fb7e6ead6606a3bf29f45a3500256411a7c741676fe3d4e223622f2b4c828116b4661377650c2b69a83e1b84e1bfa39456b65e2b9deb23217c61d5019e3a2b8534ad483a9b36a795e145318980acebf7aad30367b0d71dc3cbabc675cc6a7372c9ff53db6748262a1770c1fc8b59651f9f1cc709cc6dccb97713418fa020926848b0148ec4993f5e38a4dcdfca4f7755462d148e601df77c55a6682be39a0cbdd04a7f4e9e2e251e03dcb4af43ddeab5f4c85866e7ca7488a9b1c045c4d57f21caf54b04259988753d5af35f1684697ef3ca7cc7062775888e81331b1b603e1573b2f9bfe6c11a640ed7a9ccb739ceef661327a83664ab17fcde485868424bf03c8175c3884adcc87bae965c9acd37026227ea8b1b661c9eece8591e2852b66067404766327781d9ef2847ad32b3a5ce6ac2032635fae0a886b6c7ead784cb3e7278c1e77521abc42b578401d8b90f70802f3154a7ada9bd125aa10d5279b76f17be5fdcec1775fa116fed8450d16e56e87c958530d9a6e7c403d916d5a22833cbab0a46f7857f8301a991b4d07ff6db787c39d7c9aba01dcde1bec76642f91fe5f69fb7535e8a374876624627cb01f2b916f577eec0023d61af44b43825150c5d35cf6a63151215d545de83a53589f6082c5ddc7d813db808369e7d6d852b468c5dba446a9ba20a3476716dd851db2b74cab54411cabed570afdf50a71b55af5698baad4c50ab17cadc461cc7cb41b3fc2ce587fa27fe724b60452eebf8d2faf9d372e43adeb3ec382dfd56dc9c76ad285d36b92cf110814a632b5b1d3143543bba1132f7fe586f1dba30a000bdf91a16b1b261193cf2a9255d5fd027e7a10befeedd985a4b6cd3b26c8fa132b68a5e365926cec0c1f9995d409b3907d1e822bdfcf4fb915c424e25df88bad579367ee929d6a7311ba6fbe5d6aa2feefb042a89c0b7d40d70418163ff6b3e73523aa3f2e95e508f712155e20fec2fb09b3ecaf20cf25dbf14eb19ad22acd00d9d45b529253e9cd830cf8a2917d47fa3379dd2a61cba2175bde0755ce51669cce4db7173a0ec1a616118f7b09ca15408e40fab76f318547237e9c2b1255f222e91d14a78affea177c1d955c98b220bf146ec0ba947310b21829d3ccd3ec05bb25477c6c4759b780caf66416e6b4919b61ab1ea60221d1d7a46551e58f32fe295ec20a96863634797a215544e651298e24bae369c8c753babf6046d57bcb9f99e5ee90332d97af8ff77e959bb0b8bb8f4e917f19e7dc05846419ae9c2a4edcdedada053e4c0222af57204c904ecca5f3ea1b7a9f7aa114bc9dddfd1536ad883e9fe6c8459ba155f82b62e53dc040cbdb72ac1526252c64a68056c32c5d0933c011ef226478892223666fbaf1d8639827235d01060336b362257b3d034bacca4fe9913164edff483cd15daad571bac7dabc604c06813584079eb99616e13e3c82009d7c8c26b6a061475744b72f6d99747449e2e7f481a61b68ad7ae9aa70ec7407b3cf5370623af8c5e3aa6736cbc2ee0dd9a03247fb90514aeb99ab8e0d9216b924626b415662ee8391bc6cd3744d6feeb9c77412210af9743bae0309481da6324feaa6381136f62aa6950ce9ceaa4f17158e3d7a5beb4d6b2642286b96267546a97404ed537ec4a56c2e44ded000bfe3002dc0ef6f319284de12184358cca1d38bcce5baa0c2b88bb86052fb23aff6a8a0a5b73365370aaef8ae1c06ca63f744288f8ab8821860c629fc973600a9b0ee941af233c83237e79b4208fa5410efba8b4ba3a36db9d51c95399a7dfeaba9f03c39cd706b401f40e973eacc25a20cfe56af6aac664e8b29a417b705a4293645ed4c9d5b4c92a1a008e216d1fc6e7358cf9c754bde4f291861400c66f27b1ffde4de311f228996c6cd4978b8ad58912bb4f0ea411991b672da66a375935e2067a3dbc19cd6ad965d1fccdec2d5a7368cf3514263fc388717099846b53a073205030a7f1948c35f100e7378f8ff89df968371d58721eca643df4d38ecfd318820655f7626bf3b132a0741bd87cd096f81fda6a3f713d8bbc3ea12f8797cd6f16cb6f585ad0e5b7228d29ddc1e9abd95e548e3d35ee2f52e7944946ec4c249a288c3327766be167c8a64b616e602df749ae3d2670466778958343b80d590580b0b352ab654c82a57a309ba7038062d4b90c881d57ec6536b822627443b980114a9138cd497011cdee1ecd064c049643b256851c5167d7009016afaca8a7a1381d069d5afbbff4074a455648bb9214254b12f59bc20576f5ae471a2bb23808804f167cb722fd511207008e147d1a2255ebdd43ff2884d37e4eda1c6fc3c5c5a2b807fdb55d40a17a12481f342c7a1be1ee5d"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000001100)={{0x0, 0x3, 0x63d, 0xfff, 0x0, 0x7, 0x42, 0x8, 0x0, 0x101, 0x8, 0xfffffffffffffffe, 0x9, 0xaba1, 0x9}, 0x8, [0x0]}) [ 893.110747] ? ext4_es_lookup_extent+0x321/0xac0 [ 893.115501] ? lock_acquire+0x170/0x3f0 [ 893.119473] ? lock_acquire+0x170/0x3f0 [ 893.123441] ? ext4_map_blocks+0x29f/0x1730 [ 893.127766] ext4_map_blocks+0xb19/0x1730 [ 893.131918] ? ext4_issue_zeroout+0x150/0x150 [ 893.136409] ? __ext4_new_inode+0x27c/0x4eb0 [ 893.140824] ext4_getblk+0x98/0x3f0 [ 893.144449] ? ext4_iomap_begin+0x7f0/0x7f0 [ 893.148776] ext4_bread+0x6c/0x1a0 [ 893.152319] ? ext4_getblk+0x3f0/0x3f0 [ 893.156204] ? dquot_initialize_needed+0x240/0x240 [ 893.161134] ext4_append+0x143/0x350 ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001180)={r3, r4, "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", "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"}) (async) bind$netrom(r1, &(0x7f0000000080)={{0x3, @bcast, 0x1}, [@null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @null]}, 0x48) 22:39:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0, 0x0}) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000013c0)=""/55, &(0x7f0000001400)=0x37) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000003c0)={r2, 0x0, "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", "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"}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000300)=0x5, &(0x7f0000000340)=0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000)=0xf3, 0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x9, 0x4) pipe2$watch_queue(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_DECODER_CMD(r5, 0xc0485660, &(0x7f0000001480)={0x0, 0x1, @start={0x8}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000013c0)=""/55, &(0x7f0000001400)=0x37) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000003c0)={r2, 0x0, "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", "57296dcfcd9f91d551e58a59e43b36cab9a81ffe87cf42b477e7bc0399224cef7f0b1288bf41af07032be1f97bad546efe2b7ad494a62a04dff285a8a8f87799f0580ec74da3ba95956e2588907ca2e30ee89f7d3e6295963854cdc659b7a76f4a6e8cfd59e0c4573834aa3967d5c1686b6fc08568e012817275a0a2cf77326ca0d5bcc78f8bb9862343924b2ac7eda567ea4ef899b48628e78d9981ed077a2bc464b5bcb5fdb349ba093ad4780602a2fa063d189b18e587a186bb68ce25c91ff5305cfb51a21512cdc13becfce6fba2aa6d038b6cd9d1af57251d83eb6cb84e4741bfdd53c16d08649d97fdfb75c1a9c9890dfa49119e4915a721adda688a28e3978160ea23771a37b2cabda3a199a987ec05b9a49ddd2301af201166e11870338c260cc3aebfa4f1e639603f40fed6fcadebe3640a0dad59b9e3f0704bfd3ef0bb20e1113c00ad87c77f2b94c977db3a8b32f5843e88f0d3c0319a630057bafecf036c219b4966c9665432cf3aaecad475126ccf71cd6838262e94baf21bc6a0bc105c6f8f011aa68ec94a46fe78b8f73db44ce20a583fd5468fa0efa654dc5a8b237379e2c50bf06077f833724627d621491f8f09a8e08599993f8755f463c30a8db948d534d648c8e6cbeea0ddb80f1a6c5dada3ac8a324409ce0a401b81a4629478ad426cb3df5ba33ff195b0bafc9e3801462dd823d4c7964401f5603260d275377b3fc1e8ae5367d292aaf3f5d118a5925d4fee696998597f3ded706ba61aa51e844048bb7597057125f30f19909281daf801f0d3cf125327e783c760172e94f0ade5a342990d4344fd5b05e4a07c7b1d54890804fb422fc970b257ce05a75aff951514d9d65d1a16d599cb10631dcd8a3b6350c04d8569ee551b292ed5e6fdd2ae7e79d0941920aa410f601af11a90a5029a93e00d2c377243bd976910050402f09c9fedadfacf1f1d928962c4f90862d50e79fd60be26d1afdae29196631ea2ff5360e0152fd3001549bd5fd2848ff59a5a57a74be86ab642210c7e8dcce1fce86729cfcec48f3396f7e6836bf25b2e2d346a544179dd91476cc0741fb25bedfff977922c0e9c0f4a03975a389eeb104f60c7636e6abb36f75bc9e8252e13f7357262bc2ba585566538901ad8aaa511f855f09fe1921af0dede42575b4f6fd59b65095471660f4f9ca82c91ea2429dd014c2fb9e9baba1eac8884e87c22dc6641cba440b6c500d36a095cdeba0b60ff9c73391689f76f80f8ed09fe9c89299039fb0842a687e5a82e53f226dbc1c961dcbb2cd28a770a91f53e4d51d612fba2e103471aa88d58cb3bba99d1f443fb8941788d73aedf943220744c8731c86529fe1e744263b5f1f50b5ea5b606a8cfee14ccbc990744c38df3310f5d1ce3e0ff849b75fe361533b0b4bbda03bb4218c40640a6ff155d657fdaead4400e8f65d510f2405bb4b97110038d94979568d1ebf7a7dafc2cc54e23643e675b65c65833e683370f2b5535a9d6d514d903928cc19ae1fd940034748f9781ba347d6d2353536509d0fb84d20c868e983ff59351b6027488dd1c08ab1145fcdb8d635f5ca41dc334de0c518c4dc8a07d550022b53ab530350dd910453ec1da7502f85f29e43fe42fafad8f69957408079a911d63219129cfd754faaecd2bf6b40a556fb2764780fdc5e0cdbc07ecfa23eecd522f502bea07435dd756c97e93899e794e42909f555263d0c8f66acbeb84afa5fe52a18d4edec2c8cda34611348c7b9c037b7d6c8d9d50b327ee059c544b0178ad88e399187c822a6d87766e4c24eb09c0450861a62e54f9e47d8211634c993916f23ae38af0a019db8a21ebe61e2afab40bd13e5887f02bffc5636c229e3adff5bcf38d3d2a83f7960b78cbe254a1a5e48e7428c4b0cb5890680a867d042627d89b5088beb94b49d81519794703b8f1518050b07a07b4ecb817f514dc57132c4e70ab05e427a248c78784a89189a3841419eaac17ec60b35e66ab7751f54dad9e71223a2f841041c8804773b65f62e901f3ff879b7d403e644a4a7658879e2f7e4db4c27739e77f9beb698f70e2a010aab8701bd02abe095dabc0d3da7144a9da4ede03d86cdc5a3f49ee58d5ea2139cf8f8c9d96908549ae75d29a035b683d66655738996027c7bdb9e444eaa52113744f6ae6e132240f8339c231071e182e04498681ee19dc338e179df75eeb7d619f40f05958cd54560ad09680909d24d3c9a21f9dfbf28e34ef8db8957c80ba1dc0f4418e033b60982b47c034a5e610e4bda994b5cfc3c628bd1042f45bbd12b58dadac43c8196e05bbe819a70dde9920c33c78f78b76347a3adb7b347c37bcda8582562e3cf453f77e715d5abc6a8c3510d5b4cba9aced9527edfe2c318672bbd1f2c58744ff7f9414d506d50cf654f63ab7f67410799a48e9758f4751e6ebfd8b236a78f75546380be8b4090cc6e3c2c5e46ea151de03ce4e9b6c9b48dd6aa4d3be8ec23387196bc3d4bdf65f6f7b3e9cf121b66c6de580f87ba1c84f0db0d7efdcacd8365e41f584c5a5de67d8737342c47b54ed248ffc664cb756baa597677094e8dcd352e9a42af9e2897b0e917cb440ce3f371a9521f951e1cb0d0b39274e460fad3b4ba6b623f42a0de07df867a6a38e590b8666ce1fa1b50c5890efd029c60a3be323bdaba64022a641f4f728a7c79136346933498fddd400c538d94d2c947bd07f7ba2333f9e489dd2b617b196780f9459bfece903f63c40ae5e1071c385fe787c75047efe32747b3157ad4b56217a84408f4958aa2e4e4ed8c4e8a6778a68707bc466525fdf8a6c9e6512396e36294f9f999e0dbf90914593b04bf7dbb090868db2916235f912bd90968b0915f5f9bd4643c9e2eb0a487455c2597c329c78bd33adac49cb43f1f950ed3d2f25a49f24121ddedce1ed5416c107e91d2cb3e04b7fac2deda7262092c8fe4f71b64e98c148afac29ee1951b7739c47600c40dd64d0bd634397ccece42675489f8da67fa80e6313646f073814b202916cb7108a6f8b3096ea07e2d3bc2a71bff31ab048f954bf574cc243378092be5597699821e90489bf3d1a265d649dea0ba2f04b3276c20db091c1f833c41d8dd4d7a5d70712d0ba581731c32ae226be43ce1a583acd3c439ec28e4126cf39430d3af90365439eaf940441c4d65b2c71e5abe2ef82f3e7af3fa02ddb1306a35a3f98bbc5656643f3911c7f1dea4eb01fe55bcc8f7c3a327b48b94f3326444402515cfbdb7c3dbdc6d8deb7f2e0546aaab8933428108837cef595bf5b8a42df3bebc8528f1c967a5855e9c595f661dda4caaf019a543129837b7b8913c1687033a223304411cb48621b70feab0fb127efdbe3512df64ad2b53e5cbf38953bf2d74d387c397eb5074f59972915e6a0ed2576d431326478931b2cfc37bf388d62c1d92f88038c1c4b3e648145a5ccb38f233b0ad837d7580399aab98ffbf16b70d71259e900f86ec268c4d486eb05144216f57a7b33301298378877b9e6cf8373158f6c9425941ef0f9ee4403b1e867c3316cb5028a399aadd1f924e115c59b9406bf11405dbf016f8ae37e3f7579e6bdbb0cd510cb59be262fdd9412bb5e98adc091a9e1ca08f8b037f946ebc3af579bf14da87e7660bdcd061e830c0640b81952502f1e9d998b4d9d20557449c729a7f27559fe7cdfbc301866157956db8a11289ba55f9221e2e3bbe5b1759bd151fefb3cb8192a02580f1244067b461f6573806c0e80caeb2af77eff099fb031e5282f0672dc1b5d90d2e52b3a847d2ca7a7d743a288117ee424c109d4225751008cb2338f7e20c4d4ccf767529a965c3f50d683474bb59ba81667dd41857be017e0b8769fff69a907d1d5cc33dcbe00b817d383ac8a05a3bc422e21905a8ca3f9f53209aa1ddd1ee8de4745b1873b327a2619c8d54d23743d236c0e134a3f7962869fa8b05d72d4820f1f1ba477733a97739193b1ad17de29797e460e583d9e8457f08eab021c98443b4efa88881292e89ba92c47abe4bafe6d620b5f47e2616d2afefd331fa190813b8c3e4d3188506b84e78a311e64e222afc135e53264a58ba9f7846835dbcd535d2c7434e49be015544f5838949667bf1fe7f0fcf95b9b8a102c14a037905322f8ed14bf642af3112113f85902f8b2d7e928cff1d07bdf0a4b7286453ddc43a7679f3d92e8e4bfc1332fd564d490ec0d37e76866feaa47842f2cbad57541006e5d54c39c7a1bb6d3ee2df0f3d97e1fb0562a6df649c25eeede8da7b4dfef7d37d86f2b584f921a05bbce6291ada9f9692643c98b5654efc19e6223a00c257c77d7ce269d0f3caae93998f992b056e196ebd3f4a1907d877cad680c0ee5de29776102f5fff427c0119ae75d23d1963a883e2a92fd39707a561a075e2fd1e57e67cf6787ed740d7ef673e9103e90dfa2000b1e0b7dc3aa6e0d2690bc9bfd782208528c5647a190fc524c3ba066333dd47e8b577260f894f37c07a2f8d6aff45335c63d6afd023914b5dc615c333ed01ca1c0194389082c539b04966df6d5e1b5e2f0503d4947ab05f133e718e6d75ebf27634d50b32eba36bebd70e8ef8fd6e8fb1f7beee3ad1e10bb049b3a3a9f606cf7ec5d5e634dab01df03f59fcd0f370ff1968265f274766906c521302fc65ed4a2f8e1434dafa093a6b8ef5ee0b2717ec6618e966421b294409722a96e56a8cd93dfb510ac19f0548ba2b037f8fb5a5db26cb807d06090369f5031159714899a6ca68292508c9821b544a3917a01ef7e19d084db1a396beba06fe2ddac534623a1d4de7bd12dee6f04951c9a6db16461b11f26c383f0fe42e19eb9426ab2dba29c86999bae8540155342dbe6a282cb8210cc85dffa728a7d8e2534e9a3ba69f3c197d29db2e064a63eb4da947bd4cf51582dfe6774115897d8828fc88c5ab70464a4253670aded37afe8b7504dc2a5b21d53d782354e0ed08a0e15a97c85f69608e21078e73e48a820e7183b71caf38365e5011cc38d40bd22f3fb4ea2c6c10ff81a6573366d5380b5784c676e0c09063c4236742c326f62c7d58e5432709e7eb5adc9f5940e6936c36c51f71fb056162be7a2518ac7cfc342b893a411761a0bb3dddaae5192bf7f142cf8e6f58792c073dbd1dbe2e2a69ddd84a6353e24fa59a55c990f316f282c89039383ead2d0bdfa70fa7b8a0ed7d8a99d8eae4bc392fb4c8514c85301787bf04aabc82848dc53039e7c998fd64651b03ba0ffb839bc54c03a5f83186bede197968464ba8839d1c2281ebf12bf5f5a1a28c418255a76cf5c76397c2a1f7f66be683f2ac5047dbf57f1fb6dd701a93f84ea881e838b96233d74c5387aca428ad82c06ec5871d92c5c454d0e7a2052fd8482444b7a42e794437e288a25efe1dcc1b960f2"}) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000300)=0x5, &(0x7f0000000340)=0x4) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000)=0xf3, 0x4) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x9, 0x4) (async) pipe2$watch_queue(&(0x7f0000001440), 0x80) (async) ioctl$VIDIOC_DECODER_CMD(r5, 0xc0485660, &(0x7f0000001480)={0x0, 0x1, @start={0x8}}) (async) [ 893.164932] ext4_mkdir+0x4c9/0xbd0 [ 893.168564] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 893.173354] ? security_inode_mkdir+0xca/0x100 [ 893.177936] vfs_mkdir+0x463/0x6e0 [ 893.181479] SyS_mkdirat+0x1fd/0x270 [ 893.185190] ? SyS_mknod+0x30/0x30 [ 893.188731] ? fput_many+0xe/0x140 [ 893.192357] ? do_syscall_64+0x4c/0x640 [ 893.196330] ? SyS_mknod+0x30/0x30 [ 893.199866] do_syscall_64+0x1d5/0x640 [ 893.203754] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 893.208939] RIP: 0033:0x7f91fb945317 22:39:29 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) connect$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) [ 893.212644] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 893.220443] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 893.227707] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 893.234972] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 893.242240] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 893.249593] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 893.286778] XFS (loop4): Invalid superblock magic number [ 893.372388] XFS (loop2): Invalid superblock magic number 22:39:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 41) 22:39:29 executing program 1: mq_open(0x0, 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:29 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x0, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x200, 0x4) 22:39:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 42) 22:39:29 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) (async) connect$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) (async) socket$nl_generic(0x10, 0x3, 0x10) 22:39:29 executing program 1: mq_open(0x0, 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:29 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x0, 0x2, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x200, 0x4) 22:39:29 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) connect$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) socket$l2tp(0x2, 0x2, 0x73) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2={0xfc, 0x2, '\x00', 0x1}}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'netpci0\x00'}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7ff}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) (async) connect$netrom(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) [ 893.484648] FAULT_INJECTION: forcing a failure. [ 893.484648] name failslab, interval 1, probability 0, space 0, times 0 [ 893.536564] FAULT_INJECTION: forcing a failure. [ 893.536564] name failslab, interval 1, probability 0, space 0, times 0 [ 893.536859] CPU: 1 PID: 3531 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 893.555661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 893.565128] Call Trace: [ 893.567727] dump_stack+0x1b2/0x281 [ 893.571366] should_fail.cold+0x10a/0x149 [ 893.575521] should_failslab+0xd6/0x130 [ 893.579517] __kmalloc+0x2c1/0x400 [ 893.583049] ? ext4_find_extent+0x879/0xbc0 [ 893.587361] ext4_find_extent+0x879/0xbc0 [ 893.591531] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 893.596977] ext4_ext_map_blocks+0x19a/0x6b10 [ 893.601564] ? __lock_acquire+0x5fc/0x3f20 [ 893.605883] ? __lock_acquire+0x5fc/0x3f20 [ 893.610112] ? mark_buffer_dirty+0x95/0x480 [ 893.614422] ? trace_hardirqs_on+0x10/0x10 [ 893.618644] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 893.624011] ? ext4_find_delalloc_cluster+0x180/0x180 [ 893.629188] ? trace_hardirqs_on+0x10/0x10 [ 893.633407] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 893.638323] ? ext4_es_lookup_extent+0x321/0xac0 [ 893.643155] ? lock_acquire+0x170/0x3f0 [ 893.647124] ? lock_acquire+0x170/0x3f0 [ 893.651101] ? ext4_map_blocks+0x29f/0x1730 [ 893.655432] ext4_map_blocks+0xb19/0x1730 [ 893.659582] ? ext4_issue_zeroout+0x150/0x150 [ 893.664072] ? __ext4_new_inode+0x27c/0x4eb0 [ 893.668484] ext4_getblk+0x98/0x3f0 [ 893.672126] ? ext4_iomap_begin+0x7f0/0x7f0 [ 893.676442] ext4_bread+0x6c/0x1a0 [ 893.679970] ? ext4_getblk+0x3f0/0x3f0 [ 893.683846] ? dquot_initialize_needed+0x240/0x240 [ 893.688771] ext4_append+0x143/0x350 [ 893.692469] ext4_mkdir+0x4c9/0xbd0 [ 893.696096] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 893.700749] ? security_inode_mkdir+0xca/0x100 [ 893.705321] vfs_mkdir+0x463/0x6e0 [ 893.708877] SyS_mkdirat+0x1fd/0x270 [ 893.712586] ? SyS_mknod+0x30/0x30 [ 893.716131] ? fput_many+0xe/0x140 [ 893.719751] ? do_syscall_64+0x4c/0x640 [ 893.723709] ? SyS_mknod+0x30/0x30 [ 893.727236] do_syscall_64+0x1d5/0x640 [ 893.731116] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 893.736290] RIP: 0033:0x7f2645954317 [ 893.739986] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 893.747688] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 893.754952] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 893.762222] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 893.769475] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 893.776756] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 893.784039] CPU: 0 PID: 3534 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 893.791840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 893.801195] Call Trace: [ 893.803790] dump_stack+0x1b2/0x281 [ 893.807424] should_fail.cold+0x10a/0x149 [ 893.811574] should_failslab+0xd6/0x130 [ 893.815550] __kmalloc+0x2c1/0x400 [ 893.819177] ? ext4_find_extent+0x879/0xbc0 [ 893.823502] ext4_find_extent+0x879/0xbc0 [ 893.827660] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 893.833113] ext4_ext_map_blocks+0x19a/0x6b10 [ 893.837620] ? __lock_acquire+0x5fc/0x3f20 [ 893.841865] ? mark_buffer_dirty+0x95/0x480 [ 893.846186] ? trace_hardirqs_on+0x10/0x10 [ 893.850415] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 893.855778] ? ext4_find_delalloc_cluster+0x180/0x180 [ 893.860964] ? trace_hardirqs_on+0x10/0x10 [ 893.865198] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 893.870043] ? ext4_es_lookup_extent+0x321/0xac0 [ 893.874800] ? lock_acquire+0x170/0x3f0 [ 893.878780] ? lock_acquire+0x170/0x3f0 [ 893.882756] ? ext4_map_blocks+0x623/0x1730 [ 893.887083] ext4_map_blocks+0x675/0x1730 [ 893.891233] ? ext4_issue_zeroout+0x150/0x150 [ 893.895725] ? __ext4_new_inode+0x27c/0x4eb0 [ 893.900252] ext4_getblk+0x98/0x3f0 [ 893.903886] ? ext4_iomap_begin+0x7f0/0x7f0 [ 893.908214] ext4_bread+0x6c/0x1a0 [ 893.911754] ? ext4_getblk+0x3f0/0x3f0 [ 893.915638] ? dquot_initialize_needed+0x240/0x240 [ 893.920570] ext4_append+0x143/0x350 [ 893.924284] ext4_mkdir+0x4c9/0xbd0 [ 893.927917] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 893.932584] ? security_inode_mkdir+0xca/0x100 22:39:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x200, 0x4) 22:39:29 executing program 1: mq_open(0x0, 0x800, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) [ 893.937164] vfs_mkdir+0x463/0x6e0 [ 893.940712] SyS_mkdirat+0x1fd/0x270 [ 893.944422] ? SyS_mknod+0x30/0x30 [ 893.947960] ? fput_many+0xe/0x140 [ 893.951498] ? do_syscall_64+0x4c/0x640 [ 893.955473] ? SyS_mknod+0x30/0x30 [ 893.959105] do_syscall_64+0x1d5/0x640 [ 893.963006] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 893.968189] RIP: 0033:0x7f91fb945317 [ 893.971900] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 893.979608] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 893.986963] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 893.994227] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 894.001485] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 894.008737] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 894.015093] XFS (loop4): Invalid superblock magic number 22:39:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 42) 22:39:30 executing program 1: mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x0, 0x68, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, &(0x7f0000000080)=""/131, 0x83, 0x21, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:30 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) 22:39:30 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), 0x4) 22:39:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 43) 22:39:30 executing program 1: mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x0, 0x0, &(0x7f0000000280)={0x40000000000200, 0x6, 0x0, 0x3}) 22:39:30 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), 0x4) 22:39:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, &(0x7f0000000080)=""/131, 0x83, 0x21, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 894.147668] FAULT_INJECTION: forcing a failure. [ 894.147668] name failslab, interval 1, probability 0, space 0, times 0 [ 894.159654] CPU: 0 PID: 3593 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 894.167540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 894.176890] Call Trace: [ 894.179476] dump_stack+0x1b2/0x281 [ 894.183106] should_fail.cold+0x10a/0x149 [ 894.187263] should_failslab+0xd6/0x130 [ 894.191246] kmem_cache_alloc+0x28e/0x3c0 [ 894.195397] ext4_mb_new_blocks+0x514/0x3db0 [ 894.199812] ? ext4_find_extent+0x6f7/0xbc0 [ 894.204130] ? ext4_ext_search_right+0x2bc/0xaa0 [ 894.208883] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 894.213903] ext4_ext_map_blocks+0x2845/0x6b10 [ 894.218491] ? __lock_acquire+0x5fc/0x3f20 [ 894.222727] ? mark_buffer_dirty+0x95/0x480 [ 894.227049] ? trace_hardirqs_on+0x10/0x10 [ 894.231281] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 894.236652] ? ext4_find_delalloc_cluster+0x180/0x180 [ 894.241843] ? trace_hardirqs_on+0x10/0x10 22:39:30 executing program 1: mq_open(&(0x7f00000000c0)='\xffc\xf3\xf6\xb0\xb3V\x12\x8afB&v\xdf\x8d\x1b\xafF\xf9w\xd9l\xbc\x06\x8c\xbe \xb5\xa5\xe1\xff\f\xee\xafI1\x1b\x9c\xeeqWe\x16\xa8[\xd5*\f|\x85j\xe9,3%<\xd6n|\xcf\xd1\x87\xee\xa8L\xa2\xe6\x8b\xacE7\xd9\x18,k,\x9f\xe9O', 0x0, 0x0, 0x0) 22:39:30 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), 0x4) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000000), 0x4) (async) [ 894.246078] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 894.250926] ? ext4_es_lookup_extent+0x321/0xac0 [ 894.255684] ? lock_acquire+0x170/0x3f0 [ 894.259684] ext4_map_blocks+0x675/0x1730 [ 894.263839] ? ext4_issue_zeroout+0x150/0x150 [ 894.268338] ? __ext4_new_inode+0x27c/0x4eb0 [ 894.272762] ext4_getblk+0x98/0x3f0 [ 894.276392] ? ext4_iomap_begin+0x7f0/0x7f0 [ 894.280813] ext4_bread+0x6c/0x1a0 [ 894.284353] ? ext4_getblk+0x3f0/0x3f0 [ 894.288236] ? dquot_initialize_needed+0x240/0x240 [ 894.293169] ext4_append+0x143/0x350 22:39:30 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, &(0x7f0000000080)=""/131, 0x83, 0x21, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 894.296994] ext4_mkdir+0x4c9/0xbd0 [ 894.300800] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 894.305471] ? security_inode_mkdir+0xca/0x100 [ 894.310049] vfs_mkdir+0x463/0x6e0 [ 894.313589] SyS_mkdirat+0x1fd/0x270 [ 894.317305] ? SyS_mknod+0x30/0x30 [ 894.320844] ? fput_many+0xe/0x140 [ 894.324383] ? do_syscall_64+0x4c/0x640 [ 894.328354] ? SyS_mknod+0x30/0x30 [ 894.331892] do_syscall_64+0x1d5/0x640 [ 894.335784] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 894.340970] RIP: 0033:0x7f91fb945317 [ 894.344671] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 894.352376] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 894.359639] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 894.366906] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 894.374169] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 894.381518] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 894.391706] FAULT_INJECTION: forcing a failure. [ 894.391706] name failslab, interval 1, probability 0, space 0, times 0 [ 894.421787] CPU: 0 PID: 3595 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 894.432639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 894.441993] Call Trace: [ 894.444577] dump_stack+0x1b2/0x281 [ 894.448209] should_fail.cold+0x10a/0x149 [ 894.452463] should_failslab+0xd6/0x130 [ 894.456492] kmem_cache_alloc+0x28e/0x3c0 [ 894.460640] ext4_mb_new_blocks+0x514/0x3db0 [ 894.465054] ? ext4_find_extent+0x6f7/0xbc0 [ 894.469375] ? ext4_ext_search_right+0x2bc/0xaa0 [ 894.474138] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 894.479153] ext4_ext_map_blocks+0x2845/0x6b10 [ 894.483737] ? __lock_acquire+0x5fc/0x3f20 [ 894.487978] ? mark_buffer_dirty+0x95/0x480 [ 894.492299] ? trace_hardirqs_on+0x10/0x10 [ 894.496549] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 894.501992] ? ext4_find_delalloc_cluster+0x180/0x180 [ 894.507278] ? trace_hardirqs_on+0x10/0x10 [ 894.511517] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 894.516360] ? ext4_es_lookup_extent+0x321/0xac0 [ 894.521118] ? lock_acquire+0x170/0x3f0 [ 894.525103] ext4_map_blocks+0x675/0x1730 [ 894.529257] ? ext4_issue_zeroout+0x150/0x150 [ 894.533746] ? __ext4_new_inode+0x27c/0x4eb0 [ 894.538160] ext4_getblk+0x98/0x3f0 [ 894.541785] ? ext4_iomap_begin+0x7f0/0x7f0 [ 894.546101] ext4_bread+0x6c/0x1a0 [ 894.549626] ? ext4_getblk+0x3f0/0x3f0 [ 894.553520] ? dquot_initialize_needed+0x240/0x240 [ 894.558437] ext4_append+0x143/0x350 [ 894.562201] ext4_mkdir+0x4c9/0xbd0 [ 894.565811] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 894.570465] ? security_inode_mkdir+0xca/0x100 [ 894.575087] vfs_mkdir+0x463/0x6e0 [ 894.578615] SyS_mkdirat+0x1fd/0x270 [ 894.582321] ? SyS_mknod+0x30/0x30 [ 894.585857] ? fput_many+0xe/0x140 [ 894.589378] ? do_syscall_64+0x4c/0x640 [ 894.593330] ? SyS_mknod+0x30/0x30 [ 894.596858] do_syscall_64+0x1d5/0x640 [ 894.600770] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 894.605938] RIP: 0033:0x7f2645954317 [ 894.609631] RSP: 002b:00007f26442c9f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 22:39:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 43) 22:39:30 executing program 5: socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000003c0)={{0x0, 0xffffffffffffffff, 0x6, 0x8, 0x0, 0x5, 0x0, 0xf013, 0x34a, 0x2, 0x2b, 0x0, 0xfffffffffffffff9, 0x3d2, 0xfffffffffffffffa}}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x300, 0x70bd2e, 0x3f}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20050884) r2 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00070080ffffffff000000004717005c006500000050907864010100ff7f00ff443cf211000100000000001fac1414bb00000040ac14140b000000020000000100000006ffff0300000000000001010000008001ac14142ffffffff9830b29ac1e0101ac14143500"]}) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@can={{0x2, 0x1, 0x1, 0x1}, 0x4, 0x0, 0x0, 0x0, "b7cb973a9a47216b"}, 0x10}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000084) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r1, &(0x7f0000000080)=""/131, 0x83, 0x21, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:30 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, 0x0) 22:39:30 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000000100)={0x0, 0x0, "88912cf2811ef080f8486350a1bfd4d4bb23b32e6a8b7eedb618a49033fbf35cc85a1a47c494f44fdeddf2cf1a02dba615efc7b3fff54cf42825a203003c16642c8bc8387a3f3e7c84e3897e2bb661d9891a0ed41dd859caae17cf012f84eb5158629981d16d174203581d98939a441da161288317b143986b1f48d9c927cc3f0d7461c60b868a6fba5a960831a66253b9627503c73f9584e7ff4ef95cd93846e2a1aa9f191239673a13c6c4c957dea604313827733bcb2737bae581ac503ceee4f8b2347366f937ab2a29421c7c0afdecadc7958720af03433dd72d0f01b65ba83e12bc0eb656588a66bb12fabf59f18e8ae22722a9a72d98f096347e466e80", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000001100)={{0x0, 0x3, 0x63d, 0xfff, 0x0, 0x7, 0x42, 0x8, 0x0, 0x101, 0x8, 0xfffffffffffffffe, 0x9, 0xaba1, 0x9}, 0x8, [0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001180)={r3, r4, "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", "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"}) bind$netrom(r1, &(0x7f0000000080)={{0x3, @bcast, 0x1}, [@null, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @null]}, 0x48) 22:39:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 44) [ 894.617675] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f2645954317 [ 894.624947] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 894.632198] RBP: 00007f26442ca1d0 R08: 0000000000000000 R09: 00007f26442ca1d0 [ 894.639460] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 894.646718] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:30 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, 0x0) [ 894.760996] FAULT_INJECTION: forcing a failure. [ 894.760996] name failslab, interval 1, probability 0, space 0, times 0 [ 894.772350] CPU: 1 PID: 3645 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 894.780141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 894.789491] Call Trace: [ 894.792077] dump_stack+0x1b2/0x281 [ 894.795710] should_fail.cold+0x10a/0x149 [ 894.799863] should_failslab+0xd6/0x130 [ 894.803930] kmem_cache_alloc+0x40/0x3c0 [ 894.807995] __es_insert_extent+0x338/0x1360 [ 894.812397] ? __es_shrink+0x8c0/0x8c0 [ 894.816279] ? lock_acquire+0x170/0x3f0 [ 894.820252] ? ext4_es_insert_extent+0x11f/0x530 [ 894.824993] ext4_es_insert_extent+0x1b9/0x530 [ 894.829568] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 894.835362] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 894.840812] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 894.846610] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 894.851224] ? __lock_acquire+0x5fc/0x3f20 [ 894.855555] ? __lock_acquire+0x5fc/0x3f20 [ 894.859910] ? mark_buffer_dirty+0x95/0x480 [ 894.864232] ? trace_hardirqs_on+0x10/0x10 [ 894.868494] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 894.873860] ? ext4_find_delalloc_cluster+0x180/0x180 [ 894.879046] ? trace_hardirqs_on+0x10/0x10 [ 894.883279] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 894.888127] ? ext4_es_lookup_extent+0x321/0xac0 [ 894.892886] ? lock_acquire+0x170/0x3f0 [ 894.896863] ? lock_acquire+0x170/0x3f0 [ 894.900843] ? ext4_map_blocks+0x29f/0x1730 [ 894.905175] ext4_map_blocks+0xb19/0x1730 [ 894.909417] ? ext4_issue_zeroout+0x150/0x150 [ 894.913921] ? __ext4_new_inode+0x27c/0x4eb0 [ 894.918333] ext4_getblk+0x98/0x3f0 [ 894.921960] ? ext4_iomap_begin+0x7f0/0x7f0 [ 894.925692] FAULT_INJECTION: forcing a failure. [ 894.925692] name failslab, interval 1, probability 0, space 0, times 0 [ 894.926419] ext4_bread+0x6c/0x1a0 [ 894.941139] ? ext4_getblk+0x3f0/0x3f0 [ 894.945017] ? dquot_initialize_needed+0x240/0x240 [ 894.949940] ext4_append+0x143/0x350 [ 894.953694] ext4_mkdir+0x4c9/0xbd0 [ 894.957312] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 894.961977] ? security_inode_mkdir+0xca/0x100 [ 894.966546] vfs_mkdir+0x463/0x6e0 [ 894.970072] SyS_mkdirat+0x1fd/0x270 [ 894.973771] ? SyS_mknod+0x30/0x30 [ 894.977299] ? fput_many+0xe/0x140 [ 894.980837] ? do_syscall_64+0x4c/0x640 [ 894.984818] ? SyS_mknod+0x30/0x30 [ 894.988478] do_syscall_64+0x1d5/0x640 [ 894.992359] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 894.997531] RIP: 0033:0x7f91fb945317 [ 895.001227] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 22:39:31 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, 0x0) 22:39:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff}) socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$inet(0x2, 0x80000, 0x10) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000140)=0x1, 0x4) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000180)) 22:39:31 executing program 5: socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000003c0)={{0x0, 0xffffffffffffffff, 0x6, 0x8, 0x0, 0x5, 0x0, 0xf013, 0x34a, 0x2, 0x2b, 0x0, 0xfffffffffffffff9, 0x3d2, 0xfffffffffffffffa}}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x300, 0x70bd2e, 0x3f}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20050884) (async) r2 = socket$inet_dccp(0x2, 0x6, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00070080ffffffff000000004717005c006500000050907864010100ff7f00ff443cf211000100000000001fac1414bb00000040ac14140b000000020000000100000006ffff0300000000000001010000008001ac14142ffffffff9830b29ac1e0101ac14143500"]}) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@can={{0x2, 0x1, 0x1, 0x1}, 0x4, 0x0, 0x0, 0x0, "b7cb973a9a47216b"}, 0x10}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000084) (async) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:31 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0, 0x0}) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000013c0)=""/55, &(0x7f0000001400)=0x37) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000003c0)={r2, 0x0, "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", "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"}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000300)=0x5, &(0x7f0000000340)=0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f0000000000)=0xf3, 0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x9, 0x4) pipe2$watch_queue(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$VIDIOC_DECODER_CMD(r5, 0xc0485660, &(0x7f0000001480)={0x0, 0x1, @start={0x8}}) [ 895.008922] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 895.016180] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 895.023450] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 895.030705] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 895.037959] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 895.045228] CPU: 0 PID: 3647 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 895.053020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 895.062471] Call Trace: [ 895.065058] dump_stack+0x1b2/0x281 [ 895.068691] should_fail.cold+0x10a/0x149 [ 895.072842] should_failslab+0xd6/0x130 [ 895.076816] __kmalloc_track_caller+0x2bc/0x400 [ 895.081487] ? strndup_user+0x5b/0xf0 [ 895.085286] memdup_user+0x22/0xa0 [ 895.088826] strndup_user+0x5b/0xf0 [ 895.092449] ? copy_mnt_ns+0xa30/0xa30 [ 895.096334] SyS_mount+0x39/0x120 [ 895.099781] ? copy_mnt_ns+0xa30/0xa30 [ 895.103668] do_syscall_64+0x1d5/0x640 [ 895.107553] entry_SYSCALL_64_after_hwframe+0x46/0xbb 22:39:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) [ 895.112733] RIP: 0033:0x7f264595673a [ 895.116436] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 895.124176] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 895.131435] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 895.139565] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 895.146832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 895.154091] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 44) 22:39:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:31 executing program 5: socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000003c0)={{0x0, 0xffffffffffffffff, 0x6, 0x8, 0x0, 0x5, 0x0, 0xf013, 0x34a, 0x2, 0x2b, 0x0, 0xfffffffffffffff9, 0x3d2, 0xfffffffffffffffa}}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x300, 0x70bd2e, 0x3f}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20050884) (async) r2 = socket$inet_dccp(0x2, 0x6, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00070080ffffffff000000004717005c006500000050907864010100ff7f00ff443cf211000100000000001fac1414bb00000040ac14140b000000020000000100000006ffff0300000000000001010000008001ac14142ffffffff9830b29ac1e0101ac14143500"]}) (async) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@can={{0x2, 0x1, 0x1, 0x1}, 0x4, 0x0, 0x0, 0x0, "b7cb973a9a47216b"}, 0x10}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000084) (async) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff}) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) r3 = socket$inet(0x2, 0x80000, 0x10) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000140)=0x1, 0x4) (async) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000180)) 22:39:31 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0x0, 0x9, 0x182dc3fc, 0x53}) 22:39:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 45) [ 895.217271] XFS (loop2): Invalid superblock magic number 22:39:31 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0x0, 0x9, 0x182dc3fc, 0x53}) 22:39:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) 22:39:31 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{{0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x1, 0x1, 0x1}, {0x3, 0x1, 0x1, 0x1}}], 0x10) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 895.349479] FAULT_INJECTION: forcing a failure. [ 895.349479] name failslab, interval 1, probability 0, space 0, times 0 [ 895.386200] FAULT_INJECTION: forcing a failure. [ 895.386200] name failslab, interval 1, probability 0, space 0, times 0 22:39:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) [ 895.398345] CPU: 0 PID: 3707 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 895.406153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 895.415499] Call Trace: [ 895.418085] dump_stack+0x1b2/0x281 [ 895.421720] should_fail.cold+0x10a/0x149 [ 895.425867] should_failslab+0xd6/0x130 [ 895.429843] kmem_cache_alloc+0x28e/0x3c0 [ 895.433993] ext4_mb_new_blocks+0x514/0x3db0 [ 895.438402] ? ext4_find_extent+0x6f7/0xbc0 [ 895.442717] ? ext4_ext_search_right+0x2bc/0xaa0 22:39:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$nl_generic(0x10, 0x3, 0x10) [ 895.447472] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 895.452487] ext4_ext_map_blocks+0x2845/0x6b10 [ 895.457078] ? __lock_acquire+0x5fc/0x3f20 [ 895.461314] ? mark_buffer_dirty+0x95/0x480 [ 895.465652] ? trace_hardirqs_on+0x10/0x10 [ 895.469877] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 895.475232] ? ext4_find_delalloc_cluster+0x180/0x180 [ 895.480416] ? trace_hardirqs_on+0x10/0x10 [ 895.484641] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 895.489567] ? ext4_es_lookup_extent+0x321/0xac0 [ 895.494320] ? lock_acquire+0x170/0x3f0 22:39:31 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 895.498309] ext4_map_blocks+0x675/0x1730 [ 895.502451] ? ext4_issue_zeroout+0x150/0x150 [ 895.506938] ? __ext4_new_inode+0x27c/0x4eb0 [ 895.511350] ext4_getblk+0x98/0x3f0 [ 895.514972] ? ext4_iomap_begin+0x7f0/0x7f0 [ 895.519291] ext4_bread+0x6c/0x1a0 [ 895.522829] ? ext4_getblk+0x3f0/0x3f0 [ 895.526707] ? dquot_initialize_needed+0x240/0x240 [ 895.531630] ext4_append+0x143/0x350 [ 895.535337] ext4_mkdir+0x4c9/0xbd0 [ 895.538963] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 895.543633] ? security_inode_mkdir+0xca/0x100 [ 895.548213] vfs_mkdir+0x463/0x6e0 [ 895.551748] SyS_mkdirat+0x1fd/0x270 [ 895.555449] ? SyS_mknod+0x30/0x30 [ 895.558977] ? fput_many+0xe/0x140 [ 895.562511] ? do_syscall_64+0x4c/0x640 [ 895.566475] ? SyS_mknod+0x30/0x30 [ 895.570039] do_syscall_64+0x1d5/0x640 [ 895.573925] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 895.579112] RIP: 0033:0x7f91fb945317 [ 895.582816] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 895.590520] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb945317 [ 895.597796] RDX: 00000000000001ff RSI: 0000000020001580 RDI: 00000000ffffff9c [ 895.605057] RBP: 00007f91fa2bb1d0 R08: 0000000000000000 R09: 00007f91fa2bb1d0 [ 895.612317] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000400 [ 895.619586] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 895.627300] CPU: 1 PID: 3716 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 895.635099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 895.644445] Call Trace: [ 895.647033] dump_stack+0x1b2/0x281 [ 895.650659] should_fail.cold+0x10a/0x149 [ 895.654810] should_failslab+0xd6/0x130 [ 895.658796] __kmalloc_track_caller+0x2bc/0x400 [ 895.663454] ? strndup_user+0x5b/0xf0 [ 895.667235] memdup_user+0x22/0xa0 [ 895.670758] strndup_user+0x5b/0xf0 [ 895.674372] ? copy_mnt_ns+0xa30/0xa30 [ 895.678237] SyS_mount+0x68/0x120 [ 895.681669] ? copy_mnt_ns+0xa30/0xa30 [ 895.685550] do_syscall_64+0x1d5/0x640 [ 895.689505] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 895.694689] RIP: 0033:0x7f264595673a 22:39:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 45) 22:39:31 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) 22:39:31 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async, rerun: 32) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{{0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x1, 0x1, 0x1}, {0x3, 0x1, 0x1, 0x1}}], 0x10) (async, rerun: 32) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:31 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0x0, 0x9, 0x182dc3fc, 0x53}) 22:39:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async, rerun: 64) pipe(&(0x7f0000000100)={0xffffffffffffffff}) (async, rerun: 64) socket$inet_dccp(0x2, 0x6, 0x0) (async) r3 = socket$inet(0x2, 0x80000, 0x10) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) (async) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000140)=0x1, 0x4) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000180)) [ 895.698378] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 895.706190] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 895.713541] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 895.720800] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 895.728052] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 895.735371] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 46) 22:39:31 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) 22:39:31 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x0, 0x182dc3fc, 0x53}) 22:39:31 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{{0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x1, 0x1, 0x1}, {0x3, 0x1, 0x1, 0x1}}], 0x10) (async, rerun: 64) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) (rerun: 64) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:31 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 895.862809] FAULT_INJECTION: forcing a failure. [ 895.862809] name failslab, interval 1, probability 0, space 0, times 0 [ 895.883953] FAULT_INJECTION: forcing a failure. [ 895.883953] name failslab, interval 1, probability 0, space 0, times 0 [ 895.904813] CPU: 0 PID: 3773 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 895.912626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 895.921993] Call Trace: [ 895.924585] dump_stack+0x1b2/0x281 [ 895.928214] should_fail.cold+0x10a/0x149 [ 895.932369] should_failslab+0xd6/0x130 [ 895.936359] __kmalloc_track_caller+0x2bc/0x400 [ 895.941068] ? strndup_user+0x5b/0xf0 [ 895.944882] memdup_user+0x22/0xa0 [ 895.948424] strndup_user+0x5b/0xf0 [ 895.952045] ? copy_mnt_ns+0xa30/0xa30 [ 895.955930] SyS_mount+0x68/0x120 [ 895.959374] ? copy_mnt_ns+0xa30/0xa30 [ 895.963262] do_syscall_64+0x1d5/0x640 [ 895.967153] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 895.972353] RIP: 0033:0x7f91fb94773a [ 895.976051] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 895.983753] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 895.991023] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 895.998290] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 896.005554] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 22:39:32 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x0, 0x182dc3fc, 0x53}) [ 896.012811] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 896.032070] CPU: 1 PID: 3767 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 896.039878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 896.049226] Call Trace: [ 896.051902] dump_stack+0x1b2/0x281 [ 896.055529] should_fail.cold+0x10a/0x149 [ 896.059679] should_failslab+0xd6/0x130 22:39:32 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000002c0)=0x4, 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$SNDCTL_SEQ_THRESHOLD(0xffffffffffffffff, 0x4004510d, &(0x7f0000000100)=0x5) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x4) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000040)=0xd8, 0x4) r2 = accept4$netrom(r1, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @bcast, @default, @netrom, @remote, @netrom, @rose, @bcast]}, &(0x7f00000001c0)=0x48, 0x80000) accept4$netrom(r2, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @bcast, @netrom, @remote, @bcast, @remote, @default, @rose]}, &(0x7f0000000280)=0x48, 0x80000) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 896.063654] kmem_cache_alloc_trace+0x29a/0x3d0 [ 896.068320] ? copy_mnt_ns+0xa30/0xa30 [ 896.072211] copy_mount_options+0x59/0x2f0 [ 896.076443] ? copy_mnt_ns+0xa30/0xa30 [ 896.080325] SyS_mount+0x84/0x120 [ 896.083773] ? copy_mnt_ns+0xa30/0xa30 [ 896.087654] do_syscall_64+0x1d5/0x640 [ 896.091545] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 896.096727] RIP: 0033:0x7f264595673a [ 896.100431] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:39:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 46) 22:39:32 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x0, 0x182dc3fc, 0x53}) 22:39:32 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000002c0)=0x4, 0x4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$SNDCTL_SEQ_THRESHOLD(0xffffffffffffffff, 0x4004510d, &(0x7f0000000100)=0x5) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x4) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000040)=0xd8, 0x4) r2 = accept4$netrom(r1, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @bcast, @default, @netrom, @remote, @netrom, @rose, @bcast]}, &(0x7f00000001c0)=0x48, 0x80000) accept4$netrom(r2, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @bcast, @netrom, @remote, @bcast, @remote, @default, @rose]}, &(0x7f0000000280)=0x48, 0x80000) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000002c0)=0x4, 0x4) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_THRESHOLD(0xffffffffffffffff, 0x4004510d, &(0x7f0000000100)=0x5) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x4) (async) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000040)=0xd8, 0x4) (async) accept4$netrom(r1, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @bcast, @default, @netrom, @remote, @netrom, @rose, @bcast]}, &(0x7f00000001c0)=0x48, 0x80000) (async) accept4$netrom(r2, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @bcast, @netrom, @remote, @bcast, @remote, @default, @rose]}, &(0x7f0000000280)=0x48, 0x80000) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) 22:39:32 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000280)=0x8, &(0x7f0000000340)=0x4) socket$l2tp(0x2, 0x2, 0x73) socket$inet(0x2, 0x1, 0x80000001) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x80, 0x8000, 0x3, 0x4, {{0x23, 0x4, 0x3, 0x4, 0x8c, 0x68, 0x0, 0x81, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@noop, @timestamp_addr={0x44, 0x2c, 0xcf, 0x1, 0x5, [{@loopback, 0x9000}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x37}, 0x70319070}, {@private=0xa010102, 0xffffffd7}]}, @timestamp_prespec={0x44, 0x34, 0xc6, 0x3, 0x2, [{@broadcast, 0x1000}, {@rand_addr=0x64010102, 0x4}, {@broadcast, 0x3}, {@rand_addr=0x64010102, 0x101}, {@private=0xa010100, 0xfffffffb}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x2}]}, @ssrr={0x89, 0x17, 0xb8, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast2, @private=0xa010100]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'erspan0\x00', r3, 0x700, 0x10, 0x3db, 0xfffffffb, {{0x12, 0x4, 0x3, 0x6, 0x48, 0x67, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@noop, @timestamp_addr={0x44, 0x24, 0x56, 0x1, 0xb, [{@remote, 0x6}, {@remote, 0x6}, {@local, 0x1}, {@private=0xa010101, 0x5}]}, @end, @noop, @generic={0x86, 0x7, "4cc037cb40"}, @end, @generic={0x94, 0x2}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x84, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x20b}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffeffffffff}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'pimreg1\x00'}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x4004014) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000000)=0xffffffffffffffe0) 22:39:32 executing program 1: socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 896.108133] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 896.115400] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 896.122679] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 896.129948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 896.137216] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 47) 22:39:32 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x0, 0x53}) 22:39:32 executing program 1: socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) 22:39:32 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000280)=0x8, &(0x7f0000000340)=0x4) (async) socket$l2tp(0x2, 0x2, 0x73) socket$inet(0x2, 0x1, 0x80000001) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x80, 0x8000, 0x3, 0x4, {{0x23, 0x4, 0x3, 0x4, 0x8c, 0x68, 0x0, 0x81, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@noop, @timestamp_addr={0x44, 0x2c, 0xcf, 0x1, 0x5, [{@loopback, 0x9000}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x37}, 0x70319070}, {@private=0xa010102, 0xffffffd7}]}, @timestamp_prespec={0x44, 0x34, 0xc6, 0x3, 0x2, [{@broadcast, 0x1000}, {@rand_addr=0x64010102, 0x4}, {@broadcast, 0x3}, {@rand_addr=0x64010102, 0x101}, {@private=0xa010100, 0xfffffffb}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x2}]}, @ssrr={0x89, 0x17, 0xb8, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast2, @private=0xa010100]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'erspan0\x00', r3, 0x700, 0x10, 0x3db, 0xfffffffb, {{0x12, 0x4, 0x3, 0x6, 0x48, 0x67, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@noop, @timestamp_addr={0x44, 0x24, 0x56, 0x1, 0xb, [{@remote, 0x6}, {@remote, 0x6}, {@local, 0x1}, {@private=0xa010101, 0x5}]}, @end, @noop, @generic={0x86, 0x7, "4cc037cb40"}, @end, @generic={0x94, 0x2}]}}}}}) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x84, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x20b}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffeffffffff}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'pimreg1\x00'}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x4004014) (async) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000000)=0xffffffffffffffe0) [ 896.275036] FAULT_INJECTION: forcing a failure. [ 896.275036] name failslab, interval 1, probability 0, space 0, times 0 [ 896.312354] CPU: 0 PID: 3827 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 896.319540] FAULT_INJECTION: forcing a failure. [ 896.319540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 896.320166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 896.341290] Call Trace: [ 896.343880] dump_stack+0x1b2/0x281 [ 896.347491] should_fail.cold+0x10a/0x149 [ 896.351624] should_failslab+0xd6/0x130 [ 896.355578] __kmalloc_track_caller+0x2bc/0x400 [ 896.360227] ? strndup_user+0x5b/0xf0 [ 896.364009] memdup_user+0x22/0xa0 [ 896.367528] strndup_user+0x5b/0xf0 [ 896.371136] ? copy_mnt_ns+0xa30/0xa30 [ 896.375137] SyS_mount+0x68/0x120 [ 896.378578] ? copy_mnt_ns+0xa30/0xa30 [ 896.382450] do_syscall_64+0x1d5/0x640 [ 896.386320] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 896.391489] RIP: 0033:0x7f91fb94773a [ 896.395181] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 896.402869] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 896.410209] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 896.417456] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 22:39:32 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000002c0)=0x4, 0x4) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$SNDCTL_SEQ_THRESHOLD(0xffffffffffffffff, 0x4004510d, &(0x7f0000000100)=0x5) (async) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x4) (async) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000040)=0xd8, 0x4) (async) r2 = accept4$netrom(r1, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @bcast, @default, @netrom, @remote, @netrom, @rose, @bcast]}, &(0x7f00000001c0)=0x48, 0x80000) accept4$netrom(r2, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @bcast, @netrom, @remote, @bcast, @remote, @default, @rose]}, &(0x7f0000000280)=0x48, 0x80000) (async, rerun: 32) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (rerun: 32) 22:39:32 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x0, 0x53}) [ 896.424707] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 896.431954] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 896.439228] CPU: 1 PID: 3848 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 896.447022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 896.456371] Call Trace: [ 896.458963] dump_stack+0x1b2/0x281 [ 896.462598] should_fail.cold+0x10a/0x149 [ 896.466753] __alloc_pages_nodemask+0x22c/0x2720 [ 896.471535] ? __save_stack_trace+0x63/0x160 22:39:32 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x0, 0x53}) [ 896.476120] ? is_bpf_text_address+0x91/0x150 [ 896.480623] ? __lock_acquire+0x5fc/0x3f20 [ 896.484862] ? cmp_ex_sort+0xb0/0xb0 [ 896.488582] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 896.493425] ? search_extable+0x6f/0x80 [ 896.497401] ? trim_init_extable+0x280/0x280 [ 896.501810] ? __kernel_text_address+0x9/0x30 [ 896.506303] ? copy_mount_options+0x194/0x2f0 [ 896.510800] ? fixup_exception+0x93/0xd0 [ 896.514860] ? no_context+0x9c/0x7c0 [ 896.518813] ? force_sig_info_fault.constprop.0+0x260/0x260 [ 896.524529] ? bad_area_access_error+0x1f8/0x3e0 [ 896.529288] cache_grow_begin+0x91/0x700 [ 896.533354] ? fs_reclaim_release+0xd0/0x110 [ 896.537791] ? check_preemption_disabled+0x35/0x240 [ 896.542991] cache_alloc_refill+0x273/0x350 [ 896.547319] kmem_cache_alloc+0x333/0x3c0 [ 896.551474] getname_flags+0xc8/0x550 [ 896.555272] ? __do_page_fault+0x159/0xad0 [ 896.559506] user_path_at_empty+0x2a/0x50 [ 896.563654] do_mount+0x118/0x2a30 [ 896.567196] ? __do_page_fault+0x159/0xad0 [ 896.571434] ? retint_kernel+0x2d/0x2d [ 896.575420] ? copy_mount_string+0x40/0x40 [ 896.579655] ? memset+0x20/0x40 [ 896.582934] ? copy_mount_options+0x1fa/0x2f0 [ 896.587424] ? copy_mnt_ns+0xa30/0xa30 [ 896.591312] SyS_mount+0xa8/0x120 [ 896.594772] ? copy_mnt_ns+0xa30/0xa30 [ 896.598661] do_syscall_64+0x1d5/0x640 [ 896.602600] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 896.607796] RIP: 0033:0x7f264595673a [ 896.611501] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 896.619208] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a 22:39:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 47) 22:39:32 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc}) 22:39:32 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, 0xfffffffffffffffa, 0x1) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:32 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000280)=0x8, &(0x7f0000000340)=0x4) (async) socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 32) socket$inet(0x2, 0x1, 0x80000001) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x80, 0x8000, 0x3, 0x4, {{0x23, 0x4, 0x3, 0x4, 0x8c, 0x68, 0x0, 0x81, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@noop, @timestamp_addr={0x44, 0x2c, 0xcf, 0x1, 0x5, [{@loopback, 0x9000}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x37}, 0x70319070}, {@private=0xa010102, 0xffffffd7}]}, @timestamp_prespec={0x44, 0x34, 0xc6, 0x3, 0x2, [{@broadcast, 0x1000}, {@rand_addr=0x64010102, 0x4}, {@broadcast, 0x3}, {@rand_addr=0x64010102, 0x101}, {@private=0xa010100, 0xfffffffb}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x2}]}, @ssrr={0x89, 0x17, 0xb8, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast2, @private=0xa010100]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'erspan0\x00', r3, 0x700, 0x10, 0x3db, 0xfffffffb, {{0x12, 0x4, 0x3, 0x6, 0x48, 0x67, 0x0, 0x2, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@noop, @timestamp_addr={0x44, 0x24, 0x56, 0x1, 0xb, [{@remote, 0x6}, {@remote, 0x6}, {@local, 0x1}, {@private=0xa010101, 0x5}]}, @end, @noop, @generic={0x86, 0x7, "4cc037cb40"}, @end, @generic={0x94, 0x2}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r4, 0x65, 0x6, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x84, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x20b}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xfffffffeffffffff}, @L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'pimreg1\x00'}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x4004014) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000000)=0xffffffffffffffe0) 22:39:32 executing program 1: socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 896.626484] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 896.633773] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 896.641044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 896.648312] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 896.729737] XFS (loop4): Invalid superblock magic number [ 896.786453] FAULT_INJECTION: forcing a failure. [ 896.786453] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 896.798273] CPU: 0 PID: 3908 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 896.806064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 896.815417] Call Trace: [ 896.818008] dump_stack+0x1b2/0x281 [ 896.821640] should_fail.cold+0x10a/0x149 [ 896.825794] __alloc_pages_nodemask+0x22c/0x2720 [ 896.830910] ? __lock_acquire+0x5fc/0x3f20 [ 896.835165] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 896.840007] ? trace_hardirqs_on+0x10/0x10 [ 896.844240] ? trace_hardirqs_on+0x10/0x10 [ 896.848592] ? reacquire_held_locks+0xb5/0x3f0 [ 896.853177] ? dput.part.0+0x3b4/0x710 [ 896.857064] ? list_lru_add+0x22a/0x490 [ 896.861039] cache_grow_begin+0x91/0x700 [ 896.865096] ? fs_reclaim_release+0xd0/0x110 [ 896.869593] ? check_preemption_disabled+0x35/0x240 [ 896.874614] cache_alloc_refill+0x273/0x350 [ 896.878941] kmem_cache_alloc_trace+0x340/0x3d0 [ 896.883604] ? copy_mnt_ns+0xa30/0xa30 [ 896.887487] copy_mount_options+0x59/0x2f0 [ 896.891716] ? copy_mnt_ns+0xa30/0xa30 [ 896.895606] SyS_mount+0x84/0x120 [ 896.899056] ? copy_mnt_ns+0xa30/0xa30 [ 896.902952] do_syscall_64+0x1d5/0x640 [ 896.906844] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 896.912025] RIP: 0033:0x7f91fb94773a [ 896.915753] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 896.923499] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a 22:39:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 48) 22:39:32 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc}) 22:39:32 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, 0xfffffffffffffffa, 0x1) (async) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:32 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:39:32 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c004400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge_slave_0\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3b}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffff7fff}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 896.930771] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 896.938039] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 896.945309] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 896.952577] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 896.965752] FAULT_INJECTION: forcing a failure. [ 896.965752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 896.977566] CPU: 1 PID: 3936 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 22:39:33 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc}) 22:39:33 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) [ 896.985477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 896.994828] Call Trace: [ 896.997541] dump_stack+0x1b2/0x281 [ 897.001174] should_fail.cold+0x10a/0x149 [ 897.005326] __alloc_pages_nodemask+0x22c/0x2720 [ 897.010091] ? __lock_acquire+0x5fc/0x3f20 [ 897.014331] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 897.019265] ? trace_hardirqs_on+0x10/0x10 [ 897.023499] ? trace_hardirqs_on+0x10/0x10 [ 897.027745] ? reacquire_held_locks+0xb5/0x3f0 [ 897.032327] ? dput.part.0+0x3b4/0x710 [ 897.036221] ? list_lru_add+0x22a/0x490 [ 897.040202] cache_grow_begin+0x91/0x700 [ 897.044263] ? fs_reclaim_release+0xd0/0x110 [ 897.048670] ? check_preemption_disabled+0x35/0x240 [ 897.053694] cache_alloc_refill+0x273/0x350 [ 897.058027] kmem_cache_alloc_trace+0x340/0x3d0 [ 897.062789] ? copy_mnt_ns+0xa30/0xa30 [ 897.066683] copy_mount_options+0x59/0x2f0 [ 897.070914] ? copy_mnt_ns+0xa30/0xa30 [ 897.074806] SyS_mount+0x84/0x120 [ 897.078261] ? copy_mnt_ns+0xa30/0xa30 [ 897.082147] do_syscall_64+0x1d5/0x640 [ 897.086037] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 897.091219] RIP: 0033:0x7f264595673a [ 897.094919] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.102625] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 897.109894] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 897.117165] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 897.124434] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 897.131707] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 897.162881] XFS (loop2): Invalid superblock magic number 22:39:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 48) 22:39:33 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:39:33 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x0, 0x53}) 22:39:33 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, 0xfffffffffffffffa, 0x1) (async) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:33 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c004400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge_slave_0\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3b}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffff7fff}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) socket$l2tp(0x2, 0x2, 0x73) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c004400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge_slave_0\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3b}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffff7fff}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) 22:39:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 49) [ 897.211126] XFS (loop4): Invalid superblock magic number 22:39:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000040)={{0x3, @default}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000240)) 22:39:33 executing program 0: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{{0x1}, {0x0, 0x1, 0x1, 0x1}}, {{0x1, 0x1, 0x1}, {0x3, 0x1, 0x1, 0x1}}], 0x10) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) r2 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) 22:39:33 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000080)={{0x0, 0x8000, 0x2, 0x2, 0x5f6f, 0x2, 0x2, 0x5, 0x7, 0x3, 0x10, 0x95, 0x4, 0x6, 0x8000000000000000}}) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x40, &(0x7f0000001080)=0x4) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fddbdf2508000000050005000100000006001d000900000006000300040a000008000a00010000000c001600c5f2fffffeffffff06001c00008000001400060000000000000031000000000000000000"], 0x5c}}, 0x18040) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$inet(0x2, 0x800, 0x8) bind$can_raw(r3, &(0x7f0000001400), 0x10) recvmsg$can_raw(r3, &(0x7f0000001340)={&(0x7f00000010c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001140)=""/195, 0xc3}, {&(0x7f0000001240)=""/57, 0x39}, {&(0x7f0000001280)=""/107, 0x6b}], 0x3}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000001640)={'ip6_vti0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x6, 0xfffffffe, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x20, 0x40, 0x80000000, 0x3f}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000001780)={'gretap0\x00', &(0x7f0000001680)={'syztnl0\x00', r5, 0x8, 0x7, 0x3ff, 0x0, {{0x31, 0x4, 0x2, 0x3, 0xc4, 0x65, 0x0, 0x4, 0x4, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp={0x44, 0x14, 0xf6, 0x0, 0xc, [0x9, 0x7, 0x401, 0x40]}, @timestamp_addr={0x44, 0x14, 0x73, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x10001}, {@remote, 0x3f}]}, @noop, @timestamp_addr={0x44, 0x2c, 0x3c, 0x1, 0x0, [{@loopback, 0x5}, {@loopback, 0x2cc2}, {@empty, 0x741d}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x40}]}, @timestamp_prespec={0x44, 0x54, 0x36, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x12}, 0x9}, {@rand_addr=0x64010101, 0x2c5}, {@local, 0x1}, {@multicast2, 0x3}, {@loopback}, {@remote, 0xfffffffb}, {@local, 0x200}, {@loopback, 0x2}, {@multicast1}, {@remote, 0x3}]}, @ra={0x94, 0x4}]}}}}}) [ 897.306911] FAULT_INJECTION: forcing a failure. [ 897.306911] name failslab, interval 1, probability 0, space 0, times 0 [ 897.336351] CPU: 1 PID: 3992 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 897.344169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 897.353522] Call Trace: [ 897.356119] dump_stack+0x1b2/0x281 [ 897.359753] should_fail.cold+0x10a/0x149 [ 897.363909] should_failslab+0xd6/0x130 [ 897.367896] kmem_cache_alloc+0x28e/0x3c0 [ 897.372049] alloc_vfsmnt+0x23/0x7f0 [ 897.375771] ? _raw_read_unlock+0x29/0x40 [ 897.379925] vfs_kern_mount.part.0+0x27/0x470 [ 897.384423] do_mount+0xe65/0x2a30 [ 897.387965] ? __do_page_fault+0x159/0xad0 [ 897.392195] ? retint_kernel+0x2d/0x2d [ 897.396087] ? copy_mount_string+0x40/0x40 [ 897.400321] ? memset+0x20/0x40 [ 897.403607] ? copy_mount_options+0x1fa/0x2f0 [ 897.408189] ? copy_mnt_ns+0xa30/0xa30 [ 897.412078] SyS_mount+0xa8/0x120 [ 897.415528] ? copy_mnt_ns+0xa30/0xa30 [ 897.419415] do_syscall_64+0x1d5/0x640 [ 897.423310] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 897.428493] RIP: 0033:0x7f91fb94773a [ 897.432194] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.439907] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 897.442107] FAULT_INJECTION: forcing a failure. 22:39:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000040)={{0x3, @default}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000240)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) connect$netrom(r0, &(0x7f0000000040)={{0x3, @default}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000240)) (async) 22:39:33 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c004400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge_slave_0\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3b}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffff7fff}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) socket$l2tp(0x2, 0x2, 0x73) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8c004400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bridge_slave_0\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3b}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xffffffffffff7fff}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) 22:39:33 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x5a) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$alg(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) [ 897.442107] name failslab, interval 1, probability 0, space 0, times 0 [ 897.447171] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 897.447178] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 897.447182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 897.447188] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 49) 22:39:33 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r0, 0x5a) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$alg(r2, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 22:39:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000040)={{0x3, @default}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000240)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) connect$netrom(r0, &(0x7f0000000040)={{0x3, @default}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000240)) (async) 22:39:33 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x40) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x4) bind$can_raw(r2, &(0x7f0000000000), 0x10) 22:39:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x6, 0x20}, {0x4, 0xb7}, 0x20, 0x4, 0x1f}) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 897.606832] CPU: 1 PID: 3999 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 897.614662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 897.623497] FAULT_INJECTION: forcing a failure. [ 897.623497] name failslab, interval 1, probability 0, space 0, times 0 [ 897.624013] Call Trace: [ 897.637779] dump_stack+0x1b2/0x281 [ 897.641409] should_fail.cold+0x10a/0x149 [ 897.645563] should_failslab+0xd6/0x130 [ 897.649627] kmem_cache_alloc+0x28e/0x3c0 [ 897.654031] getname_flags+0xc8/0x550 [ 897.657824] ? __do_page_fault+0x159/0xad0 [ 897.662050] user_path_at_empty+0x2a/0x50 [ 897.666185] do_mount+0x118/0x2a30 [ 897.669718] ? __do_page_fault+0x159/0xad0 [ 897.673948] ? retint_kernel+0x2d/0x2d [ 897.677828] ? copy_mount_string+0x40/0x40 [ 897.682068] ? memset+0x20/0x40 [ 897.685346] ? copy_mount_options+0x1fa/0x2f0 [ 897.689836] ? copy_mnt_ns+0xa30/0xa30 [ 897.693710] SyS_mount+0xa8/0x120 [ 897.697146] ? copy_mnt_ns+0xa30/0xa30 [ 897.701019] do_syscall_64+0x1d5/0x640 [ 897.704902] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 897.710078] RIP: 0033:0x7f264595673a [ 897.713777] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.721489] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 897.728743] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 897.736015] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 897.743267] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 897.750519] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 897.757785] CPU: 0 PID: 4045 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 897.765581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 897.774931] Call Trace: [ 897.777527] dump_stack+0x1b2/0x281 [ 897.781157] should_fail.cold+0x10a/0x149 [ 897.785308] should_failslab+0xd6/0x130 [ 897.789280] kmem_cache_alloc+0x28e/0x3c0 [ 897.793436] alloc_vfsmnt+0x23/0x7f0 [ 897.797144] ? _raw_read_unlock+0x29/0x40 [ 897.801290] vfs_kern_mount.part.0+0x27/0x470 [ 897.805786] do_mount+0xe65/0x2a30 [ 897.809355] ? __do_page_fault+0x159/0xad0 [ 897.813592] ? retint_kernel+0x2d/0x2d [ 897.817514] ? copy_mount_string+0x40/0x40 [ 897.821751] ? memset+0x20/0x40 [ 897.825028] ? copy_mount_options+0x1fa/0x2f0 [ 897.829523] ? copy_mnt_ns+0xa30/0xa30 [ 897.833405] SyS_mount+0xa8/0x120 [ 897.836850] ? copy_mnt_ns+0xa30/0xa30 [ 897.840744] do_syscall_64+0x1d5/0x640 [ 897.844638] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 897.849820] RIP: 0033:0x7f91fb94773a 22:39:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 50) 22:39:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x6, 0x20}, {0x4, 0xb7}, 0x20, 0x4, 0x1f}) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:33 executing program 0: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'wlan1\x00'}}, 0x1e) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000040)=0x1, 0x4) [ 897.853549] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.861253] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 897.868514] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 897.875762] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 897.883011] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 897.890258] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 898.004667] FAULT_INJECTION: forcing a failure. [ 898.004667] name failslab, interval 1, probability 0, space 0, times 0 [ 898.016626] CPU: 0 PID: 4073 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 898.024566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 898.033929] Call Trace: [ 898.036517] dump_stack+0x1b2/0x281 [ 898.040281] should_fail.cold+0x10a/0x149 [ 898.044440] should_failslab+0xd6/0x130 [ 898.048446] kmem_cache_alloc+0x28e/0x3c0 [ 898.052593] getname_flags+0xc8/0x550 [ 898.056381] ? __do_page_fault+0x159/0xad0 [ 898.060605] user_path_at_empty+0x2a/0x50 [ 898.064740] do_mount+0x118/0x2a30 [ 898.068281] ? __do_page_fault+0x159/0xad0 [ 898.072507] ? retint_kernel+0x2d/0x2d [ 898.076376] ? copy_mount_string+0x40/0x40 [ 898.080597] ? memset+0x20/0x40 [ 898.083863] ? copy_mount_options+0x1fa/0x2f0 [ 898.088349] ? copy_mnt_ns+0xa30/0xa30 [ 898.092224] SyS_mount+0xa8/0x120 [ 898.095657] ? copy_mnt_ns+0xa30/0xa30 [ 898.099527] do_syscall_64+0x1d5/0x640 [ 898.103399] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.108569] RIP: 0033:0x7f264595673a [ 898.112258] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 898.119950] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 898.127211] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 898.134467] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 898.141715] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 898.148967] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:34 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) (fail_nth: 1) 22:39:34 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x40) (async) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x4) (async) bind$can_raw(r2, &(0x7f0000000000), 0x10) 22:39:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 50) 22:39:34 executing program 0: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@pqnoenforce}], [{@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ',@+'}}]}) 22:39:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x6, 0x20}, {0x4, 0xb7}, 0x20, 0x4, 0x1f}) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 51) [ 898.258732] FAULT_INJECTION: forcing a failure. [ 898.258732] name failslab, interval 1, probability 0, space 0, times 0 [ 898.273793] FAULT_INJECTION: forcing a failure. [ 898.273793] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 898.285605] CPU: 0 PID: 4102 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 898.293402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 898.302752] Call Trace: [ 898.305338] dump_stack+0x1b2/0x281 [ 898.308970] should_fail.cold+0x10a/0x149 [ 898.313119] __alloc_pages_nodemask+0x22c/0x2720 [ 898.317890] ? __save_stack_trace+0x63/0x160 [ 898.322298] ? is_bpf_text_address+0x91/0x150 [ 898.326796] ? __lock_acquire+0x5fc/0x3f20 [ 898.331030] ? cmp_ex_sort+0xb0/0xb0 [ 898.334748] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 898.339585] ? search_extable+0x6f/0x80 [ 898.343552] ? trim_init_extable+0x280/0x280 [ 898.347959] ? __kernel_text_address+0x9/0x30 [ 898.352449] ? copy_mount_options+0x194/0x2f0 22:39:34 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x40) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x4) bind$can_raw(r2, &(0x7f0000000000), 0x10) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x840}, 0x40) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) sendmsg$can_raw(r2, &(0x7f0000000200)={&(0x7f0000000140), 0x10, &(0x7f00000001c0)={0x0}}, 0x0) (async) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x4) (async) bind$can_raw(r2, &(0x7f0000000000), 0x10) (async) [ 898.356943] ? fixup_exception+0x93/0xd0 [ 898.361004] ? no_context+0x9c/0x7c0 [ 898.364723] ? force_sig_info_fault.constprop.0+0x260/0x260 [ 898.370431] ? bad_area_access_error+0x1f8/0x3e0 [ 898.375283] cache_grow_begin+0x91/0x700 [ 898.379338] ? fs_reclaim_release+0xd0/0x110 [ 898.383744] ? check_preemption_disabled+0x35/0x240 [ 898.390405] cache_alloc_refill+0x273/0x350 [ 898.394731] kmem_cache_alloc+0x333/0x3c0 [ 898.398885] getname_flags+0xc8/0x550 [ 898.402686] ? __do_page_fault+0x159/0xad0 22:39:34 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x1f, 0xff, 0x7ff, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x8000, 0x7800, 0x57e, 0xfffff001}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x80, 0x40, 0xb2, 0x7, {{0x6, 0x4, 0x0, 0x4, 0x18, 0x66, 0x0, 0x5, 0x4, 0x0, @private=0xa010102, @broadcast, {[@generic={0x43d8c1659c07dd09, 0x2}]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x7, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 22:39:34 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x1f, 0xff, 0x7ff, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x8000, 0x7800, 0x57e, 0xfffff001}}) (rerun: 64) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x80, 0x40, 0xb2, 0x7, {{0x6, 0x4, 0x0, 0x4, 0x18, 0x66, 0x0, 0x5, 0x4, 0x0, @private=0xa010102, @broadcast, {[@generic={0x43d8c1659c07dd09, 0x2}]}}}}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async, rerun: 32) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x7, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) (rerun: 32) [ 898.406921] user_path_at_empty+0x2a/0x50 [ 898.411064] do_mount+0x118/0x2a30 [ 898.414608] ? __do_page_fault+0x159/0xad0 [ 898.418845] ? retint_kernel+0x2d/0x2d [ 898.422731] ? copy_mount_string+0x40/0x40 [ 898.426974] ? memset+0x20/0x40 [ 898.430337] ? copy_mount_options+0x1fa/0x2f0 [ 898.434911] ? copy_mnt_ns+0xa30/0xa30 [ 898.438797] SyS_mount+0xa8/0x120 [ 898.442247] ? copy_mnt_ns+0xa30/0xa30 [ 898.446129] do_syscall_64+0x1d5/0x640 [ 898.450019] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.455197] RIP: 0033:0x7f264595673a [ 898.458899] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 898.462149] XFS (loop0): unknown mount option [euid<00000000000000060928]. [ 898.466598] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 898.466604] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 898.466609] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 898.466615] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 22:39:34 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000140)) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000080)={0x3ff, "1350e79fa094eb8dc84ebbe9f4484475035c9ab37f17359dd9f201d9905d1d56", 0x2, 0x1}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @multicast2, @local}, &(0x7f0000000380)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @initdev, @loopback}, &(0x7f0000000100)=0xc) 22:39:34 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x57) [ 898.466621] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 898.523562] CPU: 1 PID: 4100 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 898.531380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 898.540730] Call Trace: [ 898.543317] dump_stack+0x1b2/0x281 [ 898.546956] should_fail.cold+0x10a/0x149 [ 898.551279] should_failslab+0xd6/0x130 [ 898.555345] __kmalloc_track_caller+0x2bc/0x400 22:39:34 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x1f, 0xff, 0x7ff, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x8000, 0x7800, 0x57e, 0xfffff001}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x80, 0x40, 0xb2, 0x7, {{0x6, 0x4, 0x0, 0x4, 0x18, 0x66, 0x0, 0x5, 0x4, 0x0, @private=0xa010102, @broadcast, {[@generic={0x43d8c1659c07dd09, 0x2}]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x7, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) socket$l2tp(0x2, 0x2, 0x73) (async) pipe(&(0x7f0000000000)) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x4, 0x1f, 0xff, 0x7ff, 0x10, @loopback, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x8000, 0x7800, 0x57e, 0xfffff001}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000140)={'tunl0\x00', r2, 0x80, 0x40, 0xb2, 0x7, {{0x6, 0x4, 0x0, 0x4, 0x18, 0x66, 0x0, 0x5, 0x4, 0x0, @private=0xa010102, @broadcast, {[@generic={0x43d8c1659c07dd09, 0x2}]}}}}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x7, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) (async) 22:39:34 executing program 5: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x810802, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 898.560011] ? kstrdup_const+0x35/0x60 [ 898.563898] ? lock_downgrade+0x740/0x740 [ 898.568045] kstrdup+0x36/0x70 [ 898.571329] kstrdup_const+0x35/0x60 [ 898.575039] alloc_vfsmnt+0xe0/0x7f0 [ 898.578749] ? _raw_read_unlock+0x29/0x40 [ 898.582897] vfs_kern_mount.part.0+0x27/0x470 [ 898.587395] do_mount+0xe65/0x2a30 [ 898.590936] ? __do_page_fault+0x159/0xad0 [ 898.595168] ? retint_kernel+0x2d/0x2d [ 898.599057] ? copy_mount_string+0x40/0x40 [ 898.603294] ? memset+0x20/0x40 22:39:34 executing program 5: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x810802, 0x0) (async) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) [ 898.606574] ? copy_mount_options+0x1fa/0x2f0 [ 898.611068] ? copy_mnt_ns+0xa30/0xa30 [ 898.614954] SyS_mount+0xa8/0x120 [ 898.618401] ? copy_mnt_ns+0xa30/0xa30 [ 898.622288] do_syscall_64+0x1d5/0x640 [ 898.626195] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.631375] RIP: 0033:0x7f91fb94773a [ 898.635080] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 898.642783] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 898.650050] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 898.657321] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 898.664676] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 898.671943] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 898.692175] XFS (loop4): Invalid superblock magic number 22:39:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 52) 22:39:34 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) (fail_nth: 1) 22:39:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 51) 22:39:34 executing program 5: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x810802, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) (async) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x810802, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) 22:39:34 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000140)) (async) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000080)={0x3ff, "1350e79fa094eb8dc84ebbe9f4484475035c9ab37f17359dd9f201d9905d1d56", 0x2, 0x1}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @multicast2, @local}, &(0x7f0000000380)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @initdev, @loopback}, &(0x7f0000000100)=0xc) 22:39:34 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x57) 22:39:34 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x57) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x57) (async) 22:39:34 executing program 5: socket$l2tp(0x2, 0x2, 0x73) [ 898.828305] FAULT_INJECTION: forcing a failure. [ 898.828305] name failslab, interval 1, probability 0, space 0, times 0 [ 898.849609] FAULT_INJECTION: forcing a failure. [ 898.849609] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 898.864734] FAULT_INJECTION: forcing a failure. [ 898.864734] name failslab, interval 1, probability 0, space 0, times 0 22:39:34 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000140)) (async) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000080)={0x3ff, "1350e79fa094eb8dc84ebbe9f4484475035c9ab37f17359dd9f201d9905d1d56", 0x2, 0x1}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @multicast2, @local}, &(0x7f0000000380)=0xc) (async, rerun: 32) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) (async, rerun: 32) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @initdev, @loopback}, &(0x7f0000000100)=0xc) [ 898.868329] CPU: 1 PID: 4201 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 898.883764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 898.893116] Call Trace: [ 898.895713] dump_stack+0x1b2/0x281 [ 898.899346] should_fail.cold+0x10a/0x149 [ 898.903496] should_failslab+0xd6/0x130 [ 898.907470] __kmalloc_track_caller+0x2bc/0x400 [ 898.912138] ? kstrdup_const+0x35/0x60 [ 898.916022] ? lock_downgrade+0x740/0x740 [ 898.920161] kstrdup+0x36/0x70 [ 898.923340] kstrdup_const+0x35/0x60 [ 898.927200] alloc_vfsmnt+0xe0/0x7f0 [ 898.930903] ? _raw_read_unlock+0x29/0x40 [ 898.935042] vfs_kern_mount.part.0+0x27/0x470 [ 898.939652] do_mount+0xe65/0x2a30 [ 898.943195] ? __do_page_fault+0x159/0xad0 [ 898.947427] ? retint_kernel+0x2d/0x2d [ 898.951324] ? copy_mount_string+0x40/0x40 [ 898.955560] ? memset+0x20/0x40 [ 898.958919] ? copy_mount_options+0x1fa/0x2f0 [ 898.963412] ? copy_mnt_ns+0xa30/0xa30 [ 898.967296] SyS_mount+0xa8/0x120 [ 898.970737] ? copy_mnt_ns+0xa30/0xa30 [ 898.974620] do_syscall_64+0x1d5/0x640 [ 898.978519] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 898.983699] RIP: 0033:0x7f264595673a [ 898.987403] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 898.995120] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 899.002385] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 899.009661] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 899.016929] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 899.024222] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 899.031506] CPU: 0 PID: 4211 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 899.039304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 899.048653] Call Trace: [ 899.051242] dump_stack+0x1b2/0x281 [ 899.054867] should_fail.cold+0x10a/0x149 [ 899.059004] should_failslab+0xd6/0x130 [ 899.062969] kmem_cache_alloc+0x28e/0x3c0 [ 899.067101] getname_flags+0xc8/0x550 [ 899.070891] do_mq_open+0x182/0xa00 [ 899.074500] ? do_open+0x150/0x150 [ 899.078021] ? lock_downgrade+0x740/0x740 [ 899.082152] ? __might_fault+0x177/0x1b0 [ 899.086212] SyS_mq_open+0x99/0xe0 [ 899.089746] ? do_mq_timedsend+0xb50/0xb50 [ 899.093972] ? do_syscall_64+0x4c/0x640 [ 899.097935] ? do_mq_timedsend+0xb50/0xb50 [ 899.102245] do_syscall_64+0x1d5/0x640 [ 899.106118] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.111287] RIP: 0033:0x7ffa78536209 [ 899.114978] RSP: 002b:00007ffa76eab168 EFLAGS: 00000246 ORIG_RAX: 00000000000000f0 22:39:35 executing program 5: socket$l2tp(0x2, 0x2, 0x73) 22:39:35 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getitimer(0x2, &(0x7f0000000000)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 899.122664] RAX: ffffffffffffffda RBX: 00007ffa78648f60 RCX: 00007ffa78536209 [ 899.130083] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000000020000000 [ 899.137334] RBP: 00007ffa76eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 899.144583] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 899.151832] R13: 00007ffd4b1b8f1f R14: 00007ffa76eab300 R15: 0000000000022000 22:39:35 executing program 5: socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) (async) [ 899.176739] CPU: 1 PID: 4205 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 899.184550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 899.194022] Call Trace: [ 899.196617] dump_stack+0x1b2/0x281 [ 899.200252] should_fail.cold+0x10a/0x149 [ 899.204403] __alloc_pages_nodemask+0x22c/0x2720 [ 899.209163] ? trace_hardirqs_on+0x10/0x10 [ 899.213397] ? pcpu_alloc+0xbe0/0xf50 [ 899.217198] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 899.222054] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 899.227504] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 899.232530] alloc_pages_current+0x155/0x260 [ 899.236937] ? __lockdep_init_map+0x100/0x560 [ 899.241433] get_zeroed_page+0x19/0x50 [ 899.245401] mount_fs+0x1c7/0x2a0 [ 899.248867] vfs_kern_mount.part.0+0x5b/0x470 [ 899.253369] do_mount+0xe65/0x2a30 [ 899.256910] ? __do_page_fault+0x159/0xad0 [ 899.261141] ? retint_kernel+0x2d/0x2d [ 899.265027] ? copy_mount_string+0x40/0x40 [ 899.269271] ? memset+0x20/0x40 [ 899.272595] ? copy_mount_options+0x1fa/0x2f0 [ 899.277088] ? copy_mnt_ns+0xa30/0xa30 [ 899.281058] SyS_mount+0xa8/0x120 [ 899.284505] ? copy_mnt_ns+0xa30/0xa30 [ 899.288393] do_syscall_64+0x1d5/0x640 [ 899.292283] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.297484] RIP: 0033:0x7f91fb94773a [ 899.301190] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 899.308909] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 899.316177] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 899.323444] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 899.330713] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 899.337984] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 53) 22:39:35 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/129, 0x81) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$read(0xb, r0, &(0x7f0000000080)=""/70, 0x46) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000380)) r3 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="5b1e7fc0def6f8f8f1e1a01e30c15df53e3774d0fc772989c04486f04705ff0d8fac680643665fa335bfbfd4ed7e9e89e0220d6141f3767ecec02ee4415a67cb03117967a9f0e57f0e4577cb88e7d880932e3215d3d657956b641655d88322c253697e137ff5fb184c", 0x69, r1) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/62, 0x3e) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000003c0)) 22:39:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 52) 22:39:35 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) (fail_nth: 2) 22:39:35 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getitimer(0x2, &(0x7f0000000000)) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) 22:39:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@bcast, @remote, @netrom, @null, @default, @remote, @default, @netrom]}, &(0x7f00000000c0)=0x48) sendto$netrom(r0, &(0x7f0000000100)="9ad5bddb3f7cd689f6d82e715b1d06fe07101cbdd7d93fdbc488740c438e8f4f05f23a2cbeb9253d350f3baba92af3f0169ef29c6cbd2de4ff84b1b95354c209d140c40c05ae14d469c2", 0x4a, 0x4040000, &(0x7f0000000180)={{0x3, @default, 0x3}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @bcast, @default]}, 0x48) 22:39:35 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/129, 0x81) (async) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) (async) keyctl$read(0xb, r0, &(0x7f0000000080)=""/70, 0x46) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000380)) r3 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="5b1e7fc0def6f8f8f1e1a01e30c15df53e3774d0fc772989c04486f04705ff0d8fac680643665fa335bfbfd4ed7e9e89e0220d6141f3767ecec02ee4415a67cb03117967a9f0e57f0e4577cb88e7d880932e3215d3d657956b641655d88322c253697e137ff5fb184c", 0x69, r1) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/62, 0x3e) (async) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000003c0)) 22:39:35 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) getitimer(0x2, &(0x7f0000000000)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 899.487108] FAULT_INJECTION: forcing a failure. [ 899.487108] name failslab, interval 1, probability 0, space 0, times 0 [ 899.507380] FAULT_INJECTION: forcing a failure. [ 899.507380] name failslab, interval 1, probability 0, space 0, times 0 [ 899.521062] CPU: 1 PID: 4257 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 22:39:35 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$can_raw(0x1d, 0x3, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockname$netrom(r2, &(0x7f0000000180)={{0x3, @null}, [@default, @bcast, @remote, @null, @remote, @remote, @netrom, @bcast]}, &(0x7f0000000200)=0x48) sendmsg$can_raw(r1, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x0, 0x0, 0x1}, 0x5, 0x0, 0x0, 0x0, "44e0999fe6463b92"}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 899.528879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 899.538235] Call Trace: [ 899.540827] dump_stack+0x1b2/0x281 [ 899.544462] should_fail.cold+0x10a/0x149 [ 899.548659] should_failslab+0xd6/0x130 [ 899.552640] kmem_cache_alloc+0x28e/0x3c0 [ 899.556851] getname_kernel+0x4e/0x340 [ 899.560744] kern_path+0x1b/0x40 [ 899.564117] lookup_bdev+0xc6/0x1c0 [ 899.567745] ? bd_acquire+0x440/0x440 [ 899.571556] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 899.577017] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 899.582043] blkdev_get_by_path+0x1b/0xa0 22:39:35 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$can_raw(0x1d, 0x3, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockname$netrom(r2, &(0x7f0000000180)={{0x3, @null}, [@default, @bcast, @remote, @null, @remote, @remote, @netrom, @bcast]}, &(0x7f0000000200)=0x48) sendmsg$can_raw(r1, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x0, 0x0, 0x1}, 0x5, 0x0, 0x0, 0x0, "44e0999fe6463b92"}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$l2tp(0x2, 0x2, 0x73) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) pipe(&(0x7f0000000140)) (async) getsockname$netrom(r2, &(0x7f0000000180)={{0x3, @null}, [@default, @bcast, @remote, @null, @remote, @remote, @netrom, @bcast]}, &(0x7f0000000200)=0x48) (async) sendmsg$can_raw(r1, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x0, 0x0, 0x1}, 0x5, 0x0, 0x0, 0x0, "44e0999fe6463b92"}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) (async) [ 899.586195] mount_bdev+0x4c/0x360 [ 899.589737] ? xfs_parseargs+0x1130/0x1130 [ 899.594077] mount_fs+0x92/0x2a0 [ 899.597453] vfs_kern_mount.part.0+0x5b/0x470 [ 899.601956] do_mount+0xe65/0x2a30 [ 899.605499] ? __do_page_fault+0x159/0xad0 [ 899.609733] ? retint_kernel+0x2d/0x2d [ 899.613626] ? copy_mount_string+0x40/0x40 [ 899.617866] ? memset+0x20/0x40 [ 899.621156] ? copy_mount_options+0x1fa/0x2f0 [ 899.625657] ? copy_mnt_ns+0xa30/0xa30 [ 899.629543] SyS_mount+0xa8/0x120 [ 899.632996] ? copy_mnt_ns+0xa30/0xa30 22:39:35 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = socket$can_raw(0x1d, 0x3, 0x1) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockname$netrom(r2, &(0x7f0000000180)={{0x3, @null}, [@default, @bcast, @remote, @null, @remote, @remote, @netrom, @bcast]}, &(0x7f0000000200)=0x48) sendmsg$can_raw(r1, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x0, 0x0, 0x1}, 0x5, 0x0, 0x0, 0x0, "44e0999fe6463b92"}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) [ 899.636887] do_syscall_64+0x1d5/0x640 [ 899.640792] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.645980] RIP: 0033:0x7f264595673a [ 899.649685] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 899.657391] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 899.664663] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 899.671953] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 899.679265] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 22:39:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@bcast, @remote, @netrom, @null, @default, @remote, @default, @netrom]}, &(0x7f00000000c0)=0x48) sendto$netrom(r0, &(0x7f0000000100)="9ad5bddb3f7cd689f6d82e715b1d06fe07101cbdd7d93fdbc488740c438e8f4f05f23a2cbeb9253d350f3baba92af3f0169ef29c6cbd2de4ff84b1b95354c209d140c40c05ae14d469c2", 0x4a, 0x4040000, &(0x7f0000000180)={{0x3, @default, 0x3}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @bcast, @default]}, 0x48) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@bcast, @remote, @netrom, @null, @default, @remote, @default, @netrom]}, &(0x7f00000000c0)=0x48) (async) sendto$netrom(r0, &(0x7f0000000100)="9ad5bddb3f7cd689f6d82e715b1d06fe07101cbdd7d93fdbc488740c438e8f4f05f23a2cbeb9253d350f3baba92af3f0169ef29c6cbd2de4ff84b1b95354c209d140c40c05ae14d469c2", 0x4a, 0x4040000, &(0x7f0000000180)={{0x3, @default, 0x3}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @bcast, @default]}, 0x48) (async) [ 899.686948] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 899.708674] FAULT_INJECTION: forcing a failure. [ 899.708674] name failslab, interval 1, probability 0, space 0, times 0 [ 899.734055] CPU: 1 PID: 4265 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 899.741878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 899.751242] Call Trace: [ 899.753859] dump_stack+0x1b2/0x281 [ 899.757497] should_fail.cold+0x10a/0x149 [ 899.761659] should_failslab+0xd6/0x130 [ 899.765645] kmem_cache_alloc+0x28e/0x3c0 [ 899.769804] get_empty_filp+0x86/0x3f0 [ 899.773711] dentry_open+0x5a/0x210 [ 899.777362] do_open+0x114/0x150 [ 899.780818] do_mq_open+0x445/0xa00 [ 899.784451] ? do_open+0x150/0x150 [ 899.788093] ? __might_fault+0x177/0x1b0 [ 899.792350] SyS_mq_open+0x99/0xe0 [ 899.795895] ? do_mq_timedsend+0xb50/0xb50 [ 899.800229] ? do_syscall_64+0x4c/0x640 [ 899.804291] ? do_mq_timedsend+0xb50/0xb50 [ 899.808527] do_syscall_64+0x1d5/0x640 [ 899.812423] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.817611] RIP: 0033:0x7ffa78536209 [ 899.821332] RSP: 002b:00007ffa76eab168 EFLAGS: 00000246 ORIG_RAX: 00000000000000f0 [ 899.829041] RAX: ffffffffffffffda RBX: 00007ffa78648f60 RCX: 00007ffa78536209 [ 899.836322] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000000020000000 [ 899.843767] RBP: 00007ffa76eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 899.851035] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 899.858298] R13: 00007ffd4b1b8f1f R14: 00007ffa76eab300 R15: 0000000000022000 [ 899.865680] CPU: 0 PID: 4266 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 899.873487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 899.882838] Call Trace: [ 899.885424] dump_stack+0x1b2/0x281 [ 899.889046] should_fail.cold+0x10a/0x149 [ 899.893442] should_failslab+0xd6/0x130 [ 899.897719] kmem_cache_alloc+0x28e/0x3c0 [ 899.901863] getname_kernel+0x4e/0x340 [ 899.905737] kern_path+0x1b/0x40 [ 899.909201] lookup_bdev+0xc6/0x1c0 [ 899.912837] ? bd_acquire+0x440/0x440 [ 899.916775] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 899.922325] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 899.927333] blkdev_get_by_path+0x1b/0xa0 [ 899.931465] mount_bdev+0x4c/0x360 [ 899.934988] ? xfs_parseargs+0x1130/0x1130 [ 899.939216] mount_fs+0x92/0x2a0 [ 899.942597] vfs_kern_mount.part.0+0x5b/0x470 [ 899.947106] do_mount+0xe65/0x2a30 [ 899.950719] ? __do_page_fault+0x159/0xad0 [ 899.954943] ? retint_kernel+0x2d/0x2d [ 899.958833] ? copy_mount_string+0x40/0x40 [ 899.963155] ? memset+0x20/0x40 [ 899.966428] ? copy_mount_options+0x1fa/0x2f0 [ 899.970940] ? copy_mnt_ns+0xa30/0xa30 [ 899.974817] SyS_mount+0xa8/0x120 [ 899.978362] ? copy_mnt_ns+0xa30/0xa30 [ 899.982253] do_syscall_64+0x1d5/0x640 [ 899.986129] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 899.991304] RIP: 0033:0x7f91fb94773a [ 899.995019] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 900.002715] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 900.010188] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 900.017460] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 900.024913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 900.032196] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 54) 22:39:36 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/129, 0x81) (async) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$read(0xb, r0, &(0x7f0000000080)=""/70, 0x46) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000380)) (async) r3 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="5b1e7fc0def6f8f8f1e1a01e30c15df53e3774d0fc772989c04486f04705ff0d8fac680643665fa335bfbfd4ed7e9e89e0220d6141f3767ecec02ee4415a67cb03117967a9f0e57f0e4577cb88e7d880932e3215d3d657956b641655d88322c253697e137ff5fb184c", 0x69, r1) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/62, 0x3e) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f00000003c0)) 22:39:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 53) 22:39:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @bcast}, [@bcast, @remote, @netrom, @null, @default, @remote, @default, @netrom]}, &(0x7f00000000c0)=0x48) (async) sendto$netrom(r0, &(0x7f0000000100)="9ad5bddb3f7cd689f6d82e715b1d06fe07101cbdd7d93fdbc488740c438e8f4f05f23a2cbeb9253d350f3baba92af3f0169ef29c6cbd2de4ff84b1b95354c209d140c40c05ae14d469c2", 0x4a, 0x4040000, &(0x7f0000000180)={{0x3, @default, 0x3}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @bcast, @default]}, 0x48) 22:39:36 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) 22:39:36 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) (fail_nth: 3) 22:39:36 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x0) 22:39:36 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}}) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), &(0x7f00000001c0)=0x4) [ 900.150668] FAULT_INJECTION: forcing a failure. [ 900.150668] name failslab, interval 1, probability 0, space 0, times 0 [ 900.167986] FAULT_INJECTION: forcing a failure. [ 900.167986] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 900.202531] FAULT_INJECTION: forcing a failure. [ 900.202531] name failslab, interval 1, probability 0, space 0, times 0 [ 900.219885] CPU: 0 PID: 4324 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 900.227696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 900.237104] Call Trace: [ 900.239701] dump_stack+0x1b2/0x281 [ 900.243333] should_fail.cold+0x10a/0x149 [ 900.247493] should_failslab+0xd6/0x130 [ 900.251474] kmem_cache_alloc+0x28e/0x3c0 [ 900.255625] get_empty_filp+0x86/0x3f0 [ 900.259512] dentry_open+0x5a/0x210 [ 900.263135] do_open+0x114/0x150 [ 900.266498] do_mq_open+0x445/0xa00 [ 900.270143] ? do_open+0x150/0x150 [ 900.273782] ? __might_fault+0x177/0x1b0 [ 900.277860] SyS_mq_open+0x99/0xe0 [ 900.281401] ? do_mq_timedsend+0xb50/0xb50 [ 900.285731] ? do_syscall_64+0x4c/0x640 [ 900.289710] ? do_mq_timedsend+0xb50/0xb50 [ 900.293942] do_syscall_64+0x1d5/0x640 [ 900.297836] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.303019] RIP: 0033:0x7ffa78536209 [ 900.306717] RSP: 002b:00007ffa76eab168 EFLAGS: 00000246 ORIG_RAX: 00000000000000f0 [ 900.314425] RAX: ffffffffffffffda RBX: 00007ffa78648f60 RCX: 00007ffa78536209 [ 900.321724] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000000020000000 [ 900.328992] RBP: 00007ffa76eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 900.336257] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 900.343526] R13: 00007ffd4b1b8f1f R14: 00007ffa76eab300 R15: 0000000000022000 22:39:36 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}}) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), &(0x7f00000001c0)=0x4) 22:39:36 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x0) [ 900.350816] CPU: 1 PID: 4334 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 900.358614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 900.368000] Call Trace: [ 900.370584] dump_stack+0x1b2/0x281 [ 900.374214] should_fail.cold+0x10a/0x149 [ 900.378364] should_failslab+0xd6/0x130 [ 900.382336] kmem_cache_alloc_trace+0x29a/0x3d0 [ 900.387090] ? set_bdev_super+0x110/0x110 [ 900.391325] sget_userns+0x102/0xc10 [ 900.395063] ? set_bdev_super+0x110/0x110 [ 900.399214] ? ns_test_super+0x50/0x50 [ 900.403102] ? set_bdev_super+0x110/0x110 [ 900.407332] ? ns_test_super+0x50/0x50 [ 900.411212] sget+0xd1/0x110 [ 900.414221] mount_bdev+0xcd/0x360 [ 900.417769] ? xfs_parseargs+0x1130/0x1130 [ 900.421988] mount_fs+0x92/0x2a0 [ 900.425341] vfs_kern_mount.part.0+0x5b/0x470 [ 900.429819] do_mount+0xe65/0x2a30 [ 900.433351] ? __do_page_fault+0x159/0xad0 [ 900.437571] ? retint_kernel+0x2d/0x2d [ 900.441447] ? copy_mount_string+0x40/0x40 [ 900.445676] ? memset+0x20/0x40 [ 900.448952] ? copy_mount_options+0x1fa/0x2f0 [ 900.453437] ? copy_mnt_ns+0xa30/0xa30 [ 900.457314] SyS_mount+0xa8/0x120 [ 900.460776] ? copy_mnt_ns+0xa30/0xa30 [ 900.464653] do_syscall_64+0x1d5/0x640 [ 900.468534] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.473713] RIP: 0033:0x7f264595673a [ 900.477404] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 900.485116] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 900.492414] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 900.499679] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 900.506932] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 900.514203] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 900.521471] CPU: 0 PID: 4325 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 900.529271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 900.538623] Call Trace: [ 900.541214] dump_stack+0x1b2/0x281 [ 900.544936] should_fail.cold+0x10a/0x149 [ 900.549089] __alloc_pages_nodemask+0x22c/0x2720 [ 900.553874] ? trace_hardirqs_on+0x10/0x10 [ 900.558113] ? pcpu_alloc+0xbe0/0xf50 [ 900.561918] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 900.566788] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 900.572238] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 900.577259] alloc_pages_current+0x155/0x260 [ 900.581669] ? __lockdep_init_map+0x100/0x560 [ 900.586169] get_zeroed_page+0x19/0x50 [ 900.590052] mount_fs+0x1c7/0x2a0 [ 900.593510] vfs_kern_mount.part.0+0x5b/0x470 [ 900.598006] do_mount+0xe65/0x2a30 [ 900.601553] ? __do_page_fault+0x159/0xad0 [ 900.605786] ? retint_kernel+0x2d/0x2d [ 900.609674] ? copy_mount_string+0x40/0x40 [ 900.613912] ? memset+0x20/0x40 [ 900.617281] ? copy_mount_options+0x1fa/0x2f0 [ 900.621776] ? copy_mnt_ns+0xa30/0xa30 [ 900.625671] SyS_mount+0xa8/0x120 [ 900.629122] ? copy_mnt_ns+0xa30/0xa30 [ 900.633015] do_syscall_64+0x1d5/0x640 [ 900.636997] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.642186] RIP: 0033:0x7f91fb94773a [ 900.645892] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:39:36 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) 22:39:36 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x0) (async) [ 900.653598] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 900.660862] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 900.668226] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 900.675493] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 900.682774] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 22:39:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 55) 22:39:36 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) (async, rerun: 32) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x0, 0x3}}) (rerun: 32) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000040)) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), &(0x7f00000001c0)=0x4) 22:39:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 54) 22:39:36 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) (fail_nth: 4) 22:39:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @rose}, [@null, @default, @rose, @default, @null, @netrom, @null, @null]}, &(0x7f00000000c0)=0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:36 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xc}}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 22:39:36 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) socket$l2tp(0x2, 0x2, 0x73) (async) syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) (async) [ 900.816939] FAULT_INJECTION: forcing a failure. [ 900.816939] name failslab, interval 1, probability 0, space 0, times 0 [ 900.831727] FAULT_INJECTION: forcing a failure. [ 900.831727] name failslab, interval 1, probability 0, space 0, times 0 [ 900.844893] FAULT_INJECTION: forcing a failure. [ 900.844893] name failslab, interval 1, probability 0, space 0, times 0 [ 900.861696] CPU: 0 PID: 4377 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 900.869508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 900.878863] Call Trace: [ 900.881461] dump_stack+0x1b2/0x281 [ 900.885106] should_fail.cold+0x10a/0x149 [ 900.889284] should_failslab+0xd6/0x130 [ 900.893267] kmem_cache_alloc_trace+0x29a/0x3d0 [ 900.897944] ? set_bdev_super+0x110/0x110 [ 900.902088] sget_userns+0x102/0xc10 [ 900.905798] ? set_bdev_super+0x110/0x110 [ 900.909945] ? ns_test_super+0x50/0x50 [ 900.913834] ? set_bdev_super+0x110/0x110 [ 900.917974] ? ns_test_super+0x50/0x50 [ 900.921860] sget+0xd1/0x110 [ 900.924882] mount_bdev+0xcd/0x360 [ 900.928418] ? xfs_parseargs+0x1130/0x1130 [ 900.932658] mount_fs+0x92/0x2a0 [ 900.936028] vfs_kern_mount.part.0+0x5b/0x470 [ 900.940555] do_mount+0xe65/0x2a30 [ 900.944087] ? __do_page_fault+0x159/0xad0 [ 900.948351] ? retint_kernel+0x2d/0x2d [ 900.952326] ? copy_mount_string+0x40/0x40 [ 900.956569] ? memset+0x20/0x40 [ 900.959846] ? copy_mount_options+0x1fa/0x2f0 [ 900.964344] ? copy_mnt_ns+0xa30/0xa30 [ 900.968230] SyS_mount+0xa8/0x120 [ 900.971677] ? copy_mnt_ns+0xa30/0xa30 [ 900.975554] do_syscall_64+0x1d5/0x640 [ 900.979432] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 900.984603] RIP: 0033:0x7f91fb94773a [ 900.988301] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 900.996011] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 901.003277] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 901.010721] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 901.017977] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 901.025246] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 901.032522] CPU: 1 PID: 4383 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 901.040338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 901.049688] Call Trace: [ 901.052287] dump_stack+0x1b2/0x281 [ 901.055911] should_fail.cold+0x10a/0x149 [ 901.060045] should_failslab+0xd6/0x130 [ 901.064007] kmem_cache_alloc_trace+0x29a/0x3d0 [ 901.068664] apparmor_file_alloc_security+0x129/0x800 [ 901.073871] security_file_alloc+0x66/0xa0 [ 901.078221] ? selinux_is_enabled+0x5/0x50 [ 901.082443] get_empty_filp+0x16b/0x3f0 [ 901.086402] dentry_open+0x5a/0x210 [ 901.090016] do_open+0x114/0x150 [ 901.093611] do_mq_open+0x445/0xa00 [ 901.097227] ? do_open+0x150/0x150 [ 901.100761] ? __might_fault+0x177/0x1b0 [ 901.104809] SyS_mq_open+0x99/0xe0 [ 901.108441] ? do_mq_timedsend+0xb50/0xb50 [ 901.112668] ? do_syscall_64+0x4c/0x640 [ 901.116626] ? do_mq_timedsend+0xb50/0xb50 [ 901.120850] do_syscall_64+0x1d5/0x640 [ 901.124744] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.129921] RIP: 0033:0x7ffa78536209 [ 901.133622] RSP: 002b:00007ffa76eab168 EFLAGS: 00000246 ORIG_RAX: 00000000000000f0 [ 901.141409] RAX: ffffffffffffffda RBX: 00007ffa78648f60 RCX: 00007ffa78536209 [ 901.148680] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 0000000020000000 [ 901.156025] RBP: 00007ffa76eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 901.163309] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 901.170653] R13: 00007ffd4b1b8f1f R14: 00007ffa76eab300 R15: 0000000000022000 [ 901.177924] CPU: 0 PID: 4378 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 901.185724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 901.195250] Call Trace: [ 901.197848] dump_stack+0x1b2/0x281 [ 901.201486] should_fail.cold+0x10a/0x149 [ 901.205647] should_failslab+0xd6/0x130 [ 901.209626] __kmalloc+0x2c1/0x400 [ 901.213194] ? __list_lru_init+0x67/0x710 22:39:37 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)=0xfffffffffffffe04) r1 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x5, 0xff, 0x2, 0x5, 0x0, 0x8000, 0x50000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4220, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x1f, 0x200, 0x5, 0x7, 0xe3, 0x3b4f, 0x0, 0x10001}, 0x0, 0x6, 0xffffffffffffffff, 0xa) r2 = syz_mount_image$ntfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1ff, 0x5, &(0x7f0000000680)=[{&(0x7f0000000400)="5289150fb61546b3a62cf56c37963361c9ef52376e2584e5f57fa5d238080f60237d2554b84d4051f97225d140b817e34e355b82c691f0e550e9d4e0fc1a814aca3dd3ed3b7cc5fd76e92cbc568f002960383af06598eb83478213f181b1194f069fe5470180126b9d7d091d36096996e1b9cb12fca57938256b204379663dc6867af525136ab9bbacaeb5d74ba616", 0x8f, 0x9}, {&(0x7f00000004c0)="8e2deae27dfc5a8d275408f2123bb3ef7da95ed716e0a74b3634f40344dce9f99529", 0x22, 0x9}, {&(0x7f0000000500)="d04dae4bb0", 0x5, 0x4}, {&(0x7f0000000540)="0e46857a69ddb352313b7c1676c56a95170e2e669d8f6277b70aa346a157cee23b497dc445c9f17c2d3a8fa57889a66c4966b0a8638c6837ccbf", 0x3a, 0x7}, {&(0x7f0000000580)="8a4c7438634fdb12fac248587934fe95cb10c38f117c31925c6e5225224924f73f43ef8fd92ea3e68b55303dea501ffe0df76865a3e0eab9e2ac8bfb0b1a72ae416e696fb27289fff57cca4013f7300fc82c3c5d4ed505435296c5326b300c2b2e8b7a8523821325af370c790ea18ed9726bf15efe2ecb46b287f24ee9c0a4b72c88afc9370dc4f85568a4610af0f4d7b74d38be493b25a4a5bd8a92f59993e56b0756", 0xa3, 0x3}], 0x10000, &(0x7f0000000700)={[{@errors_continue}, {@dmask={'dmask', 0x3d, 0x8}}, {@case_sensitive_no}, {@utf8}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@fmask={'fmask', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_user}]}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000007c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000800)={"0eb57a994cb6938a83c155998241c3e0", 0x0, r3, {0x40, 0x3}, {0x3, 0x7f}, 0x3, [0xffffffff, 0x0, 0x4, 0x5, 0xffffffff, 0x1, 0x80000000, 0x1, 0x16, 0xffffffffffffffc0, 0x9, 0x3, 0x3, 0x7fffffff]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000100)={"60efb812090cb1b75e780a77227d2b93", 0x0, r3, {0xff}, {0x4, 0x3}, 0xd3c, [0x0, 0x81, 0x6, 0xa1d, 0xf067, 0x16, 0x1, 0x6, 0x4, 0x1f, 0x800, 0x7fffffff, 0x1, 0xfffffffffffffffe, 0x8, 0xfffffffffffffffa]}) 22:39:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @rose}, [@null, @default, @rose, @default, @null, @netrom, @null, @null]}, &(0x7f00000000c0)=0x48) (async) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 901.217351] __list_lru_init+0x67/0x710 [ 901.221483] sget_userns+0x504/0xc10 [ 901.225194] ? set_bdev_super+0x110/0x110 [ 901.229353] ? ns_test_super+0x50/0x50 [ 901.233323] ? set_bdev_super+0x110/0x110 [ 901.237482] ? ns_test_super+0x50/0x50 [ 901.241374] sget+0xd1/0x110 [ 901.244412] mount_bdev+0xcd/0x360 [ 901.247955] ? xfs_parseargs+0x1130/0x1130 [ 901.252191] mount_fs+0x92/0x2a0 [ 901.255563] vfs_kern_mount.part.0+0x5b/0x470 [ 901.260068] do_mount+0xe65/0x2a30 [ 901.263703] ? __do_page_fault+0x159/0xad0 22:39:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @rose}, [@null, @default, @rose, @default, @null, @netrom, @null, @null]}, &(0x7f00000000c0)=0x48) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000), 0x4) [ 901.267938] ? retint_kernel+0x2d/0x2d [ 901.271830] ? copy_mount_string+0x40/0x40 [ 901.276066] ? memset+0x20/0x40 [ 901.279347] ? copy_mount_options+0x1fa/0x2f0 [ 901.283844] ? copy_mnt_ns+0xa30/0xa30 [ 901.287735] SyS_mount+0xa8/0x120 [ 901.291251] ? copy_mnt_ns+0xa30/0xa30 [ 901.295138] do_syscall_64+0x1d5/0x640 [ 901.299031] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.304225] RIP: 0033:0x7f264595673a [ 901.307930] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 901.315723] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 901.323077] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 901.330346] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 901.333451] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 901.337611] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 22:39:37 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) (fail_nth: 5) 22:39:37 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xc}}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x8000) [ 901.337646] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 22:39:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@nogrpid}, {@pqnoenforce}]}) (fail_nth: 56) 22:39:37 executing program 2: syz_mount_image$xfs(&(0x7f0000000400), &(0x7f0000001580)='./file0\x00', 0x0, 0x0, &(0x7f00000037c0), 0x0, &(0x7f0000003940)={[{@inode32}, {@nogrpid}, {@pqnoenforce}]}) (fail_nth: 55) 22:39:37 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r1}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000), 0x4) 22:39:37 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xc}}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 22:39:37 executing program 0: mq_open(&(0x7f0000000000)='$^!\\\x00', 0x40, 0x0, &(0x7f0000000080)={0xdf8, 0x9, 0x182dc3fc, 0x53}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x3ba3, [0x2, 0x7, 0x20, 0x2a4, 0x0, 0x0, 0x6, 0xfad0, 0x2, 0x6, 0x2, 0x40, 0x9, 0x1cc7, 0x45e, 0x200, 0xe5e, 0x791, 0xffff, 0xd018, 0x2, 0x200, 0xd87b, 0xd4, 0x1c, 0x0, 0x0, 0x3, 0x7, 0x20, 0x401, 0x2, 0x7ff, 0xff80, 0x1, 0x20, 0x7, 0x7, 0x3, 0xd83, 0x1ff, 0x6, 0x7ff, 0x1, 0x8, 0x1, 0x6, 0x5], 0x6}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0x6, 0x4) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000240)=""/100, 0x64, 0x3, &(0x7f00000002c0)={0x0, 0x3938700}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{0x4, @name="9ca4ab5367ead133ef6b6462824836a296e26a882ef8ebf0d43bf95d08c68146"}, 0x8, 0x40007144, 0x20}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20090000a766e05e4e55002ec206ac7d3eabb6d9c5f5d9de3bc32bb082f6497310060900000000000000aecb8f460fc083bb778b49fd5be582f628e5f15c380702e00397ef3fc49ca1603cdab2c2df6e1f4a1a90cccd1c9ff329582318289f56e357ac6f1a1d", @ANYRES16=0x0, @ANYBLOB="000225bd7000fcdbdf25040000000900030073797a3100000000"], 0x20}}, 0x800) 22:39:37 executing program 3: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r1}) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000), 0x4) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000380), 0x80) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) (async) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r1}) (async) syz_init_net_socket$netrom(0x6, 0x5, 0x0) (async) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000), 0x4) (async) [ 901.486316] FAULT_INJECTION: forcing a failure. [ 901.486316] name failslab, interval 1, probability 0, space 0, times 0 [ 901.501397] FAULT_INJECTION: forcing a failure. [ 901.501397] name failslab, interval 1, probability 0, space 0, times 0 [ 901.511540] ntfs: (device loop1): parse_options(): Unrecognized mount option func. [ 901.539898] CPU: 1 PID: 4436 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 901.547714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 901.557069] Call Trace: [ 901.559661] dump_stack+0x1b2/0x281 [ 901.563411] should_fail.cold+0x10a/0x149 [ 901.567558] should_failslab+0xd6/0x130 [ 901.571530] __kmalloc+0x2c1/0x400 [ 901.575060] ? register_shrinker+0x1ab/0x220 [ 901.579457] register_shrinker+0x1ab/0x220 [ 901.583692] sget_userns+0x9aa/0xc10 [ 901.587404] ? set_bdev_super+0x110/0x110 [ 901.591548] ? ns_test_super+0x50/0x50 [ 901.595439] ? set_bdev_super+0x110/0x110 [ 901.599586] ? ns_test_super+0x50/0x50 [ 901.603461] sget+0xd1/0x110 [ 901.606505] mount_bdev+0xcd/0x360 [ 901.610037] ? xfs_parseargs+0x1130/0x1130 [ 901.614258] mount_fs+0x92/0x2a0 [ 901.617617] vfs_kern_mount.part.0+0x5b/0x470 [ 901.622115] do_mount+0xe65/0x2a30 [ 901.625650] ? __do_page_fault+0x159/0xad0 [ 901.629870] ? retint_kernel+0x2d/0x2d [ 901.633744] ? copy_mount_string+0x40/0x40 [ 901.637965] ? memset+0x20/0x40 [ 901.642214] ? copy_mount_options+0x1fa/0x2f0 [ 901.646713] ? copy_mnt_ns+0xa30/0xa30 [ 901.650593] SyS_mount+0xa8/0x120 [ 901.654047] ? copy_mnt_ns+0xa30/0xa30 [ 901.657946] do_syscall_64+0x1d5/0x640 [ 901.661827] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.667002] RIP: 0033:0x7f91fb94773a [ 901.670716] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 901.678505] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a 22:39:37 executing program 5: socket$l2tp(0x2, 0x2, 0x73) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev, @multicast2}, &(0x7f0000000040)=0xc) [ 901.685791] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 901.693048] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 901.700310] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 901.707576] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 901.714853] CPU: 0 PID: 4443 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 901.722654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 901.729726] ntfs: (device loop1): parse_options(): Unrecognized mount option subj_user. [ 901.732066] Call Trace: [ 901.732082] dump_stack+0x1b2/0x281 [ 901.732095] should_fail.cold+0x10a/0x149 [ 901.750624] should_failslab+0xd6/0x130 [ 901.754692] __kmalloc+0x2c1/0x400 [ 901.758243] ? __list_lru_init+0x67/0x710 [ 901.761522] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 901.762396] __list_lru_init+0x67/0x710 [ 901.773883] sget_userns+0x504/0xc10 [ 901.777600] ? set_bdev_super+0x110/0x110 [ 901.781800] ? ns_test_super+0x50/0x50 [ 901.785693] ? set_bdev_super+0x110/0x110 [ 901.787249] ------------[ cut here ]------------ [ 901.789840] ? ns_test_super+0x50/0x50 [ 901.794583] WARNING: CPU: 1 PID: 4436 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 901.798539] sget+0xd1/0x110 [ 901.806317] Kernel panic - not syncing: panic_on_warn set ... [ 901.806317] [ 901.809333] mount_bdev+0xcd/0x360 [ 901.820289] ? xfs_parseargs+0x1130/0x1130 [ 901.824513] mount_fs+0x92/0x2a0 [ 901.827868] vfs_kern_mount.part.0+0x5b/0x470 [ 901.832350] do_mount+0xe65/0x2a30 [ 901.835883] ? __do_page_fault+0x159/0xad0 [ 901.840277] ? retint_kernel+0x2d/0x2d [ 901.844159] ? copy_mount_string+0x40/0x40 [ 901.848383] ? memset+0x20/0x40 [ 901.851648] ? copy_mount_options+0x1fa/0x2f0 [ 901.856147] ? copy_mnt_ns+0xa30/0xa30 [ 901.860037] SyS_mount+0xa8/0x120 [ 901.863489] ? copy_mnt_ns+0xa30/0xa30 [ 901.867381] do_syscall_64+0x1d5/0x640 [ 901.871612] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 901.876788] RIP: 0033:0x7f264595673a [ 901.880484] RSP: 002b:00007f26442c9f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 901.888186] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f264595673a [ 901.895457] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f26442c9fe0 [ 901.902726] RBP: 00007f26442ca020 R08: 00007f26442ca020 R09: 0000000020000400 [ 901.909990] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 901.917251] R13: 0000000020001580 R14: 00007f26442c9fe0 R15: 0000000020003940 [ 901.924529] CPU: 1 PID: 4436 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 901.932328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 901.941681] Call Trace: [ 901.944267] dump_stack+0x1b2/0x281 [ 901.947896] panic+0x1f9/0x42d [ 901.951094] ? add_taint.cold+0x16/0x16 [ 901.955079] ? kill_block_super+0xbe/0xe0 [ 901.959232] ? __warn.cold+0x5/0x44 [ 901.962867] ? kill_block_super+0xbe/0xe0 [ 901.967014] __warn.cold+0x20/0x44 [ 901.970552] ? ist_end_non_atomic+0x10/0x10 [ 901.974873] ? kill_block_super+0xbe/0xe0 [ 901.979024] report_bug+0x208/0x250 [ 901.982654] do_error_trap+0x195/0x2d0 [ 901.986547] ? math_error+0x2d0/0x2d0 [ 901.990352] ? retint_kernel+0x2d/0x2d [ 901.994246] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 901.999096] invalid_op+0x1b/0x40 [ 902.002546] RIP: 0010:kill_block_super+0xbe/0xe0 [ 902.007307] RSP: 0000:ffff88808012fbc8 EFLAGS: 00010246 [ 902.012663] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90005bea000 [ 902.019919] RDX: 0000000000040000 RSI: ffffffff818761be RDI: ffff8880902ce730 [ 902.027204] RBP: ffff8880937e4180 R08: ffffffff8b9b4518 R09: 0000000000000001 [ 902.034460] R10: 0000000000000000 R11: ffff8880aaf041c0 R12: ffff8880902ce280 [ 902.041713] R13: ffffffff892472f0 R14: ffffffff88f45760 R15: dffffc0000000000 [ 902.048982] ? kill_block_super+0xbe/0xe0 [ 902.053137] ? kill_block_super+0xbe/0xe0 [ 902.057267] deactivate_locked_super+0x6c/0xd0 [ 902.061849] sget_userns+0x9c4/0xc10 [ 902.065554] ? set_bdev_super+0x110/0x110 [ 902.069696] ? ns_test_super+0x50/0x50 [ 902.073571] ? set_bdev_super+0x110/0x110 [ 902.077785] ? ns_test_super+0x50/0x50 [ 902.081671] sget+0xd1/0x110 [ 902.084674] mount_bdev+0xcd/0x360 [ 902.088282] ? xfs_parseargs+0x1130/0x1130 [ 902.092500] mount_fs+0x92/0x2a0 [ 902.095849] vfs_kern_mount.part.0+0x5b/0x470 [ 902.100325] do_mount+0xe65/0x2a30 [ 902.103871] ? __do_page_fault+0x159/0xad0 [ 902.108085] ? retint_kernel+0x2d/0x2d [ 902.111962] ? copy_mount_string+0x40/0x40 [ 902.116181] ? memset+0x20/0x40 [ 902.119449] ? copy_mount_options+0x1fa/0x2f0 [ 902.123927] ? copy_mnt_ns+0xa30/0xa30 [ 902.127796] SyS_mount+0xa8/0x120 [ 902.131230] ? copy_mnt_ns+0xa30/0xa30 [ 902.135099] do_syscall_64+0x1d5/0x640 [ 902.138975] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 902.144153] RIP: 0033:0x7f91fb94773a [ 902.147863] RSP: 002b:00007f91fa2baf88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 902.155599] RAX: ffffffffffffffda RBX: 00000000200037c0 RCX: 00007f91fb94773a [ 902.162940] RDX: 0000000020000400 RSI: 0000000020001580 RDI: 00007f91fa2bafe0 [ 902.170297] RBP: 00007f91fa2bb020 R08: 00007f91fa2bb020 R09: 0000000020000400 [ 902.177835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000400 [ 902.185108] R13: 0000000020001580 R14: 00007f91fa2bafe0 R15: 0000000020003940 [ 902.192816] Kernel Offset: disabled [ 902.196500] Rebooting in 86400 seconds..