4000854) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000000f6ffffff00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) 13:42:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) accept(r0, &(0x7f0000000240)=@phonet, &(0x7f00000002c0)=0x80) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000340)=r5) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="1400001000010000000000000000000000000a14000000050a01020000000000000000000000046df485699d79546c480fc9140000001100010000"], 0x3c}}, 0x488c4) r6 = fcntl$dupfd(r2, 0x0, r1) r7 = socket(0x4, 0x2, 0x6b92) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r6, 0x80045700, &(0x7f0000000300)) sendmsg$IPSET_CMD_SWAP(r7, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000263706010400000000000000000a000001090002007373797a0100000000000000000700000005000100070000000900030073797a3100"/72], 0x48}, 0x1, 0x0, 0x0, 0x24000000}, 0x24000800) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x4, 0x0, 0x0, 0x1, &(0x7f0000000380)={[{@quota_account='quota=account'}]}) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x2940aab3, 0x84000) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) 13:42:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x1, 0x6, 0x401, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4001}, 0x4040808) [ 975.389309] gfs2: not a GFS2 filesystem [ 975.390711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=62976 sclass=netlink_route_socket pid=21202 comm=syz-executor.0 [ 975.412461] hfsplus: unable to find HFS+ superblock [ 975.421322] gfs2: not a GFS2 filesystem 13:42:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) 13:42:36 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 13:42:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@gettfilter={0x3c, 0x2e, 0x300, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0x9, 0xfff1}, {0x2, 0xfff3}, {0x0, 0xe}}, [{0x8, 0xb, 0xc0000000}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000051}, 0x4010040) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024f10a0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = accept$phonet_pipe(r5, &(0x7f0000000000), &(0x7f0000000040)=0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r8, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x1404, 0x400, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8094) listen(r6, 0x7) [ 975.510534] gfs2: not a GFS2 filesystem 13:42:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 975.581808] gfs2: not a GFS2 filesystem [ 975.593614] hfsplus: unable to find HFS+ superblock [ 975.610118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61732 sclass=netlink_route_socket pid=21239 comm=syz-executor.1 [ 975.643433] gfs2: not a GFS2 filesystem [ 975.653487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=21239 comm=syz-executor.1 [ 975.672206] gfs2: not a GFS2 filesystem 13:42:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:39 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 13:42:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) 13:42:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) statx(r5, &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='fuseblk\x00', 0x80000, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7ff}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@smackfsdef={'smackfsdef', 0x3d, 'gfs2\x00'}}]}}) 13:42:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$DRM_IOCTL_MODE_RMFB(r2, 0xc00464af, &(0x7f0000000000)=0x412) r3 = socket(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000900)={{{@in=@empty, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) r5 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}}, 0x78) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r7, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r8 = gettid() ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000080)=r8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) r10 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11}}}, 0x78) sendmmsg$unix(r3, &(0x7f0000000c80)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000180)="b15119f5181bf0408477c730dbccf2f73bfe27484856f48171b31af352d26f859662634d21de11c099894383f02a68908fdccf2a8a02b25b95cc50ab36119f94b7594e3a9bf59c5bed81f7c87b2596c20a4674d09bc8116f910724cf090561e95e980a6d42eea6b8c5ccc8b49cbf86a3964bf3304163e0405743f57ff8df4e9af825eac41b97a62c5d0d9da262d71fbdd19e84085395524aa842afd7142b7ffe6e8b3ed7907a45a62403c993ff6bd16447ccaa922388e10a557c494de7d0379fb8261121", 0xc4}], 0x1, &(0x7f0000000480)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r3]}}], 0x48, 0x12050}, {&(0x7f0000000500)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)="e15d26a9f915397ddbe5ee038dc0fa7acf5f52cafe910a835b0cc64e007608935c60dfa6d5443ffd8e99964283d86e0e5a14f525cb2524c0192c81bb4346642b490acac5a4e04d18de1a305e79d85c343147a437472013ddf1d9af2c5bd3ac9c78954ee011e292aaa5949ad4fc0e7a7a891c2f669aaaede2d3541c10", 0x7c}], 0x1, &(0x7f0000000b80)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, r6}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r11}}}], 0x100, 0x4400c805}], 0x2, 0x40000) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c0002000000000000000000000000000000000100022e69bfcd5674c446acf864b6c2fa608af4b9629aba5605e85f7e6febb069f8803751c3d01296edadf5e0ac1c0139635fea58049e10edab24a3711df00c040000000000000081c038e457e0255376ac0e5d87217c2b69b8f52addc4e783a9add9d5ed678ccdc0b531a150681a65783aafbc30cf8ab97c11b199aa08bbd39333ee032ffa96fd8cad931092d4be88514085925af1f11f2873e068fa5cf53fc981da1af018aa879ec405b8"], 0x78}}, 0x0) [ 978.423940] attempt to access beyond end of device [ 978.432942] hfsplus: unable to find HFS+ superblock [ 978.439349] gfs2: not a GFS2 filesystem [ 978.451231] loop1: rw=4096, want=136, limit=63 13:42:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[], 0x78}, 0x1, 0x0, 0x0, 0x24048840}, 0x0) [ 978.479097] gfs2: error 10 reading superblock 13:42:39 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 13:42:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_DISCONNECT(r5, 0xab08) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000bc0)) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 978.577979] gfs2: not a GFS2 filesystem 13:42:40 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid'}}]}) [ 978.604402] hfsplus: unable to find HFS+ superblock [ 978.610498] gfs2: not a GFS2 filesystem [ 978.616723] attempt to access beyond end of device [ 978.631485] loop1: rw=4096, want=136, limit=63 [ 978.641814] gfs2: error 10 reading superblock 13:42:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 978.721357] gfs2: not a GFS2 filesystem [ 978.728741] hfsplus: unable to find HFS+ superblock [ 978.752229] gfs2: not a GFS2 filesystem [ 978.792448] Cannot find del_set index 0 as target 13:42:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x109800, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @hyper}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) recvmmsg(r2, &(0x7f0000002cc0)=[{{&(0x7f0000000080)=@nl=@proc, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f00000001c0)=""/3, 0x3}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/137, 0x89}, {&(0x7f0000000300)=""/131, 0x83}], 0x6, &(0x7f0000000440)=""/88, 0x58}, 0x9}, {{&(0x7f00000004c0)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002980)=[{&(0x7f0000000540)=""/76, 0x4c}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/119, 0x77}, {&(0x7f0000000640)=""/255, 0xff}, {&(0x7f0000002800)=""/127, 0x7f}, {&(0x7f0000002880)=""/92, 0x5c}, {&(0x7f0000002900)=""/93, 0x5d}], 0x7}, 0x80000001}, {{&(0x7f0000002a00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000000740)=""/10, 0xa}, {&(0x7f0000002a80)=""/167, 0xa7}, {&(0x7f0000002b40)=""/246, 0xf6}], 0x3, &(0x7f0000002c80)=""/18, 0x12}, 0x7f}], 0x3, 0x10020, &(0x7f0000002d80)={0x0, 0x3938700}) 13:42:42 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid'}}]}) 13:42:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x8010, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f61636c2c176502000000000000008044ae61425e1bf8"]) 13:42:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_DISCONNECT(r5, 0xab08) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000bc0)) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 981.457556] hfsplus: unable to find HFS+ superblock [ 981.473106] gfs2: not a GFS2 filesystem [ 981.483667] attempt to access beyond end of device [ 981.485266] gfs2: invalid mount option: e [ 981.500943] gfs2: can't parse mount arguments 13:42:42 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid'}}]}) [ 981.507453] loop1: rw=4096, want=136, limit=63 13:42:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800001d0f00"/20, @ANYRES32, @ANYBLOB="eb000200ffffffff00000000000200"], 0x78}}, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x210280) 13:42:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 981.530400] gfs2: error 10 reading superblock [ 981.572119] gfs2: invalid mount option: e [ 981.594293] gfs2: can't parse mount arguments 13:42:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024009329cf3b73c32e6b9a9b6b065d82", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) 13:42:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f61de122c00"]) [ 981.630570] hfsplus: unable to find HFS+ superblock [ 981.653060] gfs2: not a GFS2 filesystem 13:42:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 981.703041] gfs2: invalid mount option: noaŽ [ 981.709929] Cannot find del_set index 0 as target [ 981.711628] gfs2: can't parse mount arguments [ 981.777904] gfs2: not a GFS2 filesystem [ 981.800242] gfs2: invalid mount option: noaŽ [ 981.806597] gfs2: can't parse mount arguments 13:42:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x194, 0x2, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x6}, [@CTA_LABELS={0x8, 0x16, 0x1, 0x0, [0x1]}, @CTA_NAT_SRC={0x48, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @empty}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast2}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_TUPLE_REPLY={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @private1={0xfc, 0x1, [], 0x1}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x18}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @CTA_TUPLE_ORIG={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x3e}}}}]}, @CTA_TUPLE_REPLY={0x94, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x3d}}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, [], 0x1}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}]}, 0x194}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x2}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) 13:42:45 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid'}}]}) 13:42:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_DISCONNECT(r5, 0xab08) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000bc0)) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) [ 984.476218] hfsplus: unable to find HFS+ superblock [ 984.489505] attempt to access beyond end of device [ 984.500276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=21430 comm=syz-executor.0 [ 984.506568] gfs2: not a GFS2 filesystem [ 984.520717] loop1: rw=4096, want=136, limit=63 13:42:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:46 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, r1, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x4008810) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="de39dca90505eb24000000", @ANYRES16=r1, @ANYBLOB="000226bd7000fedbdf250300000005000300ff0000000500050003000000"], 0x24}, 0x1, 0x0, 0x0, 0x40c1}, 0x4800) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, r1, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4048084}, 0x8000) r8 = socket(0x11, 0x804, 0x0) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000940)=@req3={0x3, 0x6}, 0x1c) [ 984.527502] gfs2: error 10 reading superblock [ 984.528811] gfs2: not a GFS2 filesystem [ 984.561966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=21441 comm=syz-executor.0 13:42:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 984.587265] print_req_error: I/O error, dev loop1, sector 0 [ 984.618919] gfs2: not a GFS2 filesystem [ 984.637731] Cannot find del_set index 0 as target 13:42:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_DISCONNECT(r5, 0xab08) r7 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:46 executing program 0: r0 = socket(0x10, 0x1, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) [ 984.665074] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21467 comm=syz-executor.3 [ 984.681961] gfs2: not a GFS2 filesystem 13:42:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_DELCHAIN={0x28, 0x5, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x3}]}], {0x14}}, 0x50}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) tee(r2, r3, 0x1ff, 0x0) r4 = fcntl$dupfd(r1, 0x0, r0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) fcntl$setflags(r5, 0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) 13:42:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth0_to_hsr\x00', 0x2}, 0x18) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000050a0102000000000000000000000000140000001106000000000000000000000000000a958dc157736a137b8d18ae8c24a4da62e7bf0dcc9bfd1dbf915bddc4ff05ecc35c4bf28258425974a75b74325d7d31dc1da8adc8d1707aef25364d9d5d9aa3279581a6a0e8cc"], 0x3c}}, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x853}]}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'veth1_to_team\x00', r4}) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x3}}}]}, 0x78}}, 0x0) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000002c0)={r9, 0x1007}, &(0x7f0000000080)=0x8) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffff980286755eb5816b0002002000000000000000000000000200000000000000f1ff000000"], 0x78}}, 0x0) [ 984.761983] attempt to access beyond end of device [ 984.778427] loop1: rw=4096, want=136, limit=63 [ 984.783084] gfs2: error 10 reading superblock 13:42:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 984.811746] gfs2: not a GFS2 filesystem 13:42:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 984.857668] gfs2: not a GFS2 filesystem 13:42:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 984.892878] gfs2: not a GFS2 filesystem [ 984.902283] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. [ 984.925803] Cannot find del_set index 0 as target 13:42:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_DISCONNECT(r5, 0xab08) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 984.951079] gfs2: not a GFS2 filesystem [ 984.964721] gfs2: not a GFS2 filesystem 13:42:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 985.048472] gfs2: not a GFS2 filesystem [ 985.050095] gfs2: not a GFS2 filesystem [ 985.063125] attempt to access beyond end of device [ 985.072234] gfs2: not a GFS2 filesystem [ 985.076759] loop1: rw=4096, want=136, limit=63 [ 985.081632] gfs2: error 10 reading superblock [ 985.198541] print_req_error: I/O error, dev loop1, sector 0 13:42:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007366710042000200000000000000000000000000000000000002"], 0x78}}, 0x0) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x4bc, 0x0, 0x5, 0x801, 0x0, 0x0, {0x2, 0x0, 0x4}, [{{0x254, 0x1, {{0x1, 0x80000001}, 0x0, 0xb1, 0x785c, 0x1, 0x13, 'syz1\x00', "1f9b0213cdfcd7dc277b3d4889ec2cf4c6c5253b41392370ce28371be5b4fd68", "9dc219c269c0d8090f66b707b7fdf04b3365a657a8d1d179a5e94a8a7ee1a262", [{0xfffd, 0xffff, {0x2, 0x1}}, {0xfffb, 0xa5, {0x2, 0x3}}, {0xaaa, 0x3f, {0x1, 0x7fff}}, {0x4, 0x0, {0x0, 0x4}}, {0x6, 0x6, {0x1, 0x2}}, {0xffff, 0xfff8, {0x0, 0x80000000}}, {0x2, 0x400, {0x3, 0x1}}, {0x2, 0x0, {0x0, 0x8000}}, {0x0, 0x3000, {0x0, 0x9}}, {0x9, 0x4, {0x0, 0x40}}, {0x200, 0x3, {0x2, 0x9}}, {0x5, 0xff, {0x1, 0x7fff}}, {0xff, 0x81, {0x2}}, {0x5, 0xfffc, {0x2, 0x4}}, {0x20, 0x0, {0x2, 0x7b58}}, {0x47c, 0x3, {0x1, 0x2}}, {0xfff8, 0x40, {0x2, 0x200000}}, {0x200, 0x773d, {0xa7df0bc69ae6007b, 0xff}}, {0x5, 0x79df, {0x3}}, {0x80, 0xffff, {0x0, 0x8}}, {0x0, 0x100, {0x1, 0x8}}, {0x7f, 0x8, {0x3, 0x9}}, {0x42f, 0x9, {0x1}}, {0x9, 0x2, {0x1, 0x5}}, {0x401, 0x80, {0x0, 0x6}}, {0xff80, 0x7ff, {0x2, 0x1}}, {0x8001, 0x676, {0x1, 0x5929}}, {0xb2, 0x8, {0x2, 0x81}}, {0x20, 0x6, {0x2, 0xd8}}, {0x2, 0x7f, {0x3, 0xff}}, {0x401, 0x4, {0x1, 0x400}}, {0x101, 0x800, {0x2, 0x277f1780}}, {0x1ff, 0x7, {0x2}}, {0x4, 0x0, {0x3, 0xe74}}, {0x2, 0xe, {0x1, 0x8000}}, {0x600, 0x8, {0x3, 0x80000000}}, {0x6, 0x8001, {0x3, 0x401}}, {0x4, 0x3, {0x0, 0x800}}, {0x5, 0xfffb, {0x3, 0x6}}, {0x80, 0x1, {0x0, 0x4}}]}}}, {{0x254, 0x1, {{0x1, 0x129}, 0x80, 0x5, 0x58ad, 0x1, 0x2, 'syz0\x00', "041a63e16a9e7c8059dbb693f025167ddb4656c42c78c3d203e4912987b73392", "0ea3b8c8f87130a7c25726dc11d2a8fcb3dee17847e0454911b3fd5599f42722", [{0x6a1, 0x2, {0x2, 0x7}}, {0x1000, 0xfc3, {0x3, 0x7}}, {0x3, 0x9, {0x1, 0x2}}, {0x2, 0x5a91, {0x0, 0x5}}, {0x1, 0x72a4, {0x2, 0x20}}, {0xfff, 0x9, {0x2, 0x4}}, {0x101, 0x6, {0x1, 0x6}}, {0x78d, 0x1, {0xfabeb1f4e6b709c0, 0xffffffff}}, {0x2, 0x7, {0x3, 0x7ff}}, {0xa03c, 0x7, {0x2, 0x3ff}}, {0x5, 0x5, {0x2}}, {0x246e, 0x4, {0x0, 0x7ff}}, {0xfffb, 0x3, {0x0, 0x20}}, {0x6, 0x9, {0x1, 0x5}}, {0x1, 0x7fff, {0x3, 0x3}}, {0x200, 0x7521, {0x0, 0x1}}, {0x96ec, 0x5, {0x3, 0x8}}, {0x8000, 0x7, {0x1, 0x400}}, {0x5, 0x5}, {0x4, 0x101, {0x1, 0x9}}, {0xdc79, 0x3, {0x1, 0x6}}, {0x100, 0x8f, {0x2, 0x3}}, {0x7, 0x2, {0x2, 0x2}}, {0x8952, 0x2, {0x2, 0x2}}, {0x5, 0x7ff, {0x1, 0x4}}, {0x5, 0x7, {0x0, 0x1}}, {0x8, 0x9, {0x2, 0x100}}, {0x81, 0x5967}, {0x0, 0x9, {0x3, 0x6}}, {0xdf76, 0x8, {0x2, 0x5359}}, {0x7, 0x9, {0x2, 0xe6}}, {0x0, 0x1, {0x2, 0x1}}, {0x7, 0x8, {0x2, 0x1ff}}, {0x7, 0x7fff, {0x2, 0x10000}}, {0x1, 0x4def, {0x0, 0x8}}, {0x2, 0xa5, {0x0, 0x6}}, {0x3, 0x40, {0x0, 0x7a3}}, {0x9, 0xfd, {0x3}}, {0x1f, 0x7f, {0x3, 0x4}}, {0x3f, 0x3, {0x3, 0x8}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x81}, 0x40040) 13:42:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6f61636c2c004220ad624903f236ad9799c2dfd8d0e2159fc5a8fa6d2c9478318b9292158099330d97c9d650491ab02d6953ae3e82c1d436b94d5f13e46da8295c5fe73f127cbe1a7ebdd7b2534bdbf969f771e80813d61c5c8270f15ffebd376a6fbaa51a05c152bb804da04f06faee2e14da9ba8a71a31770234333b72aa358bb88e693392a50fcfeef6216596782ac5dd4ccd3b2d28fd0eb73329da024bc5ebbff9570083a859bc246376d352a3aed92d32e32d4cb94cd2249200ccb4dbb1329e0c455ec9e64d22a0afbf37897b07c48d777caa580b11cdab7773a646fb00"/235]) 13:42:49 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_DISCONNECT(r5, 0xab08) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 987.772333] gfs2: not a GFS2 filesystem [ 987.779305] gfs2: not a GFS2 filesystem [ 987.787551] attempt to access beyond end of device [ 987.792647] gfs2: not a GFS2 filesystem [ 987.798686] loop1: rw=4096, want=136, limit=63 [ 987.800503] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 987.810218] gfs2: error 10 reading superblock 13:42:49 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 987.822860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=21573 comm=syz-executor.0 [ 987.849247] gfs2: not a GFS2 filesystem [ 987.862934] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 987.877694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=21587 comm=syz-executor.0 [ 987.908652] gfs2: not a GFS2 filesystem [ 987.937344] gfs2: not a GFS2 filesystem 13:42:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:49 executing program 0: r0 = socket(0x11, 0x613c2c6972e94e00, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}, 0x1, 0x0, 0x0, 0x1}, 0x0) 13:42:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) pipe2(&(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) fcntl$addseals(r5, 0x409, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r6, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r7 = gettid() ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000080)=r7) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000240)={{0x5, 0x3, 0x0, 0x2f, '\x00', 0x3}, 0x6, 0x30, 0x5, r7, 0x1, 0x8, 'syz0\x00', &(0x7f0000000040)=['gfs2\x00'], 0x5, [], [0xfe01, 0x1, 0xff, 0x7ff]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400202) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="b8afc55c6c2c004696a74fffc04b65b7a8f2f57f955d689ac7187eb7caa6e2b6390ffa6aec5f90d10bfdcea72a633da679a3b950e1e44105acaf2e527b5a3a3b1a8ac1ce45f6303db8bc33ac10a2a6852f3f838b3182dd3f34cc88b7526e4c7d49b613258f2ef19b57f92c19d13d9ca1632fc5c7c224e80ed36cf0c1a87f32824a7677456564a38ad057ad8d4c79dca9378d12df19859510e24bab4fbf98"]) [ 988.086468] gfs2: not a GFS2 filesystem [ 988.093615] gfs2: not a GFS2 filesystem [ 988.182170] gfs2: invalid mount option: øÆÅ\l [ 988.190310] gfs2: can't parse mount arguments 13:42:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NBD_DISCONNECT(r5, 0xab08) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000024000b5935f4150d9f3a0700000097d5ad694981d8491f0d9a860204fc9136a7b8aab942e48bc0d3bde63d21decefa2da6a4b884dad6ca10b5ecc2b0220be6c457954d349daa3e072ea2c640eeb001e6f5307f1fcfdc3f7c97", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) 13:42:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x8020, &(0x7f0000000000)=ANY=[@ANYBLOB='b\x00']) [ 990.832357] attempt to access beyond end of device [ 990.833915] gfs2: not a GFS2 filesystem [ 990.842413] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. [ 990.856709] loop1: rw=4096, want=136, limit=63 [ 990.864762] gfs2: not a GFS2 filesystem 13:42:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000024000b0f0000000000e5fb0000000000e7d7f274b0a23c19260ece70d2782d7645a33dc4fce36724720ea44819a9c49c0d1ee736107c366ef520352bf2eae2c63bf48f10c795b159936641ebdcfdd32aa065e712e8185a75c0cd91db54c59f4ce263f824218003ffb8f22b4e051bedf8535c778e80a0ec9c615e503d01cf732c76c1cfe7faff64aaca1cb52fc3", @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) [ 990.880983] gfs2: error 10 reading superblock 13:42:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:52 executing program 0: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="229a84e4eee42c21faa47069fc284d6aeba5afe144d3d4feda24a1246219a2ab38fab3f0864aa22ae0c2dcad6a22586d880b1d8cbf132acc7d1c27771d569ef65bb77676cfb1be11fd8ba99dab9784a72cb354aa68c32e0a0dc4cadff36456669092cdf6735d9df358261a018987dd05b1b95cb9eb174090d33316f29e99284121f32d8d18703958a9368cfd3293ff2b0750ea84a1cc864ad03ba86bf075ab12c0d034621afd79d384687fb023b1c09af4ba2563013e132572ff", 0xba, 0x4}], 0x21000, &(0x7f00000000c0)='\x00') r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000240)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) [ 990.959476] gfs2: not a GFS2 filesystem [ 990.967178] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. 13:42:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 991.010895] gfs2: not a GFS2 filesystem 13:42:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 991.076743] gfs2: not a GFS2 filesystem [ 991.129908] gfs2: not a GFS2 filesystem 13:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r5 = fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r6, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r6, @ANYBLOB=',\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmmsg$alg(r1, &(0x7f00000003c0)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)}, {&(0x7f0000000180)="c5379578f719a423d67182c1da623e102a51f3463b7fa39cf0cc922114590e18c6e0e7289b7ca75cdf450485e46195da7d8319c0d38b28ab44acb7e8fdde85dba5753fe5ac56e87b5f97b907e46d8cb37db980117c8ed623a70bc14bdb0d744121235bccb0abf19dc2cdc54f57e517a61c2ab24da4bfa42ce4c23eda8cda304b6183c9059f01e27f17a1f83d01e0fe50726c1fc2015a67472ba360f61889b2366e9223991aa3cc79", 0xa8}, {&(0x7f00000000c0)="20819b043ae5dd76162910385a4484491d1f11aa3b4f55f6bf9e75de232290789dc3557a10d89881937fb6272368e1dc47327b925cf2616e40bf7461aebacb3e9cb4160ce2", 0x45}, {&(0x7f0000000240)="f9daac9e32919f34077104533d427f861f27aac28925d0afaac3fb546a445bde4db11a3c37cada81f2205267e499aace3a58b22e7d611a23608c307ec2325e557c64e0dcbad132b16410e8a55e9da34f599b0541230c903477270c7b6f19b3e8cf126528e4fc15aeb46ff1d2fe62841b55481712683285e74906302f32fe972f08de988cc6f5727e11c0b477a395ace6161fd8fce9305cb89d8501bc515438d56397adfc6ab09679e017df13286de00337242011f9f55d532cd371923e6764ef6454896a70309c23d2e87e43c8944c2fe363585055efea0ca24ea3aad9861ff28cca8f", 0xe3}], 0x4, &(0x7f0000000380)=[@assoc={0x18, 0x117, 0x4, 0x401}], 0x18, 0x1080}], 0x1, 0x20008000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) 13:42:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:55 executing program 0: socket(0x10, 0x3, 0x0) 13:42:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007366710042000200000000000000000000000000000000000002"], 0x78}}, 0x0) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x4bc, 0x0, 0x5, 0x801, 0x0, 0x0, {0x2, 0x0, 0x4}, [{{0x254, 0x1, {{0x1, 0x80000001}, 0x0, 0xb1, 0x785c, 0x1, 0x13, 'syz1\x00', "1f9b0213cdfcd7dc277b3d4889ec2cf4c6c5253b41392370ce28371be5b4fd68", "9dc219c269c0d8090f66b707b7fdf04b3365a657a8d1d179a5e94a8a7ee1a262", [{0xfffd, 0xffff, {0x2, 0x1}}, {0xfffb, 0xa5, {0x2, 0x3}}, {0xaaa, 0x3f, {0x1, 0x7fff}}, {0x4, 0x0, {0x0, 0x4}}, {0x6, 0x6, {0x1, 0x2}}, {0xffff, 0xfff8, {0x0, 0x80000000}}, {0x2, 0x400, {0x3, 0x1}}, {0x2, 0x0, {0x0, 0x8000}}, {0x0, 0x3000, {0x0, 0x9}}, {0x9, 0x4, {0x0, 0x40}}, {0x200, 0x3, {0x2, 0x9}}, {0x5, 0xff, {0x1, 0x7fff}}, {0xff, 0x81, {0x2}}, {0x5, 0xfffc, {0x2, 0x4}}, {0x20, 0x0, {0x2, 0x7b58}}, {0x47c, 0x3, {0x1, 0x2}}, {0xfff8, 0x40, {0x2, 0x200000}}, {0x200, 0x773d, {0xa7df0bc69ae6007b, 0xff}}, {0x5, 0x79df, {0x3}}, {0x80, 0xffff, {0x0, 0x8}}, {0x0, 0x100, {0x1, 0x8}}, {0x7f, 0x8, {0x3, 0x9}}, {0x42f, 0x9, {0x1}}, {0x9, 0x2, {0x1, 0x5}}, {0x401, 0x80, {0x0, 0x6}}, {0xff80, 0x7ff, {0x2, 0x1}}, {0x8001, 0x676, {0x1, 0x5929}}, {0xb2, 0x8, {0x2, 0x81}}, {0x20, 0x6, {0x2, 0xd8}}, {0x2, 0x7f, {0x3, 0xff}}, {0x401, 0x4, {0x1, 0x400}}, {0x101, 0x800, {0x2, 0x277f1780}}, {0x1ff, 0x7, {0x2}}, {0x4, 0x0, {0x3, 0xe74}}, {0x2, 0xe, {0x1, 0x8000}}, {0x600, 0x8, {0x3, 0x80000000}}, {0x6, 0x8001, {0x3, 0x401}}, {0x4, 0x3, {0x0, 0x800}}, {0x5, 0xfffb, {0x3, 0x6}}, {0x80, 0x1, {0x0, 0x4}}]}}}, {{0x254, 0x1, {{0x1, 0x129}, 0x80, 0x5, 0x58ad, 0x1, 0x2, 'syz0\x00', "041a63e16a9e7c8059dbb693f025167ddb4656c42c78c3d203e4912987b73392", "0ea3b8c8f87130a7c25726dc11d2a8fcb3dee17847e0454911b3fd5599f42722", [{0x6a1, 0x2, {0x2, 0x7}}, {0x1000, 0xfc3, {0x3, 0x7}}, {0x3, 0x9, {0x1, 0x2}}, {0x2, 0x5a91, {0x0, 0x5}}, {0x1, 0x72a4, {0x2, 0x20}}, {0xfff, 0x9, {0x2, 0x4}}, {0x101, 0x6, {0x1, 0x6}}, {0x78d, 0x1, {0xfabeb1f4e6b709c0, 0xffffffff}}, {0x2, 0x7, {0x3, 0x7ff}}, {0xa03c, 0x7, {0x2, 0x3ff}}, {0x5, 0x5, {0x2}}, {0x246e, 0x4, {0x0, 0x7ff}}, {0xfffb, 0x3, {0x0, 0x20}}, {0x6, 0x9, {0x1, 0x5}}, {0x1, 0x7fff, {0x3, 0x3}}, {0x200, 0x7521, {0x0, 0x1}}, {0x96ec, 0x5, {0x3, 0x8}}, {0x8000, 0x7, {0x1, 0x400}}, {0x5, 0x5}, {0x4, 0x101, {0x1, 0x9}}, {0xdc79, 0x3, {0x1, 0x6}}, {0x100, 0x8f, {0x2, 0x3}}, {0x7, 0x2, {0x2, 0x2}}, {0x8952, 0x2, {0x2, 0x2}}, {0x5, 0x7ff, {0x1, 0x4}}, {0x5, 0x7, {0x0, 0x1}}, {0x8, 0x9, {0x2, 0x100}}, {0x81, 0x5967}, {0x0, 0x9, {0x3, 0x6}}, {0xdf76, 0x8, {0x2, 0x5359}}, {0x7, 0x9, {0x2, 0xe6}}, {0x0, 0x1, {0x2, 0x1}}, {0x7, 0x8, {0x2, 0x1ff}}, {0x7, 0x7fff, {0x2, 0x10000}}, {0x1, 0x4def, {0x0, 0x8}}, {0x2, 0xa5, {0x0, 0x6}}, {0x3, 0x40, {0x0, 0x7a3}}, {0x9, 0xfd, {0x3}}, {0x1f, 0x7f, {0x3, 0x4}}, {0x3f, 0x3, {0x3, 0x8}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x81}, 0x40040) 13:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 993.850734] attempt to access beyond end of device [ 993.850961] gfs2: not a GFS2 filesystem [ 993.869525] loop1: rw=4096, want=136, limit=63 [ 993.885373] gfs2: not a GFS2 filesystem [ 993.887118] gfs2: not a GFS2 filesystem [ 993.893741] gfs2: error 10 reading superblock 13:42:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xb}, {0xffff, 0xffff}}, [@TCA_STAB={0x64, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x4e, 0x1, 0x20, 0x0, 0x7fff, 0x3, 0x5}}, {0xe, 0x2, [0x2, 0x2, 0x1, 0x9, 0x7]}}, {{0x1c, 0x1, {0x16, 0x6, 0x4000, 0x2, 0x1, 0x6, 0x2003, 0x9}}, {0x16, 0x2, [0x7, 0x0, 0x9, 0x7, 0x146a, 0x0, 0x7, 0x4600, 0x8]}}]}]}, 0x88}}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r2, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1ff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000881) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x88000, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x84, r2, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xc54}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3f}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1efb}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}, {0x8}, {0x8, 0x1, r3}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r0}, {0x8, 0x1, r9}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x20000004) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736671004c000200000000000000000000000000000000000002"], 0x78}}, 0x0) 13:42:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 993.907987] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 993.927803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=21750 comm=syz-executor.0 13:42:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 993.988680] gfs2: not a GFS2 filesystem 13:42:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000480)='./file1\x00', 0x80) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x88, r7, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000001}, 0x40840) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PIO_FONT(r10, 0x4b61, &(0x7f0000000380)="cf04f9d061e84db9ced1229755c8e2c4f4ffe76e6296cd5dce466d1710fe4e4e1520159f85b7ba8c548bec0bc5508d0dce08972819644ac1544b2f027721083af785f955bd7c56ceb1578ed97a833eb6ed7c14c25075511dacbac5bd5ff3791792dec19fd4658ea77f95d6e3f6e35cbd57d04e78c9cc00ea1fbc07df0ec6319ab3bc1c3f26bd256127c7bc9f2de9aa7dbbd591548ef0c83037c1fab44c61e9027d9c58352c873841ae3e7618f00f14f1446beae5530c733a72e7a6b76cfd770e4e80afa1") sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c000000130a01020000000000000000070000040809004a71474c5106a3f0c84000000006080003400000000a0c0006400000000000000001090002"], 0x3c}, 0x1, 0x0, 0x0, 0x4000041}, 0x4000000) 13:42:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r5, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000640)='./file1\x00', 0x20, 0x5, &(0x7f0000000a80)=[{&(0x7f0000000680)="26e4857abf8c3e5973e71162c0f6ae96f2bda0ddf2981fbdcb3541f2da209dec747799343e3234d031130d757eb81a7a805c15d3fee9bbad1c43153ff687770c25a3abc42238d7bd64c5ffcc04c25ed5d7e3b5247d8be896131a7a0611a87929ef78dcb46f8cbd92ca7287e026f57a11bea4d1d938911c8d79ff538a178f7a7e883db263eb2d1eb7ce6e86cd03eea8fb581faaa4e99ddf1e88c9237b613bd645d7d029d7279cc9d370d6fa61142059ceb6c560798780a525fa5035880c4b9195228f781dc1f8b143d75a9dd278748c73e997a673420cf41ba0216be73c102e23d83e2c9ee26e", 0xe6, 0xa3}, {&(0x7f0000000780)="acddcf1bea2bb53d3d4b275424f67a26993e9d8d2c75668067186fb3052e7b25cf1a700f1fb45b891ef22fddce1bb6d0b3b68153cd3b7f0a20a3ef8f5557664553187fd960159e1b638af1ec55f46b5daf5d8ebbfdb85829e79957c6ce51d400e682f48a4b438eee36c3c84aa8402d7ca180eaaef79e544e0276823338f46bce2cef54e70be4e124d3818bebd5dc8494e455da82d632ed074ee25526d0fedf356aac4e6af5", 0xa5, 0x9}, {&(0x7f0000000840)="4781e1578d8501905db322ef759e5a17f4ade295b0cd3056e0132aac0042010dfa55d29eef7ca7b019bb23eaa35bb8acfea2a666828435807dbbdde2dd39efc3c44a2b3f4f41e1f02e586b3abbb897467fec283175d64e607e7230ed819e94adc4025a1e68028539f2cdc146d4cddfe40805de66a6f76edd2957819b3c317bf04bedb8c293d29d7eea6f81bba517220dbe0a24a261be720225f2d03b2e234bd00a7a15b57793cef40294ab90a2151bf0b696109b6d84d2cb03e64ead55fdad0b29ba27cb086e49d781e7621ed52b0a9eeec36e5f20c8a08fbe111a38b8740e59915843a48889253e18b256e78f00698df6ff", 0xf2, 0x3}, {&(0x7f0000000940)="9b2392f7951c5776eb5a0e58138d2e2710337de51eb257511c59c40cb1038d78f3c73c697cb003901e9c5a71653dbc1373dd9c34e069f7870c147670c8b439cda734223e2e7248277c2be418e56f629e358a4c69aa3cde6cbfa24ae9f42b7fcf4ce0345d3619d21cc5c3f85a4dfdeb2952e206e7e3b3b40692b91f7fe28a05de18c8117b5dda2b769e286ddfc4b8678e6d2fdc380faaf07dbfd650680715a9730510a2268c54333ce1e362cfffa1e0db0bf6c443391c6475b657e4d062bf833140dfd3e5c60c95164fd5ae2899fa384b6bfebd605a2b2831f9d597da2822a561a0da91fba346c16ea27af0b2ed04", 0xee, 0x6}, {&(0x7f0000000a40)="cc759ee570c27de99ec45a7c3c", 0xd, 0xc56}], 0x19008, &(0x7f0000000b00)=ANY=[@ANYBLOB="71756f74612c6a6f75726e616c5f706174683d2e2f66696c65312c64656c616c6c6f632c6a6f75726e616c5f6173796e635f636f6d6d697430303030303030303030303031392c736d61636b66736861743d257b5b3a242c66756e633d504154485f4348454300b99c4b2c6575", @ANYRESDEC=r5, @ANYBLOB=',\x00']) r6 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 994.027841] Cannot find del_set index 0 as target [ 994.041831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21767 comm=syz-executor.0 [ 994.058283] gfs2: not a GFS2 filesystem 13:42:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:42:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 994.078139] gfs2: not a GFS2 filesystem [ 994.081010] gfs2: not a GFS2 filesystem [ 994.145670] gfs2: not a GFS2 filesystem [ 994.156517] attempt to access beyond end of device [ 994.168042] loop1: rw=4096, want=136, limit=63 [ 994.179432] gfs2: error 10 reading superblock 13:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, 0x0, 0x0, 0x0) 13:42:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x18000, 0x0) sendmsg$RDMA_NLDEV_CMD_GET(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="50000000011402002abd7000fcdbdf2508000100020000000000000802000000000000000001000200001f0800010000000000080001000101000000000008000100020000008dc6751a91239d274867a19e1f78e3d0a1be10a8059adf1b7a5bfd5b7eb0e0d94384ce98cbc4bf9cdc"], 0x50}}, 0x4000) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0xf000, 0x4000}) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x24a100) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x4, 0x1, 0x101, 0x0, 0x0, {0x5}, [""]}, 0x14}}, 0x80) getpeername$llc(r4, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_BITS(r7, 0x80045005, &(0x7f0000000400)) syz_open_dev$char_usb(0xc, 0xb4, 0xa6) [ 994.198312] gfs2: not a GFS2 filesystem 13:42:55 executing program 0 (fault-call:1 fault-nth:0): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 994.221303] gfs2: not a GFS2 filesystem 13:42:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 994.288802] FAULT_INJECTION: forcing a failure. [ 994.288802] name failslab, interval 1, probability 0, space 0, times 0 [ 994.302480] gfs2: not a GFS2 filesystem [ 994.310071] CPU: 1 PID: 21829 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 994.317986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.327340] Call Trace: [ 994.329937] dump_stack+0x1b2/0x283 [ 994.333572] should_fail.cold+0x10a/0x154 [ 994.337727] should_failslab+0xd6/0x130 [ 994.341710] __kmalloc+0x2c1/0x400 [ 994.345254] ? SyS_memfd_create+0xb9/0x3a0 [ 994.349496] SyS_memfd_create+0xb9/0x3a0 [ 994.353562] ? shmem_fcntl+0x120/0x120 [ 994.357448] ? SyS_clock_settime+0x1a0/0x1a0 [ 994.361856] ? do_syscall_64+0x4c/0x640 [ 994.365830] ? shmem_fcntl+0x120/0x120 [ 994.369721] do_syscall_64+0x1d5/0x640 [ 994.373613] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 994.378796] RIP: 0033:0x45ca69 13:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 994.381979] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 994.389684] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045ca69 [ 994.396954] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 994.404231] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 994.411505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 994.418807] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:42:55 executing program 0 (fault-call:1 fault-nth:1): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:42:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7fffffff, 0x0, 0x0, 0x80800, &(0x7f0000000040)={[{@quota_on='quota=on'}, {@data_ordered='data=ordered'}, {@meta='meta'}]}) 13:42:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r5, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000c00)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000c40)=0x2c) r6 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 994.445101] Cannot find del_set index 0 as target [ 994.450337] gfs2: not a GFS2 filesystem [ 994.468208] gfs2: not a GFS2 filesystem 13:42:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 994.534590] FAULT_INJECTION: forcing a failure. [ 994.534590] name failslab, interval 1, probability 0, space 0, times 0 [ 994.575951] attempt to access beyond end of device [ 994.588142] CPU: 1 PID: 21858 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 994.596052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.605406] Call Trace: [ 994.608002] dump_stack+0x1b2/0x283 [ 994.611637] should_fail.cold+0x10a/0x154 [ 994.615791] should_failslab+0xd6/0x130 [ 994.619766] kmem_cache_alloc+0x28e/0x3c0 [ 994.623914] __d_alloc+0x2a/0x9b0 [ 994.627367] ? lock_downgrade+0x6e0/0x6e0 [ 994.631599] __shmem_file_setup.part.0+0xcb/0x3c0 [ 994.636427] ? shmem_rename2+0x6e0/0x6e0 [ 994.640465] ? __alloc_fd+0x1bf/0x490 [ 994.644250] SyS_memfd_create+0x1f6/0x3a0 [ 994.648378] ? shmem_fcntl+0x120/0x120 [ 994.652243] ? SyS_clock_settime+0x1a0/0x1a0 [ 994.656636] ? do_syscall_64+0x4c/0x640 [ 994.660590] ? shmem_fcntl+0x120/0x120 [ 994.664547] do_syscall_64+0x1d5/0x640 [ 994.668418] entry_SYSCALL_64_after_hwframe+0x46/0xbb 13:42:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000040)={0x7, 0x3e000000, 0x3, 0x1, 0x3f, 0x400}) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x84000) ioctl$LOOP_CLR_FD(r3, 0x4c01) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6f61636c2c00977a9af408bea1f3ed53e9d4c47b65fc184e3f6e8b503c9467791400321854fe6d16b3d63eed71a703ca12241b6ed30a7d600bfe006c38af40bd7c0077209d3c"]) [ 994.674975] RIP: 0033:0x45ca69 [ 994.678142] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 994.685842] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045ca69 [ 994.693112] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 994.700363] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 994.707640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 994.714893] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:42:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 994.748580] gfs2: not a GFS2 filesystem [ 994.759597] Cannot find del_set index 0 as target [ 994.769240] gfs2: not a GFS2 filesystem [ 994.791621] loop1: rw=4096, want=136, limit=63 13:42:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 994.799033] gfs2: error 10 reading superblock 13:42:56 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r5, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:56 executing program 0 (fault-call:1 fault-nth:2): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 994.866442] gfs2: not a GFS2 filesystem 13:42:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:56 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 994.905792] ptrace attach of "/root/syz-executor.5"[21894] was attempted by "/root/syz-executor.5"[21898] [ 994.921097] gfs2: not a GFS2 filesystem [ 994.930681] FAULT_INJECTION: forcing a failure. [ 994.930681] name failslab, interval 1, probability 0, space 0, times 0 [ 994.945696] attempt to access beyond end of device [ 994.950642] loop1: rw=4096, want=136, limit=63 13:42:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 994.986535] gfs2: error 10 reading superblock [ 994.994655] CPU: 1 PID: 21905 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 995.002685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.012045] Call Trace: [ 995.014645] dump_stack+0x1b2/0x283 [ 995.017222] Cannot find del_set index 0 as target [ 995.018282] should_fail.cold+0x10a/0x154 [ 995.018300] should_failslab+0xd6/0x130 [ 995.018311] kmem_cache_alloc+0x28e/0x3c0 13:42:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) getpeername$tipc(r2, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) [ 995.035396] ? shmem_destroy_callback+0xa0/0xa0 [ 995.040253] shmem_alloc_inode+0x18/0x40 [ 995.044325] ? shmem_destroy_callback+0xa0/0xa0 [ 995.048998] alloc_inode+0x5d/0x170 [ 995.052635] new_inode_pseudo+0x14/0xe0 [ 995.056618] new_inode+0x1b/0x40 [ 995.060024] shmem_get_inode+0x74/0x780 [ 995.064013] __shmem_file_setup.part.0+0x104/0x3c0 [ 995.069041] ? shmem_rename2+0x6e0/0x6e0 [ 995.073110] ? __alloc_fd+0x1bf/0x490 [ 995.076923] SyS_memfd_create+0x1f6/0x3a0 [ 995.081135] ? shmem_fcntl+0x120/0x120 [ 995.085029] ? SyS_clock_settime+0x1a0/0x1a0 [ 995.089441] ? do_syscall_64+0x4c/0x640 [ 995.093421] ? shmem_fcntl+0x120/0x120 [ 995.097461] do_syscall_64+0x1d5/0x640 [ 995.101364] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 995.106565] RIP: 0033:0x45ca69 [ 995.109758] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 995.117476] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045ca69 [ 995.124751] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 995.132026] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 995.139387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 995.146663] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:42:56 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=virtio,cache=loose,cache=fscache,afid=0x0000000000000004,aname=procK,fscache,access=any,noextend,cache=fscache,debug=0x000000000000037a,obj_role=,hash,uid=', @ANYRESDEC=r5, @ANYBLOB=',smackfsf|oxr=)GPL,\x00']) r6 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 995.183949] gfs2: not a GFS2 filesystem [ 995.196420] gfs2: not a GFS2 filesystem [ 995.200554] gfs2: not a GFS2 filesystem 13:42:56 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:56 executing program 0 (fault-call:1 fault-nth:3): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:42:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) [ 995.281360] ptrace attach of "/root/syz-executor.5"[21940] was attempted by "/root/syz-executor.5"[21944] [ 995.286027] attempt to access beyond end of device [ 995.312090] gfs2: not a GFS2 filesystem [ 995.317054] FAULT_INJECTION: forcing a failure. [ 995.317054] name failslab, interval 1, probability 0, space 0, times 0 [ 995.330824] CPU: 1 PID: 21953 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 995.338724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.339143] gfs2: not a GFS2 filesystem [ 995.348077] Call Trace: [ 995.348098] dump_stack+0x1b2/0x283 [ 995.348115] should_fail.cold+0x10a/0x154 [ 995.348129] should_failslab+0xd6/0x130 [ 995.348142] kmem_cache_alloc+0x28e/0x3c0 [ 995.357313] loop1: rw=4096, want=136, limit=63 [ 995.358524] selinux_inode_alloc_security+0xb1/0x2a0 [ 995.358537] security_inode_alloc+0x8f/0xd0 [ 995.358549] inode_init_always+0x576/0xb10 [ 995.369792] Cannot find del_set index 0 as target [ 995.370920] alloc_inode+0x7a/0x170 [ 995.370934] new_inode_pseudo+0x14/0xe0 [ 995.378241] gfs2: error 10 reading superblock [ 995.380765] new_inode+0x1b/0x40 [ 995.380778] shmem_get_inode+0x74/0x780 [ 995.380796] __shmem_file_setup.part.0+0x104/0x3c0 [ 995.418587] ? shmem_rename2+0x6e0/0x6e0 [ 995.422748] ? __alloc_fd+0x1bf/0x490 [ 995.426567] SyS_memfd_create+0x1f6/0x3a0 [ 995.430728] ? shmem_fcntl+0x120/0x120 [ 995.434624] ? SyS_clock_settime+0x1a0/0x1a0 [ 995.439042] ? do_syscall_64+0x4c/0x640 [ 995.443027] ? shmem_fcntl+0x120/0x120 [ 995.446928] do_syscall_64+0x1d5/0x640 [ 995.450831] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 995.456036] RIP: 0033:0x45ca69 [ 995.459365] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 995.467080] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045ca69 [ 995.474357] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 13:42:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 995.482023] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 995.489415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 995.496697] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:42:57 executing program 0 (fault-call:1 fault-nth:4): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:42:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) r6 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:57 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 995.531305] gfs2: not a GFS2 filesystem [ 995.585917] FAULT_INJECTION: forcing a failure. [ 995.585917] name failslab, interval 1, probability 0, space 0, times 0 [ 995.600233] CPU: 1 PID: 21975 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 995.608222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.618499] Call Trace: [ 995.621200] dump_stack+0x1b2/0x283 [ 995.624956] should_fail.cold+0x10a/0x154 [ 995.629256] should_failslab+0xd6/0x130 [ 995.633312] kmem_cache_alloc+0x28e/0x3c0 [ 995.637873] get_empty_filp+0x86/0x3e0 [ 995.641754] alloc_file+0x23/0x440 [ 995.645387] __shmem_file_setup.part.0+0x198/0x3c0 [ 995.650420] ? shmem_rename2+0x6e0/0x6e0 [ 995.654487] ? __alloc_fd+0x1bf/0x490 [ 995.658350] SyS_memfd_create+0x1f6/0x3a0 [ 995.662732] ? shmem_fcntl+0x120/0x120 [ 995.666621] ? SyS_clock_settime+0x1a0/0x1a0 [ 995.671454] ? do_syscall_64+0x4c/0x640 [ 995.675557] ? shmem_fcntl+0x120/0x120 [ 995.679879] do_syscall_64+0x1d5/0x640 13:42:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) [ 995.683767] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 995.689212] RIP: 0033:0x45ca69 [ 995.692914] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 995.700614] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045ca69 [ 995.704469] Cannot find del_set index 0 as target [ 995.707986] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 995.707992] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 995.707997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 13:42:57 executing program 0 (fault-call:1 fault-nth:5): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 995.708003] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 [ 995.774516] attempt to access beyond end of device [ 995.779735] loop1: rw=4096, want=136, limit=63 [ 995.781489] gfs2: not a GFS2 filesystem [ 995.795248] gfs2: error 10 reading superblock [ 995.804460] gfs2: not a GFS2 filesystem [ 995.811842] FAULT_INJECTION: forcing a failure. [ 995.811842] name failslab, interval 1, probability 0, space 0, times 0 [ 995.830640] gfs2: not a GFS2 filesystem [ 995.854297] CPU: 1 PID: 21999 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 995.862211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.871758] Call Trace: [ 995.874365] dump_stack+0x1b2/0x283 [ 995.878017] should_fail.cold+0x10a/0x154 [ 995.882792] should_failslab+0xd6/0x130 [ 995.886938] kmem_cache_alloc+0x28e/0x3c0 [ 995.891258] selinux_file_alloc_security+0xaf/0x190 [ 995.896387] security_file_alloc+0x66/0xa0 13:42:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e7f61636c2c00"]) 13:42:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 995.900986] ? selinux_is_enabled+0x5/0x50 [ 995.905231] get_empty_filp+0x15c/0x3e0 [ 995.909373] alloc_file+0x23/0x440 [ 995.912932] __shmem_file_setup.part.0+0x198/0x3c0 [ 995.917879] ? shmem_rename2+0x6e0/0x6e0 [ 995.921949] ? __alloc_fd+0x1bf/0x490 [ 995.925770] SyS_memfd_create+0x1f6/0x3a0 [ 995.929950] ? shmem_fcntl+0x120/0x120 [ 995.933827] gfs2: invalid mount option: nacl [ 995.934053] ? SyS_clock_settime+0x1a0/0x1a0 [ 995.934067] ? do_syscall_64+0x4c/0x640 [ 995.934077] ? shmem_fcntl+0x120/0x120 [ 995.934088] do_syscall_64+0x1d5/0x640 [ 995.934103] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 995.939248] gfs2: not a GFS2 filesystem [ 995.943033] RIP: 0033:0x45ca69 [ 995.943039] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 995.943050] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045ca69 [ 995.943056] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 995.943061] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 995.943067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 995.943072] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:42:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 996.061553] gfs2: can't parse mount arguments 13:42:57 executing program 0 (fault-call:1 fault-nth:6): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 996.083304] attempt to access beyond end of device [ 996.093727] loop1: rw=4096, want=136, limit=63 13:42:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 996.127755] FAULT_INJECTION: forcing a failure. [ 996.127755] name failslab, interval 1, probability 0, space 0, times 0 [ 996.144577] gfs2: error 10 reading superblock [ 996.159434] gfs2: invalid mount option: nacl [ 996.165460] gfs2: can't parse mount arguments [ 996.171022] CPU: 1 PID: 22034 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 996.178920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.188281] Call Trace: [ 996.190881] dump_stack+0x1b2/0x283 [ 996.194526] should_fail.cold+0x10a/0x154 [ 996.197693] gfs2: not a GFS2 filesystem [ 996.198681] should_failslab+0xd6/0x130 [ 996.198693] kmem_cache_alloc+0x28e/0x3c0 [ 996.198706] getname_flags+0xc8/0x550 [ 996.214822] do_sys_open+0x202/0x3e0 [ 996.218546] ? filp_open+0x60/0x60 [ 996.222105] ? fput+0xb/0x140 [ 996.223868] Cannot find del_set index 0 as target [ 996.225233] ? do_syscall_64+0x4c/0x640 [ 996.225242] ? do_sys_open+0x3e0/0x3e0 [ 996.225252] do_syscall_64+0x1d5/0x640 [ 996.225267] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 996.247339] RIP: 0033:0x416861 [ 996.250534] RSP: 002b:00007fc25bd0ba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 996.258337] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 0000000000416861 [ 996.266134] RDX: 00007fc25bd0bb0a RSI: 0000000000000002 RDI: 00007fc25bd0bb00 13:42:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7, 0x0, 0x0, 0x40000, &(0x7f0000000080)={[{@noacl='noacl'}]}) 13:42:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 996.273410] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 996.280772] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 996.288459] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:42:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) fcntl$dupfd(r1, 0x0, r0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:42:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:42:57 executing program 0 (fault-call:1 fault-nth:7): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 996.350080] gfs2: not a GFS2 filesystem 13:42:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 996.422871] FAULT_INJECTION: forcing a failure. [ 996.422871] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 996.434708] CPU: 1 PID: 22076 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 996.442799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.452289] Call Trace: [ 996.454934] dump_stack+0x1b2/0x283 [ 996.458648] should_fail.cold+0x10a/0x154 [ 996.462881] ? lock_acquire+0x170/0x3f0 [ 996.466917] __alloc_pages_nodemask+0x22b/0x2730 [ 996.471817] ? trace_hardirqs_on+0x10/0x10 [ 996.476132] ? quarantine_put+0xc9/0x190 [ 996.480196] ? simple_xattr_get+0xe5/0x160 [ 996.484571] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 996.489635] ? trace_hardirqs_on+0x10/0x10 [ 996.494176] ? __fsnotify_inode_delete+0x20/0x20 [ 996.498934] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 996.505739] ? setattr_copy+0x143/0x550 [ 996.509712] cache_grow_begin+0x91/0x410 [ 996.514017] cache_alloc_refill+0x28c/0x360 [ 996.518334] kmem_cache_alloc+0x333/0x3c0 [ 996.522570] getname_flags+0xc8/0x550 [ 996.526431] do_sys_open+0x202/0x3e0 [ 996.530330] ? filp_open+0x60/0x60 [ 996.533860] ? fput+0xb/0x140 [ 996.537056] ? do_syscall_64+0x4c/0x640 [ 996.541066] ? do_sys_open+0x3e0/0x3e0 [ 996.545048] do_syscall_64+0x1d5/0x640 [ 996.549016] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 996.554422] RIP: 0033:0x416861 [ 996.557943] RSP: 002b:00007fc25bd0ba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 996.565819] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 0000000000416861 [ 996.573373] RDX: 00007fc25bd0bb0a RSI: 0000000000000002 RDI: 00007fc25bd0bb00 [ 996.581431] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 996.588961] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 996.596220] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 [ 996.616775] Cannot find del_set index 0 as target 13:42:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_UNLINK(r4, 0x4161, 0x0) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = msgget$private(0x0, 0x54) msgctl$IPC_RMID(r6, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000000000)) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) [ 996.636166] attempt to access beyond end of device [ 996.641137] loop1: rw=4096, want=136, limit=63 [ 996.648790] hfsplus: gid requires an argument [ 996.654626] hfsplus: unable to parse mount options [ 996.660486] gfs2: error 10 reading superblock [ 996.666063] gfs2: not a GFS2 filesystem 13:42:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:42:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:42:58 executing program 0 (fault-call:1 fault-nth:8): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:42:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_getsetattr(r2, &(0x7f0000000000)={0x4, 0x101, 0xfffffffffffffffe, 0xfffffffffffffffe}, &(0x7f0000000040)) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 996.757758] print_req_error: I/O error, dev loop1, sector 0 [ 996.791215] gfs2: not a GFS2 filesystem [ 996.798984] gfs2: not a GFS2 filesystem [ 996.830102] FAULT_INJECTION: forcing a failure. [ 996.830102] name failslab, interval 1, probability 0, space 0, times 0 [ 996.862771] CPU: 0 PID: 22119 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 996.870694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.880480] Call Trace: [ 996.883104] dump_stack+0x1b2/0x283 [ 996.886745] should_fail.cold+0x10a/0x154 [ 996.887151] attempt to access beyond end of device [ 996.891081] should_failslab+0xd6/0x130 [ 996.900092] kmem_cache_alloc+0x28e/0x3c0 [ 996.904270] get_empty_filp+0x86/0x3e0 [ 996.908167] path_openat+0x87/0x2aa0 [ 996.908263] gfs2: not a GFS2 filesystem [ 996.911984] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 996.911996] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 996.912005] ? kmem_cache_alloc+0x124/0x3c0 13:42:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 996.912015] ? getname_flags+0xc8/0x550 [ 996.912022] ? do_sys_open+0x202/0x3e0 [ 996.912036] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 996.929384] loop1: rw=4096, want=136, limit=63 [ 996.933326] ? simple_xattr_get+0xe5/0x160 [ 996.933340] ? path_mountpoint+0x960/0x960 [ 996.933352] ? trace_hardirqs_on+0x10/0x10 [ 996.933366] do_filp_open+0x18e/0x250 [ 996.933376] ? may_open_dev+0xe0/0xe0 [ 996.933385] ? __alloc_fd+0x1bf/0x490 [ 996.933395] ? lock_acquire+0x170/0x3f0 [ 996.933404] ? lock_downgrade+0x6e0/0x6e0 13:42:58 executing program 0 (fault-call:1 fault-nth:9): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 996.933418] ? do_raw_spin_unlock+0x164/0x250 [ 996.933426] ? __alloc_fd+0x1bf/0x490 [ 996.933439] do_sys_open+0x292/0x3e0 [ 996.933450] ? filp_open+0x60/0x60 [ 996.951995] gfs2: error 10 reading superblock [ 996.955720] ? fput+0xb/0x140 [ 996.955733] ? do_syscall_64+0x4c/0x640 [ 996.955740] ? do_sys_open+0x3e0/0x3e0 [ 996.955752] do_syscall_64+0x1d5/0x640 [ 996.955770] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 996.955777] RIP: 0033:0x416861 [ 996.955782] RSP: 002b:00007fc25bd0ba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 996.955791] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 0000000000416861 [ 996.955797] RDX: 00007fc25bd0bb0a RSI: 0000000000000002 RDI: 00007fc25bd0bb00 [ 996.955802] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 996.955808] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 996.955813] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 [ 997.049736] Cannot find del_set index 0 as target 13:42:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) set_mempolicy(0x0, &(0x7f00000000c0)=0x81f, 0x9) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) [ 997.098099] gfs2: not a GFS2 filesystem 13:42:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 997.139776] FAULT_INJECTION: forcing a failure. [ 997.139776] name failslab, interval 1, probability 0, space 0, times 0 [ 997.168144] CPU: 1 PID: 22145 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 997.177379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.182095] gfs2: not a GFS2 filesystem [ 997.186744] Call Trace: [ 997.186763] dump_stack+0x1b2/0x283 [ 997.186779] should_fail.cold+0x10a/0x154 [ 997.186796] should_failslab+0xd6/0x130 [ 997.206028] kmem_cache_alloc+0x28e/0x3c0 [ 997.210198] selinux_file_alloc_security+0xaf/0x190 [ 997.215235] security_file_alloc+0x66/0xa0 [ 997.219674] ? selinux_is_enabled+0x5/0x50 [ 997.224067] get_empty_filp+0x15c/0x3e0 [ 997.228052] path_openat+0x87/0x2aa0 [ 997.231781] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 997.236291] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 997.240886] ? kmem_cache_alloc+0x124/0x3c0 [ 997.245393] ? getname_flags+0xc8/0x550 [ 997.249632] ? do_sys_open+0x202/0x3e0 [ 997.253533] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 997.259008] ? simple_xattr_get+0xe5/0x160 [ 997.263258] ? path_mountpoint+0x960/0x960 [ 997.267595] ? trace_hardirqs_on+0x10/0x10 [ 997.271848] do_filp_open+0x18e/0x250 [ 997.275791] ? may_open_dev+0xe0/0xe0 [ 997.279760] ? __alloc_fd+0x1bf/0x490 [ 997.283664] ? lock_acquire+0x170/0x3f0 [ 997.287931] ? lock_downgrade+0x6e0/0x6e0 [ 997.292101] ? do_raw_spin_unlock+0x164/0x250 [ 997.296818] ? __alloc_fd+0x1bf/0x490 [ 997.300827] do_sys_open+0x292/0x3e0 [ 997.304558] ? filp_open+0x60/0x60 [ 997.308199] ? fput+0xb/0x140 [ 997.311319] ? do_syscall_64+0x4c/0x640 [ 997.315393] ? do_sys_open+0x3e0/0x3e0 [ 997.319381] do_syscall_64+0x1d5/0x640 [ 997.323471] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 997.328669] RIP: 0033:0x416861 [ 997.331873] RSP: 002b:00007fc25bd0ba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 997.339679] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 0000000000416861 [ 997.346961] RDX: 00007fc25bd0bb0a RSI: 0000000000000002 RDI: 00007fc25bd0bb00 [ 997.354397] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 997.361850] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 997.369524] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 [ 997.461328] gfs2: not a GFS2 filesystem 13:43:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:00 executing program 0 (fault-call:1 fault-nth:10): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:43:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x28, 0x3, 0x91, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r5 = gettid() ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) sendmsg$AUDIT_SET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x3e9, 0x100, 0x70bd26, 0x25dfdbfb, {0x1, 0x0, 0x0, r5, 0x4, 0xe1, 0x9, 0x800, 0x0, 0x1}, ["", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@noacl='noacl'}]}) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000001c0)=0x9b20) [ 999.431772] FAULT_INJECTION: forcing a failure. [ 999.431772] name failslab, interval 1, probability 0, space 0, times 0 [ 999.447476] attempt to access beyond end of device [ 999.457637] gfs2: not a GFS2 filesystem [ 999.458258] loop1: rw=4096, want=136, limit=63 [ 999.468668] CPU: 0 PID: 22173 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 999.476685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.486154] Call Trace: [ 999.488763] dump_stack+0x1b2/0x283 [ 999.492641] should_fail.cold+0x10a/0x154 [ 999.496804] should_failslab+0xd6/0x130 [ 999.501005] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 999.505707] ? loop_get_status64+0x100/0x100 [ 999.510320] __kthread_create_on_node+0xbe/0x3a0 [ 999.517774] ? kthread_park+0x130/0x130 [ 999.521853] ? lo_ioctl+0x87/0x1c00 [ 999.525492] ? __mutex_lock+0x2cb/0x1430 [ 999.529659] ? __fget+0x1ff/0x360 [ 999.533256] ? loop_get_status64+0x100/0x100 [ 999.537855] kthread_create_on_node+0xa8/0xd0 [ 999.542363] ? __kthread_create_on_node+0x3a0/0x3a0 [ 999.547407] ? __lockdep_init_map+0x100/0x560 [ 999.552001] ? __lockdep_init_map+0x100/0x560 [ 999.552167] gfs2: not a GFS2 filesystem [ 999.556661] lo_ioctl+0xca9/0x1c00 [ 999.556677] ? loop_clr_fd+0xac0/0xac0 [ 999.556692] blkdev_ioctl+0x91d/0x17c0 [ 999.572548] ? blkpg_ioctl+0x8d0/0x8d0 [ 999.576650] ? trace_hardirqs_on+0x10/0x10 [ 999.580992] block_ioctl+0xd9/0x120 [ 999.584852] ? blkdev_fallocate+0x3a0/0x3a0 [ 999.589343] do_vfs_ioctl+0x75a/0xfe0 [ 999.593424] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 999.599206] ? ioctl_preallocate+0x1a0/0x1a0 [ 999.603626] ? security_file_ioctl+0x76/0xb0 [ 999.608264] ? security_file_ioctl+0x83/0xb0 [ 999.612841] SyS_ioctl+0x7f/0xb0 [ 999.616375] ? do_vfs_ioctl+0xfe0/0xfe0 [ 999.620345] do_syscall_64+0x1d5/0x640 [ 999.624230] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 999.629576] RIP: 0033:0x45c937 [ 999.632759] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 999.640713] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045c937 [ 999.648874] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 999.656669] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 999.664320] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 999.671926] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:43:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 999.690214] Cannot find del_set index 0 as target [ 999.695201] gfs2: error 10 reading superblock 13:43:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:01 executing program 0 (fault-call:1 fault-nth:11): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 999.780483] attempt to access beyond end of device [ 999.787659] loop1: rw=4096, want=136, limit=63 [ 999.789000] gfs2: not a GFS2 filesystem [ 999.794922] FAULT_INJECTION: forcing a failure. [ 999.794922] name failslab, interval 1, probability 0, space 0, times 0 [ 999.808806] gfs2: error 10 reading superblock [ 999.828227] CPU: 1 PID: 22213 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 999.836144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.845610] Call Trace: [ 999.848214] dump_stack+0x1b2/0x283 [ 999.851869] should_fail.cold+0x10a/0x154 [ 999.856040] should_failslab+0xd6/0x130 [ 999.860305] kmem_cache_alloc+0x28e/0x3c0 [ 999.864559] __kernfs_new_node+0x6f/0x470 [ 999.868726] kernfs_new_node+0x7b/0xe0 [ 999.872716] kernfs_create_dir_ns+0x3c/0x130 [ 999.877229] internal_create_group+0xea/0x7e0 [ 999.881758] lo_ioctl+0x1108/0x1c00 [ 999.885405] ? loop_clr_fd+0xac0/0xac0 [ 999.889436] blkdev_ioctl+0x91d/0x17c0 [ 999.893582] ? blkpg_ioctl+0x8d0/0x8d0 [ 999.897661] ? trace_hardirqs_on+0x10/0x10 [ 999.902085] block_ioctl+0xd9/0x120 [ 999.905719] ? blkdev_fallocate+0x3a0/0x3a0 [ 999.910051] do_vfs_ioctl+0x75a/0xfe0 [ 999.913868] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 999.919507] ? ioctl_preallocate+0x1a0/0x1a0 [ 999.924026] ? security_file_ioctl+0x76/0xb0 [ 999.928455] ? security_file_ioctl+0x83/0xb0 [ 999.932887] SyS_ioctl+0x7f/0xb0 [ 999.936355] ? do_vfs_ioctl+0xfe0/0xfe0 [ 999.940343] do_syscall_64+0x1d5/0x640 [ 999.945553] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 999.950748] RIP: 0033:0x45c937 [ 999.953950] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 999.961666] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045c937 [ 999.968942] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 13:43:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 999.976218] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 999.983496] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 999.990929] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 13:43:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1000.025957] Cannot find del_set index 0 as target [ 1000.027359] hfsplus: gid requires an argument [ 1000.040855] print_req_error: I/O error, dev loop1, sector 0 [ 1000.041008] gfs2: not a GFS2 filesystem [ 1000.051390] hfsplus: unable to parse mount options 13:43:01 executing program 0 (fault-call:1 fault-nth:12): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:43:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1000.123568] attempt to access beyond end of device [ 1000.139380] loop1: rw=4096, want=136, limit=63 [ 1000.144978] gfs2: error 10 reading superblock [ 1000.149565] FAULT_INJECTION: forcing a failure. [ 1000.149565] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.149576] CPU: 1 PID: 22251 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 1000.149582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.149585] Call Trace: [ 1000.149601] dump_stack+0x1b2/0x283 [ 1000.149615] should_fail.cold+0x10a/0x154 [ 1000.149632] should_failslab+0xd6/0x130 [ 1000.179369] gfs2: not a GFS2 filesystem [ 1000.180725] kmem_cache_alloc+0x28e/0x3c0 [ 1000.180738] __kernfs_new_node+0x6f/0x470 [ 1000.180749] kernfs_new_node+0x7b/0xe0 [ 1000.194577] gfs2: not a GFS2 filesystem [ 1000.196670] __kernfs_create_file+0x3d/0x320 [ 1000.196686] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1000.196704] internal_create_group+0x23b/0x7e0 [ 1000.226865] lo_ioctl+0x1108/0x1c00 [ 1000.230595] ? loop_clr_fd+0xac0/0xac0 [ 1000.234489] blkdev_ioctl+0x91d/0x17c0 [ 1000.238471] ? blkpg_ioctl+0x8d0/0x8d0 [ 1000.242367] ? trace_hardirqs_on+0x10/0x10 [ 1000.246622] block_ioctl+0xd9/0x120 [ 1000.250256] ? blkdev_fallocate+0x3a0/0x3a0 [ 1000.254587] do_vfs_ioctl+0x75a/0xfe0 [ 1000.258447] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1000.264316] ? ioctl_preallocate+0x1a0/0x1a0 [ 1000.268743] ? security_file_ioctl+0x76/0xb0 [ 1000.273163] ? security_file_ioctl+0x83/0xb0 [ 1000.277585] SyS_ioctl+0x7f/0xb0 [ 1000.280976] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1000.285063] do_syscall_64+0x1d5/0x640 [ 1000.289308] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1000.294591] RIP: 0033:0x45c937 [ 1000.297794] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1000.305509] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045c937 [ 1000.312788] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 13:43:01 executing program 4 (fault-call:4 fault-nth:0): r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1000.313577] Cannot find del_set index 0 as target [ 1000.320439] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1000.320444] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1000.320450] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 [ 1000.361082] FAULT_INJECTION: forcing a failure. [ 1000.361082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1000.378370] CPU: 1 PID: 22268 Comm: syz-executor.4 Not tainted 4.14.183-syzkaller #0 [ 1000.386274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.395768] Call Trace: [ 1000.398359] dump_stack+0x1b2/0x283 [ 1000.401986] should_fail.cold+0x10a/0x154 [ 1000.406131] __alloc_pages_nodemask+0x22b/0x2730 [ 1000.410876] ? lock_downgrade+0x6e0/0x6e0 [ 1000.415066] ? ima_match_policy+0x3e3/0x10d0 [ 1000.419485] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1000.424364] ? __lock_acquire+0x655/0x42a0 [ 1000.428648] ? __lock_acquire+0x655/0x42a0 [ 1000.432994] ? __lock_acquire+0x655/0x42a0 [ 1000.437220] ? trace_hardirqs_on+0x10/0x10 [ 1000.441445] ? deref_stack_reg+0x8a/0xc0 [ 1000.445500] alloc_pages_vma+0x312/0x4b0 [ 1000.449556] do_huge_pmd_anonymous_page+0x2fc/0x1690 [ 1000.454650] ? prep_transhuge_page+0xa0/0xa0 [ 1000.459050] ? trace_hardirqs_on+0x10/0x10 [ 1000.463274] ? trace_hardirqs_on+0x10/0x10 [ 1000.467500] __handle_mm_fault+0x20fb/0x3670 [ 1000.471902] ? vm_insert_mixed_mkwrite+0x30/0x30 [ 1000.476658] handle_mm_fault+0x306/0x794 [ 1000.480709] __do_page_fault+0x578/0xb50 [ 1000.484766] ? mm_fault_error+0x2c0/0x2c0 [ 1000.488916] ? do_page_fault+0x60/0x4f2 [ 1000.492879] page_fault+0x25/0x50 [ 1000.496365] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1000.501974] RSP: 0018:ffff888035e8fd80 EFLAGS: 00010202 [ 1000.507325] RAX: ffffed1006bd1fbd RBX: 0000000000000010 RCX: 0000000000000002 [ 1000.514667] RDX: 0000000000000000 RSI: ffff888035e8fdd8 RDI: 0000000020af9ff0 [ 1000.521924] RBP: ffff888035e8fdd8 R08: 0000000000000000 R09: ffffed1006bd1fbd [ 1000.529227] R10: ffffed1006bd1fbc R11: ffff888035e8fde7 R12: 0000000020af9ff0 [ 1000.536514] R13: 00007ffffffff000 R14: 0000000020afa000 R15: 0000000020000140 [ 1000.543875] _copy_to_user+0xaa/0xd0 [ 1000.547577] put_itimerspec64+0xa9/0x190 [ 1000.551623] ? put_timespec64+0xf0/0xf0 [ 1000.555626] SyS_timerfd_settime+0xc1/0x110 [ 1000.559938] ? SyS_timerfd_create+0x300/0x300 [ 1000.564418] ? vfs_write+0x319/0x4d0 [ 1000.568158] ? fput+0xb/0x140 [ 1000.571267] ? SyS_write+0x14d/0x210 [ 1000.574968] ? SyS_clock_settime+0x1a0/0x1a0 [ 1000.579453] ? do_syscall_64+0x4c/0x640 [ 1000.583412] ? SyS_timerfd_create+0x300/0x300 [ 1000.587917] do_syscall_64+0x1d5/0x640 [ 1000.591793] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1000.596979] RIP: 0033:0x45ca69 [ 1000.600153] RSP: 002b:00007f081f475c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011e [ 1000.607848] RAX: ffffffffffffffda RBX: 000000000050a000 RCX: 000000000045ca69 [ 1000.615125] RDX: 0000000020000140 RSI: 0000000000000003 RDI: 0000000000000003 [ 1000.622379] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1000.629629] R10: 0000000020af9ff0 R11: 0000000000000246 R12: 0000000000000006 [ 1000.636880] R13: 0000000000000c46 R14: 00000000004ce9d0 R15: 00007f081f4766d4 [ 1000.678461] hfsplus: gid requires an argument [ 1000.683556] print_req_error: I/O error, dev loop1, sector 0 [ 1000.687505] hfsplus: unable to parse mount options 13:43:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:43:04 executing program 4 (fault-call:4 fault-nth:1): r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:04 executing program 0 (fault-call:1 fault-nth:13): getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) [ 1002.728631] attempt to access beyond end of device [ 1002.737847] gfs2: not a GFS2 filesystem [ 1002.739511] gfs2: not a GFS2 filesystem [ 1002.744874] loop1: rw=4096, want=136, limit=63 [ 1002.753806] FAULT_INJECTION: forcing a failure. [ 1002.753806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1002.761140] FAULT_INJECTION: forcing a failure. [ 1002.761140] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.765805] gfs2: error 10 reading superblock [ 1002.804527] CPU: 0 PID: 22290 Comm: syz-executor.4 Not tainted 4.14.183-syzkaller #0 [ 1002.812462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.821818] Call Trace: [ 1002.824426] dump_stack+0x1b2/0x283 [ 1002.828039] should_fail.cold+0x10a/0x154 [ 1002.832169] __alloc_pages_nodemask+0x22b/0x2730 [ 1002.837022] ? ima_match_policy+0x3e3/0x10d0 [ 1002.841416] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1002.846238] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1002.851078] ? __lock_acquire+0x655/0x42a0 [ 1002.855294] ? get_mem_cgroup_from_mm+0xf5/0x360 [ 1002.860030] ? drain_all_stock.part.0+0xa30/0xa30 [ 1002.864852] ? check_preemption_disabled+0x35/0x240 [ 1002.869853] ? lock_downgrade+0x6e0/0x6e0 [ 1002.873997] ? get_mem_cgroup_from_mm+0x112/0x360 [ 1002.878820] alloc_pages_current+0xe7/0x1e0 [ 1002.883120] ? mem_cgroup_try_charge+0x2fc/0x880 [ 1002.887870] pte_alloc_one+0x15/0x100 [ 1002.891663] do_huge_pmd_anonymous_page+0x91f/0x1690 [ 1002.896766] ? prep_transhuge_page+0xa0/0xa0 [ 1002.901245] ? trace_hardirqs_on+0x10/0x10 [ 1002.905463] __handle_mm_fault+0x20fb/0x3670 [ 1002.909853] ? vm_insert_mixed_mkwrite+0x30/0x30 [ 1002.914595] handle_mm_fault+0x306/0x794 [ 1002.918640] __do_page_fault+0x578/0xb50 [ 1002.922693] ? mm_fault_error+0x2c0/0x2c0 [ 1002.926829] ? do_page_fault+0x60/0x4f2 [ 1002.930787] page_fault+0x25/0x50 [ 1002.934219] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1002.939816] RSP: 0018:ffff88803823fd80 EFLAGS: 00010202 [ 1002.945157] RAX: ffffed1007047fbd RBX: 0000000000000010 RCX: 0000000000000002 [ 1002.952405] RDX: 0000000000000000 RSI: ffff88803823fdd8 RDI: 0000000020af9ff0 [ 1002.959653] RBP: ffff88803823fdd8 R08: 0000000000000000 R09: ffffed1007047fbd [ 1002.966902] R10: ffffed1007047fbc R11: ffff88803823fde7 R12: 0000000020af9ff0 [ 1002.974149] R13: 00007ffffffff000 R14: 0000000020afa000 R15: 0000000020000140 [ 1002.981425] _copy_to_user+0xaa/0xd0 [ 1002.985120] put_itimerspec64+0xa9/0x190 [ 1002.989161] ? put_timespec64+0xf0/0xf0 [ 1002.993121] SyS_timerfd_settime+0xc1/0x110 [ 1002.997423] ? SyS_timerfd_create+0x300/0x300 [ 1003.001895] ? vfs_write+0x319/0x4d0 [ 1003.005586] ? fput+0xb/0x140 [ 1003.008672] ? SyS_write+0x14d/0x210 [ 1003.012368] ? SyS_clock_settime+0x1a0/0x1a0 [ 1003.016755] ? do_syscall_64+0x4c/0x640 [ 1003.020721] ? SyS_timerfd_create+0x300/0x300 [ 1003.025197] do_syscall_64+0x1d5/0x640 [ 1003.029071] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1003.034245] RIP: 0033:0x45ca69 [ 1003.037430] RSP: 002b:00007f081f475c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011e [ 1003.045126] RAX: ffffffffffffffda RBX: 000000000050a000 RCX: 000000000045ca69 [ 1003.052372] RDX: 0000000020000140 RSI: 0000000000000003 RDI: 0000000000000003 [ 1003.059619] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1003.066869] R10: 0000000020af9ff0 R11: 0000000000000246 R12: 0000000000000006 [ 1003.074126] R13: 0000000000000c46 R14: 00000000004ce9d0 R15: 00007f081f4766d4 [ 1003.081386] CPU: 1 PID: 22292 Comm: syz-executor.0 Not tainted 4.14.183-syzkaller #0 [ 1003.089270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.099053] Call Trace: [ 1003.101641] dump_stack+0x1b2/0x283 [ 1003.105275] should_fail.cold+0x10a/0x154 [ 1003.109427] should_failslab+0xd6/0x130 [ 1003.113401] kmem_cache_alloc+0x28e/0x3c0 [ 1003.117552] __kernfs_new_node+0x6f/0x470 [ 1003.121696] kernfs_new_node+0x7b/0xe0 [ 1003.125584] __kernfs_create_file+0x3d/0x320 [ 1003.129991] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1003.134665] internal_create_group+0x23b/0x7e0 [ 1003.139253] lo_ioctl+0x1108/0x1c00 [ 1003.142880] ? loop_clr_fd+0xac0/0xac0 [ 1003.146765] blkdev_ioctl+0x91d/0x17c0 [ 1003.150650] ? blkpg_ioctl+0x8d0/0x8d0 13:43:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:43:04 executing program 4 (fault-call:4 fault-nth:2): r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1003.151348] Cannot find del_set index 0 as target [ 1003.154526] ? trace_hardirqs_on+0x10/0x10 [ 1003.154553] block_ioctl+0xd9/0x120 [ 1003.154564] ? blkdev_fallocate+0x3a0/0x3a0 [ 1003.154578] do_vfs_ioctl+0x75a/0xfe0 [ 1003.154590] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1003.154601] ? ioctl_preallocate+0x1a0/0x1a0 [ 1003.154618] ? security_file_ioctl+0x76/0xb0 [ 1003.154627] ? security_file_ioctl+0x83/0xb0 [ 1003.154636] SyS_ioctl+0x7f/0xb0 [ 1003.154647] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1003.193232] FAULT_INJECTION: forcing a failure. [ 1003.193232] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.197535] do_syscall_64+0x1d5/0x640 [ 1003.197559] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1003.197567] RIP: 0033:0x45c937 [ 1003.197571] RSP: 002b:00007fc25bd0ba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1003.230639] gfs2: not a GFS2 filesystem [ 1003.232635] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045c937 [ 1003.232641] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1003.232647] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1003.232654] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1003.232659] R13: 0000000000000bee R14: 00000000004ce337 R15: 00007fc25bd0c6d4 [ 1003.246029] CPU: 1 PID: 22309 Comm: syz-executor.4 Not tainted 4.14.183-syzkaller #0 [ 1003.280890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.290395] Call Trace: [ 1003.292973] dump_stack+0x1b2/0x283 [ 1003.297018] should_fail.cold+0x10a/0x154 [ 1003.301159] should_failslab+0xd6/0x130 [ 1003.305113] kmem_cache_alloc+0x28e/0x3c0 [ 1003.309263] ptlock_alloc+0x1d/0x70 [ 1003.312869] pte_alloc_one+0x57/0x100 [ 1003.316650] do_huge_pmd_anonymous_page+0x91f/0x1690 [ 1003.321839] ? prep_transhuge_page+0xa0/0xa0 [ 1003.326227] ? trace_hardirqs_on+0x10/0x10 [ 1003.330452] __handle_mm_fault+0x20fb/0x3670 [ 1003.334842] ? vm_insert_mixed_mkwrite+0x30/0x30 [ 1003.339588] handle_mm_fault+0x306/0x794 [ 1003.343649] __do_page_fault+0x578/0xb50 [ 1003.347694] ? mm_fault_error+0x2c0/0x2c0 [ 1003.351823] ? do_page_fault+0x60/0x4f2 [ 1003.355794] page_fault+0x25/0x50 [ 1003.359227] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1003.364840] RSP: 0018:ffff888038237d80 EFLAGS: 00010202 [ 1003.370183] RAX: ffffed1007046fbd RBX: 0000000000000010 RCX: 0000000000000002 [ 1003.377432] RDX: 0000000000000000 RSI: ffff888038237dd8 RDI: 0000000020af9ff0 [ 1003.384680] RBP: ffff888038237dd8 R08: 0000000000000000 R09: ffffed1007046fbd [ 1003.391930] R10: ffffed1007046fbc R11: ffff888038237de7 R12: 0000000020af9ff0 [ 1003.399177] R13: 00007ffffffff000 R14: 0000000020afa000 R15: 0000000020000140 [ 1003.406457] _copy_to_user+0xaa/0xd0 [ 1003.410160] put_itimerspec64+0xa9/0x190 [ 1003.414201] ? put_timespec64+0xf0/0xf0 [ 1003.418159] SyS_timerfd_settime+0xc1/0x110 [ 1003.422476] ? SyS_timerfd_create+0x300/0x300 [ 1003.426951] ? vfs_write+0x319/0x4d0 [ 1003.430645] ? fput+0xb/0x140 [ 1003.433730] ? SyS_write+0x14d/0x210 [ 1003.437426] ? SyS_clock_settime+0x1a0/0x1a0 [ 1003.441814] ? do_syscall_64+0x4c/0x640 [ 1003.445781] ? SyS_timerfd_create+0x300/0x300 [ 1003.450392] do_syscall_64+0x1d5/0x640 13:43:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1003.454285] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1003.459473] RIP: 0033:0x45ca69 [ 1003.462651] RSP: 002b:00007f081f475c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011e [ 1003.470338] RAX: ffffffffffffffda RBX: 000000000050a000 RCX: 000000000045ca69 [ 1003.477613] RDX: 0000000020000140 RSI: 0000000000000003 RDI: 0000000000000003 [ 1003.484879] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1003.493256] R10: 0000000020af9ff0 R11: 0000000000000246 R12: 0000000000000006 [ 1003.500507] R13: 0000000000000c46 R14: 00000000004ce9d0 R15: 00007f081f4766d4 13:43:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 13:43:05 executing program 4 (fault-call:4 fault-nth:3): r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1003.617863] attempt to access beyond end of device [ 1003.621628] gfs2: not a GFS2 filesystem [ 1003.630342] loop1: rw=4096, want=136, limit=63 [ 1003.649427] gfs2: error 10 reading superblock [ 1003.675214] gfs2: not a GFS2 filesystem [ 1003.713707] Cannot find del_set index 0 as target 13:43:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:07 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="94cabc793f5427a63cdc0021f84bff3e662e08a8c74990d963495904ff59c8d6a715bfdd4d1aebc3986454fa8c0448c78c2c2e940152bb1f8364a577fcc97b2f948c5840998db3", @ANYRESHEX=r0, @ANYBLOB=',\x00', @ANYBLOB="a95c23b002891796b9562110b6bec63693f35d56ac5fe3010828dfb6ee6c7f805cf252cd180da261d14db9bb0d2506eef6923a0a8062a0edc5441248accf3ce69bd6e5d9ce6be2a099572c684ca62775002b6bb33ae995718959b30188433932921263931b1a62fe5112bd91e8a0779559e6a88096be05c5ab", @ANYRESDEC=r0, @ANYRESDEC=r1]) 13:43:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:07 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket(0x11, 0x4, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f0000000000)="908abe3809cd68dc25a3347ef0faa8caf1156beb52065bce1b9d9d3a61cb2bee99ece94ab2f3630071c06de1443c4c5d034efc68dfcf60f4b7cf19729060594896b387c36f68789895f94a087c9093", 0x4f) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 13:43:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:07 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=""/54, &(0x7f0000000040)=0x36) 13:43:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 1005.766031] attempt to access beyond end of device [ 1005.771002] loop1: rw=4096, want=136, limit=63 [ 1005.773001] gfs2: not a GFS2 filesystem [ 1005.775895] gfs2: not a GFS2 filesystem [ 1005.803226] gfs2: error 10 reading superblock 13:43:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1005.854323] hfsplus: unable to parse mount options [ 1005.859060] gfs2: not a GFS2 filesystem [ 1005.882105] Cannot find del_set index 0 as target 13:43:07 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x200800, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x7) ioctl$TIOCSETD(r4, 0x5412, 0x0) ioctl$TIOCSETD(r4, 0x5412, &(0x7f0000000100)=0xfffffff7) sendfile(r3, r4, &(0x7f0000000080)=0x101, 0x0) socket$netlink(0x10, 0x3, 0x0) preadv(r2, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1005.912197] gfs2: not a GFS2 filesystem 13:43:07 executing program 2 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:07 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',\x00']) [ 1006.012159] hfsplus: unable to parse mount options [ 1006.044112] FAULT_INJECTION: forcing a failure. [ 1006.044112] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.082126] CPU: 0 PID: 22402 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1006.090302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.099651] Call Trace: [ 1006.102230] dump_stack+0x1b2/0x283 [ 1006.105843] should_fail.cold+0x10a/0x154 [ 1006.109980] should_failslab+0xd6/0x130 [ 1006.113953] __kmalloc+0x2c1/0x400 [ 1006.117473] ? SyS_memfd_create+0xb9/0x3a0 [ 1006.121690] SyS_memfd_create+0xb9/0x3a0 [ 1006.125733] ? shmem_fcntl+0x120/0x120 [ 1006.129615] ? SyS_clock_settime+0x1a0/0x1a0 [ 1006.134020] ? do_syscall_64+0x4c/0x640 [ 1006.137986] ? shmem_fcntl+0x120/0x120 [ 1006.141874] do_syscall_64+0x1d5/0x640 [ 1006.145756] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1006.150931] RIP: 0033:0x45ca69 [ 1006.154124] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1006.161815] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1006.169154] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1006.176402] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1006.183651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1006.190921] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1006.339897] sp0: Synchronizing with TNC 13:43:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:10 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:10 executing program 2 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:10 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}, {0x0, 0x3938700}}, &(0x7f0000af9ff0)) 13:43:10 executing program 0: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PRIVATE_KEY={0x24}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r7}}]}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r8, 0x8982, &(0x7f0000000280)={0x0, 'team_slave_1\x00', {0x2}, 0x5}) [ 1008.797405] gfs2: not a GFS2 filesystem [ 1008.815088] FAULT_INJECTION: forcing a failure. [ 1008.815088] name failslab, interval 1, probability 0, space 0, times 0 [ 1008.839490] CPU: 0 PID: 22441 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1008.845744] attempt to access beyond end of device [ 1008.847398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.847403] Call Trace: [ 1008.847422] dump_stack+0x1b2/0x283 [ 1008.847438] should_fail.cold+0x10a/0x154 [ 1008.867436] loop1: rw=4096, want=136, limit=63 [ 1008.867902] should_failslab+0xd6/0x130 [ 1008.880615] kmem_cache_alloc+0x28e/0x3c0 [ 1008.882025] gfs2: error 10 reading superblock [ 1008.884764] __d_alloc+0x2a/0x9b0 [ 1008.884776] ? lock_downgrade+0x6e0/0x6e0 [ 1008.884794] __shmem_file_setup.part.0+0xcb/0x3c0 [ 1008.903418] ? shmem_rename2+0x6e0/0x6e0 [ 1008.907479] ? __alloc_fd+0x1bf/0x490 [ 1008.911288] SyS_memfd_create+0x1f6/0x3a0 [ 1008.914292] Cannot find del_set index 0 as target [ 1008.915432] ? shmem_fcntl+0x120/0x120 [ 1008.915444] ? SyS_clock_settime+0x1a0/0x1a0 [ 1008.915454] ? do_syscall_64+0x4c/0x640 [ 1008.915465] ? shmem_fcntl+0x120/0x120 [ 1008.938478] do_syscall_64+0x1d5/0x640 [ 1008.942370] entry_SYSCALL_64_after_hwframe+0x46/0xbb 13:43:10 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(r1, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f00000000c0)={r2, 0x1, 0x2, 0x3, 0x9, 0x7fffffff, 0x3, 0x7fffffff, 0x6, 0x400, 0x1000, 0x1ff}) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x80, 0x50500) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="6702000000000000057b23df8dc47b3482040000000401010001030000000000"], 0x20) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\a\x00', @ANYRES16=r5, @ANYBLOB="200025bd7000fcdbdf250700000014000300fe80000000000000000000000000003014000000fc010000000000000000000000000001"], 0x3c}}, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r5, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x3c}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x24048804) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snd/seq\x00', 0x210000) fcntl$F_GET_FILE_RW_HINT(r6, 0x40d, &(0x7f0000000340)) [ 1008.947556] RIP: 0033:0x45ca69 [ 1008.950739] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1008.958441] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1008.964159] hfsplus: gid requires an argument [ 1008.965729] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1008.970207] hfsplus: unable to parse mount options [ 1008.977457] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1008.977463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 13:43:10 executing program 2 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1008.977468] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:43:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:10 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1009.041989] print_req_error: I/O error, dev loop1, sector 0 [ 1009.085903] FAULT_INJECTION: forcing a failure. [ 1009.085903] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.126967] gfs2: not a GFS2 filesystem [ 1009.132398] CPU: 0 PID: 22468 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1009.140291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.149644] Call Trace: [ 1009.152502] dump_stack+0x1b2/0x283 [ 1009.156146] should_fail.cold+0x10a/0x154 [ 1009.160305] should_failslab+0xd6/0x130 [ 1009.164321] kmem_cache_alloc+0x28e/0x3c0 [ 1009.168473] ? shmem_destroy_callback+0xa0/0xa0 [ 1009.173141] shmem_alloc_inode+0x18/0x40 13:43:10 executing program 4: r0 = timerfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket$netlink(0x10, 0x3, 0x4) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x50, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_SCHED_SCAN_MATCH={0x3c, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @dev}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x2c, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_2GHZ={0x8}]}]}]}, 0x50}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, r5, 0x200, 0x6, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x3}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1ff, 0x3}}]}, 0x48}, 0x1, 0x0, 0x0, 0x40014}, 0x20000002) [ 1009.177198] ? shmem_destroy_callback+0xa0/0xa0 [ 1009.181865] alloc_inode+0x5d/0x170 [ 1009.185490] new_inode_pseudo+0x14/0xe0 [ 1009.189461] new_inode+0x1b/0x40 [ 1009.192824] shmem_get_inode+0x74/0x780 [ 1009.196802] __shmem_file_setup.part.0+0x104/0x3c0 [ 1009.200244] attempt to access beyond end of device [ 1009.201728] ? shmem_rename2+0x6e0/0x6e0 [ 1009.201737] ? __alloc_fd+0x1bf/0x490 [ 1009.201752] SyS_memfd_create+0x1f6/0x3a0 [ 1009.201763] ? shmem_fcntl+0x120/0x120 [ 1009.212533] loop1: rw=4096, want=136, limit=63 [ 1009.214505] ? SyS_clock_settime+0x1a0/0x1a0 [ 1009.214518] ? do_syscall_64+0x4c/0x640 [ 1009.214529] ? shmem_fcntl+0x120/0x120 [ 1009.214541] do_syscall_64+0x1d5/0x640 [ 1009.214559] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1009.222347] gfs2: error 10 reading superblock [ 1009.222564] RIP: 0033:0x45ca69 [ 1009.256042] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1009.263752] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 13:43:10 executing program 2 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1009.271052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1009.278309] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1009.285558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1009.292824] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1009.309807] Cannot find del_set index 0 as target [ 1009.330112] FAULT_INJECTION: forcing a failure. [ 1009.330112] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.341563] CPU: 0 PID: 22485 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1009.349446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.358800] Call Trace: [ 1009.361396] dump_stack+0x1b2/0x283 [ 1009.365034] should_fail.cold+0x10a/0x154 [ 1009.369188] should_failslab+0xd6/0x130 [ 1009.373166] kmem_cache_alloc+0x28e/0x3c0 [ 1009.377318] selinux_inode_alloc_security+0xb1/0x2a0 [ 1009.382423] security_inode_alloc+0x8f/0xd0 [ 1009.386747] inode_init_always+0x576/0xb10 [ 1009.391407] alloc_inode+0x7a/0x170 [ 1009.395020] new_inode_pseudo+0x14/0xe0 [ 1009.398976] new_inode+0x1b/0x40 [ 1009.402388] shmem_get_inode+0x74/0x780 [ 1009.406395] __shmem_file_setup.part.0+0x104/0x3c0 [ 1009.411308] ? shmem_rename2+0x6e0/0x6e0 [ 1009.415474] ? __alloc_fd+0x1bf/0x490 [ 1009.419325] SyS_memfd_create+0x1f6/0x3a0 [ 1009.423513] ? shmem_fcntl+0x120/0x120 [ 1009.427432] ? SyS_clock_settime+0x1a0/0x1a0 [ 1009.431820] ? do_syscall_64+0x4c/0x640 [ 1009.435777] ? shmem_fcntl+0x120/0x120 [ 1009.439644] do_syscall_64+0x1d5/0x640 [ 1009.443524] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1009.448696] RIP: 0033:0x45ca69 [ 1009.451883] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1009.460549] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1009.467797] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 13:43:10 executing program 2 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1009.475045] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1009.482293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1009.489556] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1009.504135] print_req_error: I/O error, dev loop1, sector 0 [ 1009.531868] FAULT_INJECTION: forcing a failure. [ 1009.531868] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.543525] CPU: 0 PID: 22491 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1009.551406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.560929] Call Trace: [ 1009.563514] dump_stack+0x1b2/0x283 [ 1009.567150] should_fail.cold+0x10a/0x154 [ 1009.571368] should_failslab+0xd6/0x130 [ 1009.575321] kmem_cache_alloc+0x28e/0x3c0 [ 1009.579465] get_empty_filp+0x86/0x3e0 [ 1009.583332] alloc_file+0x23/0x440 [ 1009.586861] __shmem_file_setup.part.0+0x198/0x3c0 [ 1009.591774] ? shmem_rename2+0x6e0/0x6e0 [ 1009.595813] ? __alloc_fd+0x1bf/0x490 [ 1009.599619] SyS_memfd_create+0x1f6/0x3a0 [ 1009.603748] ? shmem_fcntl+0x120/0x120 [ 1009.607618] ? SyS_clock_settime+0x1a0/0x1a0 [ 1009.612009] ? do_syscall_64+0x4c/0x640 [ 1009.615963] ? shmem_fcntl+0x120/0x120 [ 1009.619843] do_syscall_64+0x1d5/0x640 [ 1009.623714] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1009.628904] RIP: 0033:0x45ca69 [ 1009.632072] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1009.639761] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1009.647531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1009.654779] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1009.662042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1009.669819] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1009.691380] gfs2: not a GFS2 filesystem [ 1009.716996] hfsplus: gid requires an argument [ 1009.737064] hfsplus: unable to parse mount options 13:43:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:13 executing program 2 (fault-call:4 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:13 executing program 4: r0 = timerfd_create(0x0, 0x80000) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) open(&(0x7f0000000000)='./file0\x00', 0x101100, 0x48) 13:43:13 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) write$snddsp(r3, &(0x7f0000000040)="ab3c151b374f0ecab04047f75546bff3c746bd7df7823dc052501e69ac9519ff496ec4543c98833de1fde0e102063a5cc5698d2e5e41e4ddc5f906d53528c648580882cf9779f8c190595f9d2450ac79fe0ccd575d4384123a9232ea17e559899ebcc9a68484ecf50f236def5fb4cb3295ac8f060534d3", 0x77) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001100010000000000000000000108000a14000000050a0102000000000000000000002100140023001100010000000000000000000000000ad3965943d892509b1397d1834baf562bc609e216166f27c08e6706343dc08a163a6edad47597e29ab1378117e4e224f0e7fcb330591acd9b3733844f93cf0c40a735265b27df28453089894b503c86ac6583d8f4b307021a104574ab8e6f5195d4a29184ede562434595241f848c99"], 0x3c}}, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)=0x8001) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x1000000080, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:43:13 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = socket(0x11, 0x800000003, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x3ff, 0x5, 0x9}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1011.878989] FAULT_INJECTION: forcing a failure. [ 1011.878989] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.894675] hfsplus: gid requires an argument [ 1011.898703] attempt to access beyond end of device [ 1011.904012] hfsplus: unable to parse mount options [ 1011.932583] CPU: 1 PID: 22523 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1011.935300] loop1: rw=4096, want=136, limit=63 [ 1011.940479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.940484] Call Trace: [ 1011.940505] dump_stack+0x1b2/0x283 [ 1011.940522] should_fail.cold+0x10a/0x154 [ 1011.940538] should_failslab+0xd6/0x130 [ 1011.940548] kmem_cache_alloc+0x28e/0x3c0 [ 1011.940562] selinux_file_alloc_security+0xaf/0x190 [ 1011.940574] security_file_alloc+0x66/0xa0 [ 1011.940581] ? selinux_is_enabled+0x5/0x50 [ 1011.940591] get_empty_filp+0x15c/0x3e0 [ 1011.940601] alloc_file+0x23/0x440 [ 1011.940614] __shmem_file_setup.part.0+0x198/0x3c0 [ 1011.940626] ? shmem_rename2+0x6e0/0x6e0 [ 1011.940632] ? __alloc_fd+0x1bf/0x490 [ 1011.940646] SyS_memfd_create+0x1f6/0x3a0 [ 1011.940657] ? shmem_fcntl+0x120/0x120 [ 1011.940667] ? SyS_clock_settime+0x1a0/0x1a0 [ 1011.940677] ? do_syscall_64+0x4c/0x640 [ 1011.940685] ? shmem_fcntl+0x120/0x120 [ 1011.940696] do_syscall_64+0x1d5/0x640 13:43:13 executing program 2 (fault-call:4 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1011.940710] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1011.940718] RIP: 0033:0x45ca69 [ 1011.940723] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1011.940734] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1011.940739] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1011.940745] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1011.940750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 13:43:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1011.940756] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1012.015743] Cannot find del_set index 0 as target [ 1012.039277] FAULT_INJECTION: forcing a failure. [ 1012.039277] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.106593] hfsplus: gid requires an argument [ 1012.114388] hfsplus: unable to parse mount options [ 1012.119725] gfs2: error 10 reading superblock 13:43:13 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) socket$rds(0x15, 0x5, 0x0) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) [ 1012.145467] CPU: 0 PID: 22544 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1012.153365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.162713] Call Trace: [ 1012.165406] dump_stack+0x1b2/0x283 [ 1012.169045] should_fail.cold+0x10a/0x154 [ 1012.173397] should_failslab+0xd6/0x130 [ 1012.177375] kmem_cache_alloc+0x28e/0x3c0 [ 1012.181524] getname_flags+0xc8/0x550 [ 1012.185329] do_sys_open+0x202/0x3e0 [ 1012.189042] ? filp_open+0x60/0x60 [ 1012.192582] ? fput+0xb/0x140 [ 1012.195686] ? do_syscall_64+0x4c/0x640 [ 1012.199653] ? do_sys_open+0x3e0/0x3e0 [ 1012.203533] do_syscall_64+0x1d5/0x640 [ 1012.207424] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1012.212609] RIP: 0033:0x416861 [ 1012.215776] RSP: 002b:00007f21c56f9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1012.223461] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1012.230707] RDX: 00007f21c56f9b0a RSI: 0000000000000002 RDI: 00007f21c56f9b00 [ 1012.237957] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 13:43:13 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ftruncate(r3, 0x1) 13:43:13 executing program 2 (fault-call:4 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1012.245206] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1012.252453] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1012.326704] FAULT_INJECTION: forcing a failure. [ 1012.326704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1012.338531] CPU: 0 PID: 22565 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1012.346413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.355767] Call Trace: [ 1012.358377] dump_stack+0x1b2/0x283 [ 1012.362367] should_fail.cold+0x10a/0x154 [ 1012.366527] ? lock_acquire+0x170/0x3f0 [ 1012.370510] __alloc_pages_nodemask+0x22b/0x2730 [ 1012.375285] ? trace_hardirqs_on+0x10/0x10 [ 1012.379526] ? quarantine_put+0xc9/0x190 [ 1012.383589] ? simple_xattr_get+0xe5/0x160 [ 1012.387862] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1012.392722] ? trace_hardirqs_on+0x10/0x10 [ 1012.397238] ? __fsnotify_inode_delete+0x20/0x20 [ 1012.401998] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1012.408664] ? setattr_copy+0x143/0x550 [ 1012.412633] cache_grow_begin+0x91/0x410 [ 1012.415366] hfsplus: gid requires an argument [ 1012.416688] cache_alloc_refill+0x28c/0x360 [ 1012.425484] kmem_cache_alloc+0x333/0x3c0 [ 1012.426193] hfsplus: unable to parse mount options [ 1012.429649] getname_flags+0xc8/0x550 [ 1012.429664] do_sys_open+0x202/0x3e0 [ 1012.429673] ? filp_open+0x60/0x60 [ 1012.429684] ? fput+0xb/0x140 [ 1012.448817] ? do_syscall_64+0x4c/0x640 [ 1012.452793] ? do_sys_open+0x3e0/0x3e0 [ 1012.456686] do_syscall_64+0x1d5/0x640 [ 1012.460594] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1012.465774] RIP: 0033:0x416861 [ 1012.468943] RSP: 002b:00007f21c56f9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1012.477226] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1012.484481] RDX: 00007f21c56f9b0a RSI: 0000000000000002 RDI: 00007f21c56f9b00 [ 1012.491796] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1012.499059] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1012.506318] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1012.524828] gfs2: not a GFS2 filesystem [ 1012.585241] hfsplus: gid requires an argument [ 1012.589861] hfsplus: unable to parse mount options 13:43:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:16 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) ioctl$MON_IOCX_GET(r2, 0x40189206, &(0x7f0000000100)={&(0x7f0000000000), &(0x7f0000000040)=""/172, 0xac}) 13:43:16 executing program 2 (fault-call:4 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:16 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) fgetxattr(r1, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000140)=""/166, 0xa6) [ 1014.896534] FAULT_INJECTION: forcing a failure. [ 1014.896534] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.898682] attempt to access beyond end of device [ 1014.925195] hfsplus: gid requires an argument [ 1014.929927] hfsplus: unable to parse mount options [ 1014.940390] loop1: rw=4096, want=136, limit=63 [ 1014.943558] CPU: 0 PID: 22594 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1014.949173] gfs2: error 10 reading superblock [ 1014.952878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.952883] Call Trace: [ 1014.952903] dump_stack+0x1b2/0x283 [ 1014.952921] should_fail.cold+0x10a/0x154 [ 1014.952936] should_failslab+0xd6/0x130 [ 1014.952946] kmem_cache_alloc+0x28e/0x3c0 [ 1014.952958] get_empty_filp+0x86/0x3e0 [ 1014.952969] path_openat+0x87/0x2aa0 13:43:16 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$UHID_INPUT2(r4, &(0x7f0000000000)={0xc, {0x1, 'b'}}, 0x7) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:16 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008008bdacde40100736671004c00020000010000ce0000000000000000000000000000000000f0b2b70000000000000000000002000000070000000000000000003cd3bb9800"/96], 0x78}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) [ 1014.952980] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 1014.952992] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1014.953001] ? kmem_cache_alloc+0x124/0x3c0 [ 1014.953009] ? getname_flags+0xc8/0x550 [ 1014.953016] ? do_sys_open+0x202/0x3e0 [ 1014.953032] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1014.953043] ? simple_xattr_get+0xe5/0x160 [ 1014.953054] ? path_mountpoint+0x960/0x960 [ 1014.953066] ? trace_hardirqs_on+0x10/0x10 [ 1014.953081] do_filp_open+0x18e/0x250 [ 1014.953091] ? may_open_dev+0xe0/0xe0 [ 1014.953100] ? __alloc_fd+0x1bf/0x490 [ 1014.953110] ? lock_acquire+0x170/0x3f0 [ 1014.953119] ? lock_downgrade+0x6e0/0x6e0 [ 1014.953132] ? do_raw_spin_unlock+0x164/0x250 [ 1014.981167] Cannot find del_set index 0 as target [ 1014.981316] ? __alloc_fd+0x1bf/0x490 [ 1015.043990] Cannot find del_set index 0 as target [ 1015.047518] do_sys_open+0x292/0x3e0 [ 1015.047530] ? filp_open+0x60/0x60 [ 1015.047542] ? fput+0xb/0x140 [ 1015.047553] ? do_syscall_64+0x4c/0x640 [ 1015.047562] ? do_sys_open+0x3e0/0x3e0 [ 1015.087812] do_syscall_64+0x1d5/0x640 [ 1015.091694] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1015.097213] RIP: 0033:0x416861 [ 1015.100400] RSP: 002b:00007f21c56f9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1015.108095] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1015.119774] RDX: 00007f21c56f9b0a RSI: 0000000000000002 RDI: 00007f21c56f9b00 [ 1015.127039] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1015.134290] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 13:43:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1015.141538] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:43:16 executing program 2 (fault-call:4 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1015.193683] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1015.210490] attempt to access beyond end of device [ 1015.215442] loop1: rw=4096, want=136, limit=63 [ 1015.220236] gfs2: error 10 reading superblock [ 1015.250211] FAULT_INJECTION: forcing a failure. [ 1015.250211] name failslab, interval 1, probability 0, space 0, times 0 [ 1015.264034] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1015.275181] Cannot find del_set index 0 as target [ 1015.300322] CPU: 0 PID: 22639 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1015.308222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.317573] Call Trace: [ 1015.320166] dump_stack+0x1b2/0x283 [ 1015.323800] should_fail.cold+0x10a/0x154 [ 1015.327952] should_failslab+0xd6/0x130 [ 1015.331929] kmem_cache_alloc+0x28e/0x3c0 [ 1015.336083] selinux_file_alloc_security+0xaf/0x190 [ 1015.341100] security_file_alloc+0x66/0xa0 [ 1015.345332] ? selinux_is_enabled+0x5/0x50 [ 1015.349653] get_empty_filp+0x15c/0x3e0 [ 1015.355287] path_openat+0x87/0x2aa0 [ 1015.359008] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 1015.363507] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1015.368006] ? kmem_cache_alloc+0x124/0x3c0 [ 1015.372326] ? getname_flags+0xc8/0x550 [ 1015.376298] ? do_sys_open+0x202/0x3e0 [ 1015.380189] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1015.385554] ? simple_xattr_get+0xe5/0x160 [ 1015.389797] ? path_mountpoint+0x960/0x960 [ 1015.394034] ? trace_hardirqs_on+0x10/0x10 [ 1015.398273] do_filp_open+0x18e/0x250 [ 1015.402072] ? may_open_dev+0xe0/0xe0 [ 1015.405870] ? __alloc_fd+0x1bf/0x490 [ 1015.409674] ? lock_acquire+0x170/0x3f0 [ 1015.413649] ? lock_downgrade+0x6e0/0x6e0 [ 1015.417797] ? do_raw_spin_unlock+0x164/0x250 [ 1015.422290] ? __alloc_fd+0x1bf/0x490 [ 1015.426092] do_sys_open+0x292/0x3e0 [ 1015.429805] ? filp_open+0x60/0x60 [ 1015.433345] ? fput+0xb/0x140 [ 1015.437066] ? do_syscall_64+0x4c/0x640 [ 1015.441033] ? do_sys_open+0x3e0/0x3e0 [ 1015.445090] do_syscall_64+0x1d5/0x640 [ 1015.449022] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1015.454189] RIP: 0033:0x416861 [ 1015.457418] RSP: 002b:00007f21c56f9a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1015.465111] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1015.472368] RDX: 00007f21c56f9b0a RSI: 0000000000000002 RDI: 00007f21c56f9b00 [ 1015.479615] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1015.486912] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1015.494169] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:43:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:19 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r0) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733d76697274696f2c63616368653d6c6f6f73652c63616368653d667363616368652c616669643d3078303030303030303030303030303030342c616e616d653d70726f634b2c667363616368652c6163636573733d616e792c6e6f657874656e642c63616368653d667363616368652c64656275673d30783030303030303030303030303033f7612c6f626a5f726f6c653d2c686173682c7569643d", @ANYRESDEC=r0, @ANYBLOB=',smackfsfloor=)GPL,\x00']) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000000040)={[{@barrier='barrier'}], [{@smackfshat={'smackfshat', 0x3d, '\x14'}}, {@appraise='appraise'}, {@smackfsdef={'smackfsdef', 0x3d, 'hfsplus\x00'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fowner_gt={'fowner>', r0}}, {@smackfshat={'smackfshat', 0x3d, 'aname'}}]}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000340)={0xa00000, 0x9, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x990901, 0x101, [], @string=&(0x7f00000002c0)=0x3}}) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000380)=[0x1, 0x83dd]) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a14000000050a0102000000c5ab3ce60000000000140000001100010000000000000000000000000a"], 0x3c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="3400010000000000000000000000000a14000000050a0102000000000000000000000000140000001100010000000000000000000000000a"], 0x3c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x4002}, {r2, 0xb350}, {r3, 0x8021}, {r4, 0xd101}, {r1, 0x221}, {r1, 0x4}, {r5, 0x1}, {r6, 0x2}, {r1, 0x400}, {r7, 0x1001}], 0xa, &(0x7f0000000440)={0x0, 0x989680}, &(0x7f0000000480)={[0x800]}, 0x8) 13:43:19 executing program 4: r0 = timerfd_create(0x0, 0x0) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x130282, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000180)=0x2) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r7, 0xc00c55ca, &(0x7f0000000380)={0x0, 0x80000000, 0xfffff001}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r8) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r8}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')GPL'}}]}}) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000240)="42105a18ad367d377690ff11b66171dcf1060a34e46bebf13e6a91abf91342ae5e30b1f03db6e57c0c059b723b50bf4f1088bfdd84b8b34b1ee3", 0x3a}, {&(0x7f0000000280)="23f069b6ea955ce63606172256384a65", 0x10, 0x1f}], 0x2120012, &(0x7f0000000500)={[{@map_off='map=off'}], [{@subj_type={'subj_type', 0x3d, '%'}}, {@fowner_lt={'fowner<', r8}}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}, {@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, '(._@-:^'}}]}) fsetxattr(r3, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)='\x00', 0x1, 0x0) 13:43:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:19 executing program 2 (fault-call:4 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1017.922791] FAULT_INJECTION: forcing a failure. [ 1017.922791] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.938946] CPU: 1 PID: 22658 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1017.941795] attempt to access beyond end of device [ 1017.946881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.946886] Call Trace: [ 1017.946906] dump_stack+0x1b2/0x283 [ 1017.946923] should_fail.cold+0x10a/0x154 [ 1017.957488] hfsplus: unable to parse mount options [ 1017.961192] should_failslab+0xd6/0x130 [ 1017.961204] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1017.961217] ? loop_get_status64+0x100/0x100 [ 1017.961229] __kthread_create_on_node+0xbe/0x3a0 [ 1017.961241] ? kthread_park+0x130/0x130 [ 1017.961249] ? lo_ioctl+0x87/0x1c00 [ 1017.961257] ? __mutex_lock+0x2cb/0x1430 [ 1017.961273] ? __fget+0x1ff/0x360 [ 1017.986626] loop1: rw=4096, want=136, limit=63 [ 1017.989587] ? loop_get_status64+0x100/0x100 [ 1017.989601] kthread_create_on_node+0xa8/0xd0 [ 1017.989611] ? __kthread_create_on_node+0x3a0/0x3a0 [ 1017.989623] ? __lockdep_init_map+0x100/0x560 [ 1017.989633] ? __lockdep_init_map+0x100/0x560 [ 1017.989646] lo_ioctl+0xca9/0x1c00 [ 1017.989660] ? loop_clr_fd+0xac0/0xac0 [ 1017.989671] blkdev_ioctl+0x91d/0x17c0 [ 1017.989679] ? blkpg_ioctl+0x8d0/0x8d0 [ 1017.989687] ? trace_hardirqs_on+0x10/0x10 [ 1017.989707] block_ioctl+0xd9/0x120 [ 1017.989718] ? blkdev_fallocate+0x3a0/0x3a0 [ 1018.014205] gfs2: error 10 reading superblock [ 1018.018466] do_vfs_ioctl+0x75a/0xfe0 [ 1018.018481] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1018.018493] ? ioctl_preallocate+0x1a0/0x1a0 [ 1018.029129] Cannot find del_set index 0 as target [ 1018.032454] ? security_file_ioctl+0x76/0xb0 [ 1018.032464] ? security_file_ioctl+0x83/0xb0 [ 1018.032476] SyS_ioctl+0x7f/0xb0 [ 1018.032486] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1018.032499] do_syscall_64+0x1d5/0x640 [ 1018.032516] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1018.032523] RIP: 0033:0x45c937 [ 1018.032528] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1018.032538] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1018.032543] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1018.032548] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1018.032552] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1018.032561] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:43:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:19 executing program 2 (fault-call:4 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1018.257445] FAULT_INJECTION: forcing a failure. [ 1018.257445] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.272386] attempt to access beyond end of device [ 1018.277493] loop1: rw=4096, want=136, limit=63 [ 1018.283886] CPU: 0 PID: 22698 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1018.291777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.301323] Call Trace: [ 1018.303917] dump_stack+0x1b2/0x283 [ 1018.307555] should_fail.cold+0x10a/0x154 [ 1018.311707] should_failslab+0xd6/0x130 [ 1018.315682] kmem_cache_alloc+0x28e/0x3c0 [ 1018.319832] __kernfs_new_node+0x6f/0x470 [ 1018.323984] kernfs_new_node+0x7b/0xe0 [ 1018.327972] kernfs_create_dir_ns+0x3c/0x130 [ 1018.332384] internal_create_group+0xea/0x7e0 [ 1018.336892] lo_ioctl+0x1108/0x1c00 [ 1018.340523] ? loop_clr_fd+0xac0/0xac0 [ 1018.345025] blkdev_ioctl+0x91d/0x17c0 [ 1018.348912] ? blkpg_ioctl+0x8d0/0x8d0 [ 1018.352800] ? trace_hardirqs_on+0x10/0x10 13:43:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1018.357044] block_ioctl+0xd9/0x120 [ 1018.360671] ? blkdev_fallocate+0x3a0/0x3a0 [ 1018.364995] do_vfs_ioctl+0x75a/0xfe0 [ 1018.368807] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1018.374444] ? ioctl_preallocate+0x1a0/0x1a0 [ 1018.378948] ? security_file_ioctl+0x76/0xb0 [ 1018.383356] ? security_file_ioctl+0x83/0xb0 [ 1018.385744] gfs2: not a GFS2 filesystem [ 1018.387760] SyS_ioctl+0x7f/0xb0 [ 1018.387771] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1018.387783] do_syscall_64+0x1d5/0x640 [ 1018.387798] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1018.408140] RIP: 0033:0x45c937 [ 1018.411317] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1018.419010] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1018.426259] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1018.433532] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1018.440780] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1018.448031] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:43:19 executing program 4: r0 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8983, &(0x7f0000000080)={0x7, 'ip6tnl0\x00', {0x7}, 0x4}) accept4$x25(r3, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x800) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r9, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000180)=0x4) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1018.465852] gfs2: error 10 reading superblock [ 1018.467256] Cannot find del_set index 0 as target [ 1018.485738] gfs2: not a GFS2 filesystem 13:43:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1018.506784] hfsplus: unable to parse mount options [ 1018.562355] gfs2: not a GFS2 filesystem 13:43:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:22 executing program 2 (fault-call:4 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:43:22 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000040)={0x5, 0xffffffff, 0x1, 0x80000000, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) timerfd_settime(r6, 0x3, &(0x7f0000000140)={{}, {r2, r3+10000000}}, &(0x7f0000af9ff0)) 13:43:22 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1202042, &(0x7f00000001c0)={[{@nodecompose='nodecompose'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "dbae261c5666236e", "bac36ddd8155dcf844ece2d733548bad", "d24175f5", "19c28e90deff5758"}, 0x28) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="50065d59cd6f948047c68c1c03b301302cd08600000000007284214a100800060c"], 0x28}, 0x1, 0x0, 0x0, 0x4000010}, 0x1) [ 1020.947195] FAULT_INJECTION: forcing a failure. [ 1020.947195] name failslab, interval 1, probability 0, space 0, times 0 [ 1020.964225] gfs2: not a GFS2 filesystem [ 1020.973481] CPU: 1 PID: 22744 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1020.981376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1020.990724] Call Trace: [ 1020.993313] dump_stack+0x1b2/0x283 [ 1020.996945] should_fail.cold+0x10a/0x154 [ 1021.001096] should_failslab+0xd6/0x130 [ 1021.005068] kmem_cache_alloc+0x28e/0x3c0 [ 1021.009220] __kernfs_new_node+0x6f/0x470 [ 1021.013366] kernfs_new_node+0x7b/0xe0 [ 1021.017253] __kernfs_create_file+0x3d/0x320 [ 1021.021670] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1021.026345] internal_create_group+0x23b/0x7e0 [ 1021.030933] lo_ioctl+0x1108/0x1c00 [ 1021.034561] ? loop_clr_fd+0xac0/0xac0 [ 1021.038444] blkdev_ioctl+0x91d/0x17c0 [ 1021.042337] ? blkpg_ioctl+0x8d0/0x8d0 [ 1021.046207] ? trace_hardirqs_on+0x10/0x10 [ 1021.050433] block_ioctl+0xd9/0x120 [ 1021.054133] ? blkdev_fallocate+0x3a0/0x3a0 [ 1021.058438] do_vfs_ioctl+0x75a/0xfe0 [ 1021.062222] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1021.067827] ? ioctl_preallocate+0x1a0/0x1a0 [ 1021.072236] ? security_file_ioctl+0x76/0xb0 [ 1021.076623] ? security_file_ioctl+0x83/0xb0 [ 1021.081027] SyS_ioctl+0x7f/0xb0 [ 1021.084388] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1021.088344] do_syscall_64+0x1d5/0x640 [ 1021.092218] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1021.097383] RIP: 0033:0x45c937 [ 1021.100549] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1021.108237] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1021.115494] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1021.122753] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1021.130002] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1021.137252] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:43:22 executing program 4: r0 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$midi(r3, &(0x7f00000003c0)="b28a4d65b06adb787de30f96857d9a3b2fdb3a33944b92d7c85b9325511d13e30c3f6a8a4f0b2166f1a78b7fb5f3194bb64b4fa8", 0x34) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r5, 0x4b4d, &(0x7f0000000080)={0x0, 0x7}) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_TRY_DECODER_CMD(r10, 0xc0485661, &(0x7f0000000000)={0x1, 0x2, @raw_data=[0x3, 0x1000, 0x20, 0x200, 0x100, 0x80, 0x1, 0xffffffff, 0xffffffff, 0x3, 0xc4, 0x4, 0x2, 0x200, 0x7fff]}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) sendmsg$unix(r3, &(0x7f0000000380)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000180)="b2eda7ad419761cdf63d6cc589d2971d8c5fab0ca1837efc418dc1ccdc1623818ffb6871bf3aeac935828dc210df802e21ecbf3a9b1ae107f140dc63a6ac709b7cf5bb3cfaa922cf889049cb6a192aed7fd39b588663ab8c6ec87684158932bdb1c762a38633a605cb1d", 0x6a}, {&(0x7f0000000200)="d3046479c54b9c8ceeeb8827b3835ebff34b532481b8c50f080f6d7e29d3739a00453a9c23af0b9907dd662416004135827ac0c0a702aa711a5931d1dc6266ed3308e9ddb32fe45a59d0c5a9ee09d9a6f47cf19853d2351fa1432c432d13f124591ffd293f6aa682309b669c62b526de7fbe315e2307d821650a1b7d48b9f7de39abb08e20f9a44d46419691fc610d52597f6c37bf9b5cbd7253bb305b8b310d793b7c1b49360092b0b0de49dee8", 0xae}, {&(0x7f00000002c0)="47e6bdcb168e5fbd784c6db064eeae45129867300226da8c9ac995dc84f448579a1f796263e322311c8e3097eb29681d9066a96f10fe0137b3dad1c3893603288f41732bf5da8f4b3a4394c292ff4a960cba6375a112a14d13", 0x59}], 0x3, 0x0, 0x0, 0x1}, 0x0) 13:43:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) [ 1021.147580] Cannot find del_set index 0 as target 13:43:22 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0xb6acee60d4e2ca4d) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:22 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000040), 0x8) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:43:22 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x59, &(0x7f0000000180)=""/4096) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) [ 1021.253512] attempt to access beyond end of device [ 1021.259254] gfs2: not a GFS2 filesystem [ 1021.264878] hfsplus: gid requires an argument [ 1021.272582] hfsplus: unable to parse mount options [ 1021.278400] loop1: rw=4096, want=136, limit=63 [ 1021.294467] gfs2: error 10 reading superblock [ 1021.314873] gfs2: not a GFS2 filesystem [ 1021.334479] gfs2: not a GFS2 filesystem [ 1021.368514] hfsplus: gid requires an argument [ 1021.378499] hfsplus: unable to parse mount options 13:43:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:25 executing program 2 (fault-call:4 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:25 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r3 = dup(r2) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={r5, 0x5, 0x10, 0xab7c, 0x800}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000080)={r6, @in={{0x2, 0x4e23, @multicast2}}}, 0x84) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 13:43:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept$netrom(r3, &(0x7f0000000040)={{0x3, @null}, [@bcast, @default, @default, @null, @bcast, @netrom, @netrom, @netrom]}, &(0x7f0000000140)=0x48) accept4$netrom(r4, &(0x7f0000000180)={{0x3, @default}, [@netrom, @remote, @remote, @null, @netrom, @bcast]}, &(0x7f0000000240)=0x48, 0x80000) getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6769643d864735112119e19e5cf0fd1e6a0399a942e52c2581f829ab8dc6bf278f1e38ae27ae7443676765eadc550ea3367c9cd832ff8783b7b51180c1f7513777db52bbcda0bd5a6c5b462358917d778dceae3b1148d15eddc468e9123287e44d8587a947abceca433fb1d37128ec35d2b30a6b9a2089ee2c41819a33052d40c9ff5f767cd6904b0e58754194c010c9bacdd78d44291521b20cd989a8e10edc5e75977b477a91deebe53e70b02d3871a2b12fe5662eed80b9072590bfb3fbcd96b5", @ANYRESHEX=r5, @ANYBLOB="4900cb0a34de0412b8ec802ef10af774f12b4d2f38e5aba703ab45cf101d1bc69d5ed1d723382901c3492b"]) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_DELCHAIN={0x78, 0x5, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HOOK={0x48, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x26b53231}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_DEV={0x14}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4dfb21f4}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6ef6d101}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}], {0x14}}, 0xa0}}, 0x0) fcntl$setsig(r6, 0xa, 0x8) 13:43:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1023.998370] Cannot find del_set index 0 as target [ 1024.006318] FAULT_INJECTION: forcing a failure. [ 1024.006318] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.026473] gfs2: not a GFS2 filesystem [ 1024.038180] CPU: 1 PID: 22826 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1024.046074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.048481] Cannot find del_set index 0 as target [ 1024.055418] Call Trace: [ 1024.055438] dump_stack+0x1b2/0x283 [ 1024.055457] should_fail.cold+0x10a/0x154 [ 1024.055473] should_failslab+0xd6/0x130 [ 1024.055484] kmem_cache_alloc+0x28e/0x3c0 [ 1024.055498] __kernfs_new_node+0x6f/0x470 [ 1024.055511] kernfs_new_node+0x7b/0xe0 [ 1024.055524] __kernfs_create_file+0x3d/0x320 [ 1024.055536] sysfs_add_file_mode_ns+0x1e1/0x450 13:43:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1024.055549] internal_create_group+0x23b/0x7e0 [ 1024.055566] lo_ioctl+0x1108/0x1c00 [ 1024.104031] ? loop_clr_fd+0xac0/0xac0 [ 1024.107916] blkdev_ioctl+0x91d/0x17c0 [ 1024.111797] ? blkpg_ioctl+0x8d0/0x8d0 [ 1024.115703] ? trace_hardirqs_on+0x10/0x10 [ 1024.120469] block_ioctl+0xd9/0x120 [ 1024.124094] ? blkdev_fallocate+0x3a0/0x3a0 [ 1024.127293] Cannot find del_set index 0 as target [ 1024.128409] do_vfs_ioctl+0x75a/0xfe0 [ 1024.128425] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1024.128437] ? ioctl_preallocate+0x1a0/0x1a0 13:43:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1024.128455] ? security_file_ioctl+0x76/0xb0 [ 1024.151439] ? security_file_ioctl+0x83/0xb0 [ 1024.155844] SyS_ioctl+0x7f/0xb0 [ 1024.159207] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1024.163178] do_syscall_64+0x1d5/0x640 [ 1024.167070] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1024.172253] RIP: 0033:0x45c937 [ 1024.175440] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1024.183145] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1024.190407] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 13:43:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1024.197672] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1024.204936] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1024.212198] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1024.226264] hfsplus: unable to parse mount options [ 1024.228975] gfs2: not a GFS2 filesystem [ 1024.235132] Cannot find del_set index 0 as target 13:43:25 executing program 2 (fault-call:4 fault-nth:14): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x7ffc, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1024.304437] hfsplus: unable to parse mount options [ 1024.314086] Cannot find del_set index 0 as target [ 1024.336993] FAULT_INJECTION: forcing a failure. [ 1024.336993] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.352060] CPU: 0 PID: 22867 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1024.359954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.369301] Call Trace: [ 1024.371892] dump_stack+0x1b2/0x283 [ 1024.375527] should_fail.cold+0x10a/0x154 [ 1024.379684] should_failslab+0xd6/0x130 [ 1024.383753] kmem_cache_alloc+0x28e/0x3c0 [ 1024.387903] __kernfs_new_node+0x6f/0x470 [ 1024.392054] kernfs_new_node+0x7b/0xe0 [ 1024.395947] __kernfs_create_file+0x3d/0x320 [ 1024.400359] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1024.405029] internal_create_group+0x23b/0x7e0 [ 1024.409617] lo_ioctl+0x1108/0x1c00 [ 1024.413247] ? loop_clr_fd+0xac0/0xac0 [ 1024.417132] blkdev_ioctl+0x91d/0x17c0 [ 1024.417272] attempt to access beyond end of device [ 1024.421029] ? blkpg_ioctl+0x8d0/0x8d0 [ 1024.421040] ? trace_hardirqs_on+0x10/0x10 [ 1024.421058] block_ioctl+0xd9/0x120 [ 1024.421069] ? blkdev_fallocate+0x3a0/0x3a0 [ 1024.436567] loop3: rw=4096, want=136, limit=63 [ 1024.437670] do_vfs_ioctl+0x75a/0xfe0 [ 1024.437686] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1024.437698] ? ioctl_preallocate+0x1a0/0x1a0 [ 1024.437716] ? security_file_ioctl+0x76/0xb0 [ 1024.442120] gfs2: error 10 reading superblock [ 1024.446573] ? security_file_ioctl+0x83/0xb0 [ 1024.446585] SyS_ioctl+0x7f/0xb0 [ 1024.446596] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1024.446611] do_syscall_64+0x1d5/0x640 [ 1024.484944] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1024.490130] RIP: 0033:0x45c937 [ 1024.493314] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1024.501121] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1024.508386] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1024.513251] Cannot find del_set index 0 as target [ 1024.515644] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1024.515650] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1024.515656] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1024.553647] gfs2: not a GFS2 filesystem [ 1024.586282] print_req_error: I/O error, dev loop3, sector 0 13:43:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:28 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}]}) 13:43:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:28 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) accept$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:28 executing program 2 (fault-call:4 fault-nth:15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:28 executing program 3 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1027.026600] Cannot find del_set index 0 as target [ 1027.035178] FAULT_INJECTION: forcing a failure. [ 1027.035178] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.052051] hfsplus: gid requires an argument [ 1027.064017] FAULT_INJECTION: forcing a failure. [ 1027.064017] name failslab, interval 1, probability 0, space 0, times 0 13:43:28 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @multicast1}, &(0x7f0000000040)=0xc) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) timerfd_gettime(r6, &(0x7f0000000100)) [ 1027.065654] hfsplus: unable to parse mount options [ 1027.087447] CPU: 1 PID: 22895 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1027.095443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.104795] Call Trace: [ 1027.107387] dump_stack+0x1b2/0x283 [ 1027.111023] should_fail.cold+0x10a/0x154 [ 1027.115176] should_failslab+0xd6/0x130 [ 1027.119150] kmem_cache_alloc+0x28e/0x3c0 [ 1027.123297] __kernfs_new_node+0x6f/0x470 [ 1027.127443] kernfs_new_node+0x7b/0xe0 [ 1027.131325] __kernfs_create_file+0x3d/0x320 [ 1027.135740] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1027.140409] internal_create_group+0x23b/0x7e0 [ 1027.144997] lo_ioctl+0x1108/0x1c00 [ 1027.148624] ? loop_clr_fd+0xac0/0xac0 [ 1027.152507] blkdev_ioctl+0x91d/0x17c0 [ 1027.156378] ? blkpg_ioctl+0x8d0/0x8d0 [ 1027.160251] ? trace_hardirqs_on+0x10/0x10 [ 1027.164491] block_ioctl+0xd9/0x120 [ 1027.168116] ? blkdev_fallocate+0x3a0/0x3a0 [ 1027.172436] do_vfs_ioctl+0x75a/0xfe0 [ 1027.176232] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1027.181848] ? ioctl_preallocate+0x1a0/0x1a0 [ 1027.186254] ? security_file_ioctl+0x76/0xb0 [ 1027.190643] ? security_file_ioctl+0x83/0xb0 [ 1027.195031] SyS_ioctl+0x7f/0xb0 [ 1027.198385] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1027.202352] do_syscall_64+0x1d5/0x640 [ 1027.206226] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1027.211397] RIP: 0033:0x45c937 [ 1027.214569] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1027.222283] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1027.229539] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1027.236883] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1027.244132] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1027.251387] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1027.258650] CPU: 0 PID: 22898 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1027.266621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.268024] gfs2: not a GFS2 filesystem [ 1027.275966] Call Trace: [ 1027.275986] dump_stack+0x1b2/0x283 [ 1027.276001] should_fail.cold+0x10a/0x154 [ 1027.276014] should_failslab+0xd6/0x130 [ 1027.276024] __kmalloc+0x2c1/0x400 [ 1027.276035] ? SyS_memfd_create+0xb9/0x3a0 [ 1027.276046] SyS_memfd_create+0xb9/0x3a0 [ 1027.276061] ? shmem_fcntl+0x120/0x120 [ 1027.276074] ? SyS_clock_settime+0x1a0/0x1a0 [ 1027.314362] ? do_syscall_64+0x4c/0x640 [ 1027.318334] ? shmem_fcntl+0x120/0x120 [ 1027.322217] do_syscall_64+0x1d5/0x640 [ 1027.326098] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1027.331263] RIP: 0033:0x45ca69 [ 1027.334430] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1027.342114] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1027.349385] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1027.356632] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1027.363887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 13:43:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78) ioctl$SOUND_MIXER_WRITE_VOLUME(0xffffffffffffffff, 0xc0044d05, &(0x7f0000000000)=0x2d) getgroups(0x0, &(0x7f00000000c0)) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000180)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid'}}]}) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x6, 0x7fff}, {0xfc, 0x4b5}]}, 0x14, 0x3) [ 1027.371206] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:28 executing program 2 (fault-call:4 fault-nth:16): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:28 executing program 3 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:28 executing program 4: r0 = timerfd_create(0x7, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = accept$ax25(r2, &(0x7f0000000000)={{0x3, @netrom}, [@rose, @remote, @remote, @netrom, @netrom, @rose, @netrom]}, &(0x7f0000000080)=0x48) open_by_handle_at(r3, &(0x7f0000000180)={0xa3, 0x8, "f9ff7a05db1ab6ec7bf5f4c8b399517cc75d9da1c98add75741300e51dce150a04daecc54e43e90c34c0a6bcb01c0d07c98592734ec6ad6fef745681cf6d9d0e20d85202fb849cbb1a52ccc35b3e04a6dacc9cfb47ac9acfa6ff0cd693f6414fb7cc51715f29abbd4cece6c86d9ee679217d1df76f4dcbdbd6237c871b33258dc477e63812d9ee83492b5c023e117ee31879f02f6efb0a4b60893b"}, 0x80000) [ 1027.437342] Cannot find del_set index 0 as target [ 1027.451239] hfsplus: unable to find HFS+ superblock [ 1027.465989] FAULT_INJECTION: forcing a failure. [ 1027.465989] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.509126] FAULT_INJECTION: forcing a failure. [ 1027.509126] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.540696] CPU: 0 PID: 22929 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1027.548599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.558045] Call Trace: [ 1027.560650] dump_stack+0x1b2/0x283 [ 1027.564282] should_fail.cold+0x10a/0x154 [ 1027.568435] should_failslab+0xd6/0x130 [ 1027.572410] kmem_cache_alloc+0x28e/0x3c0 [ 1027.576561] __d_alloc+0x2a/0x9b0 [ 1027.580011] ? lock_downgrade+0x6e0/0x6e0 [ 1027.584169] __shmem_file_setup.part.0+0xcb/0x3c0 [ 1027.589012] ? shmem_rename2+0x6e0/0x6e0 [ 1027.593073] ? __alloc_fd+0x1bf/0x490 [ 1027.596887] SyS_memfd_create+0x1f6/0x3a0 [ 1027.601040] ? shmem_fcntl+0x120/0x120 [ 1027.604924] ? SyS_clock_settime+0x1a0/0x1a0 [ 1027.609335] ? do_syscall_64+0x4c/0x640 [ 1027.613309] ? shmem_fcntl+0x120/0x120 [ 1027.617199] do_syscall_64+0x1d5/0x640 [ 1027.621118] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1027.626301] RIP: 0033:0x45ca69 [ 1027.629485] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1027.637189] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1027.644456] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1027.651720] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1027.658986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1027.666251] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1027.677220] CPU: 0 PID: 22926 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1027.685113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.694461] Call Trace: [ 1027.697052] dump_stack+0x1b2/0x283 [ 1027.700683] should_fail.cold+0x10a/0x154 [ 1027.704850] should_failslab+0xd6/0x130 [ 1027.708831] kmem_cache_alloc+0x28e/0x3c0 [ 1027.712982] __kernfs_new_node+0x6f/0x470 [ 1027.717148] kernfs_new_node+0x7b/0xe0 [ 1027.721040] __kernfs_create_file+0x3d/0x320 [ 1027.725454] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1027.730137] internal_create_group+0x23b/0x7e0 [ 1027.734724] lo_ioctl+0x1108/0x1c00 [ 1027.738353] ? loop_clr_fd+0xac0/0xac0 [ 1027.742241] blkdev_ioctl+0x91d/0x17c0 [ 1027.746122] ? blkpg_ioctl+0x8d0/0x8d0 [ 1027.750006] ? trace_hardirqs_on+0x10/0x10 [ 1027.754248] block_ioctl+0xd9/0x120 [ 1027.757874] ? blkdev_fallocate+0x3a0/0x3a0 [ 1027.762185] do_vfs_ioctl+0x75a/0xfe0 [ 1027.765979] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1027.771601] ? ioctl_preallocate+0x1a0/0x1a0 [ 1027.776023] ? security_file_ioctl+0x76/0xb0 [ 1027.780429] ? security_file_ioctl+0x83/0xb0 [ 1027.784832] SyS_ioctl+0x7f/0xb0 [ 1027.788196] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1027.792171] do_syscall_64+0x1d5/0x640 [ 1027.796064] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1027.801254] RIP: 0033:0x45c937 [ 1027.804431] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1027.812118] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1027.819372] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1027.826628] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1027.833894] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1027.841272] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1027.856443] gfs2: not a GFS2 filesystem 13:43:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99", 0x43}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:31 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@decompose='decompose'}, {@force='force'}, {@session={'session', 0x3d, 0x229b}}, {@decompose='decompose'}, {@creator={'creator', 0x3d, "73a05284"}}, {@gid={'gid'}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000240)=0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSETA(r5, 0x5406, &(0x7f0000000280)={0xffff, 0x7, 0xfffd, 0x81, 0x3, "40580a4b2179ad0b"}) syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8001, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000440)={0x2, 0xfb, "d21229643c6e44fa5d92256f41e5ceaf620819a9f78dd3c6a0e18e49169e0ef9ec0efd8ad5efc1e92e486d98e357b0c7e61b0ef46aa8f07e7bde41ef19759460253b3a2cb66c4df57f1110cd7e7e05fef6fd32ecb6e7611e9e1cc88eedfa34a42aa231fc0d2dbe01ab28fe73dc03857075b0e27ebb5253c86b904d475839dd8c10b1c331ae52d8e553a5ee538ca28ad1f7e2516307c109e9d740b2148fe83497dfc6daad478d6a4ef0903d7bb4c18f8b8269f89a60451385470033d955f4e2be89b0a979ebfb088a469b209fde6b45ce6a149465db3346a2743e0307851decf5ac92c599cd924813cc4ebeac54d6e0ee7009c41928b0f523566ac9"}) r7 = socket(0x10, 0x2, 0x0) close(r7) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r8, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0xc0bf}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40c00}, 0x4004041) 13:43:31 executing program 3 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:31 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDENABIO(r5, 0x4b36) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001049aa69aa8d615a47cad3fa029e01000000000100ffffffdf00000a14000000050a010200000000000000000000000014000000110001002ae6e6b1b004aae606900c3c10f5a2fa39a3a7baffabe20f6acd83b21b710f7a50d1a08f7287f4b25350bb55bf89a9927ec7c208a37589bf53e93859dc83736d07a797f160fdd815b6e9dcf6da040d56a8338fc64e23114901b3711ba3fee3b2541b6143a30313fb335ac70eb65883f783ad55d75f3ee17fffe8befb9a780497c9f05723dd6e", @ANYRES64=r0, @ANYBLOB="da385b2807d5a1ae3cc53dc801d70a2d6acb56914a62446547ebc06b8cc7f9149acd31fff30d1cb1a0433f3943b0ca8153798bc567f194b743b2e117dd2bec413ac619ac6ecbf23dc0fc082593aa048fa6bc9d8257a704baeefd5960a006894321ce79939ff22eead275c6f25cf23878b08dc97a8f983dc1539207c983527f5a78aae62318dc094f48332434ab56567e0a8d7704710b6773fdb007c2a2855a0b6664aef3f182"], 0x3c}, 0x1, 0x0, 0x0, 0xe32667c6674d21d0}, 0x0) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:31 executing program 2 (fault-call:4 fault-nth:17): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1030.068007] Cannot find del_set index 0 as target 13:43:31 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) 13:43:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1030.095845] hfsplus: invalid session number or type of track [ 1030.104799] FAULT_INJECTION: forcing a failure. [ 1030.104799] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.116707] CPU: 1 PID: 22964 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1030.124599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1030.133605] FAULT_INJECTION: forcing a failure. [ 1030.133605] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.133942] Call Trace: [ 1030.133960] dump_stack+0x1b2/0x283 [ 1030.133978] should_fail.cold+0x10a/0x154 [ 1030.155483] should_failslab+0xd6/0x130 [ 1030.157544] hfsplus: unable to find HFS+ superblock [ 1030.159458] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1030.159470] ? dev_uevent_filter+0xd0/0xd0 [ 1030.159480] kobject_uevent_env+0x1fa/0xc50 [ 1030.159500] lo_ioctl+0x1177/0x1c00 [ 1030.159514] ? loop_clr_fd+0xac0/0xac0 [ 1030.159525] blkdev_ioctl+0x91d/0x17c0 [ 1030.159533] ? blkpg_ioctl+0x8d0/0x8d0 [ 1030.159543] ? trace_hardirqs_on+0x10/0x10 [ 1030.159564] block_ioctl+0xd9/0x120 [ 1030.159572] ? blkdev_fallocate+0x3a0/0x3a0 [ 1030.159584] do_vfs_ioctl+0x75a/0xfe0 [ 1030.159596] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1030.159608] ? ioctl_preallocate+0x1a0/0x1a0 [ 1030.159628] ? security_file_ioctl+0x76/0xb0 [ 1030.159637] ? security_file_ioctl+0x83/0xb0 [ 1030.159647] SyS_ioctl+0x7f/0xb0 [ 1030.159656] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1030.159668] do_syscall_64+0x1d5/0x640 [ 1030.159684] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1030.159691] RIP: 0033:0x45c937 [ 1030.159696] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1030.159706] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1030.159711] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1030.159717] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1030.159722] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1030.159731] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1030.291392] CPU: 0 PID: 22965 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1030.299275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1030.308628] Call Trace: [ 1030.311222] dump_stack+0x1b2/0x283 [ 1030.311684] Cannot find del_set index 0 as target [ 1030.314849] should_fail.cold+0x10a/0x154 [ 1030.314864] should_failslab+0xd6/0x130 [ 1030.314876] kmem_cache_alloc+0x28e/0x3c0 [ 1030.330669] gfs2: not a GFS2 filesystem [ 1030.331912] ? shmem_destroy_callback+0xa0/0xa0 [ 1030.331924] shmem_alloc_inode+0x18/0x40 13:43:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99", 0x43}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1030.331934] ? shmem_destroy_callback+0xa0/0xa0 [ 1030.349237] alloc_inode+0x5d/0x170 [ 1030.352865] new_inode_pseudo+0x14/0xe0 [ 1030.356837] new_inode+0x1b/0x40 [ 1030.360203] shmem_get_inode+0x74/0x780 [ 1030.364182] __shmem_file_setup.part.0+0x104/0x3c0 [ 1030.369112] ? shmem_rename2+0x6e0/0x6e0 [ 1030.373167] ? __alloc_fd+0x1bf/0x490 [ 1030.376971] SyS_memfd_create+0x1f6/0x3a0 [ 1030.381119] ? shmem_fcntl+0x120/0x120 [ 1030.385112] ? SyS_clock_settime+0x1a0/0x1a0 [ 1030.389499] ? do_syscall_64+0x4c/0x640 [ 1030.393459] ? shmem_fcntl+0x120/0x120 [ 1030.397332] do_syscall_64+0x1d5/0x640 [ 1030.401213] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1030.406421] RIP: 0033:0x45ca69 [ 1030.409588] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1030.417280] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1030.424578] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1030.431822] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1030.439068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 13:43:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:31 executing program 3 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1030.446329] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:31 executing program 2 (fault-call:4 fault-nth:18): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1030.515620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=22985 comm=syz-executor.0 [ 1030.531147] Cannot find del_set index 0 as target [ 1030.534952] hfsplus: invalid session number or type of track [ 1030.547412] hfsplus: unable to find HFS+ superblock 13:43:32 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) pwritev(r2, &(0x7f0000000100)=[{&(0x7f0000000040)="88757312f4df64b8f333259aba4050bc723d6f69e468ec68936027fa83b92ea9a3a050b1d006f185a6b6835196e20c38fa463a50ce83b057d136c877ff2e2feacce4239cc5abb71872427b78b8cffe94b56b45dbcb0a08831287b0875e41443be7919ba46637d76e234bb2e7770cfb010706a3c9c1e09db0ef3dcbe75d479e5028f7c525864cf529763f842eec352774ff1861", 0x93}, {&(0x7f0000000180)="478ddb6ab7791292d90b1b51569fb2e9cc2c7e0b39cd028a8efe8275a845c8fe51dcf9a4a2b630d5cbc0fc5a69ec0e8876998ab646b7fbc80e9dc8163d223f702a20954f2c721f510d89b18fdf838a44233516ce2d16e773b6c78b237b05755a10dbc6d25feef8ee3a43052276cd0e0d947ffab5ef80cfa7d06a8d2a5ed42012738da324e918f6eb3ab2947139858d1afca1b9fe8db7e3", 0x97}], 0x2, 0x45f6) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RWRITE(r5, &(0x7f0000000000)={0xb, 0x77, 0x5, 0x5}, 0xb) r6 = dup(r1) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet6_dccp_buf(r9, 0x21, 0xf, &(0x7f0000000400)=""/80, &(0x7f0000000480)=0x50) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000380)=0x30, 0x4) sendmsg$GTP_CMD_NEWPDP(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="0645e325d94544b26886e125de499c552f2118a7723858dd94ef9dbd8be51dc0a873356af383125778bdf3e4789cecd2821dbf5240ce7c4d9d4a5df6e782ebf4bcd73481641c97f1dfe0d584", @ANYRES16=r8, @ANYRES32], 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYRES64=r9, @ANYRESOCT, @ANYBLOB="080026bd7000fcdbdf250100000008000800020000000600060002000000"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x48004) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f00000002c0)=0x3f) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000240)={{}, {0x0, 0x3938700}}, &(0x7f0000af9ff0)) [ 1030.566393] FAULT_INJECTION: forcing a failure. [ 1030.566393] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.585317] CPU: 0 PID: 22999 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1030.593222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1030.602581] Call Trace: [ 1030.605174] dump_stack+0x1b2/0x283 [ 1030.608819] should_fail.cold+0x10a/0x154 [ 1030.612971] should_failslab+0xd6/0x130 13:43:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1030.616949] kmem_cache_alloc+0x28e/0x3c0 [ 1030.621100] selinux_inode_alloc_security+0xb1/0x2a0 [ 1030.626204] security_inode_alloc+0x8f/0xd0 [ 1030.630520] inode_init_always+0x576/0xb10 [ 1030.634736] alloc_inode+0x7a/0x170 [ 1030.638340] new_inode_pseudo+0x14/0xe0 [ 1030.642308] new_inode+0x1b/0x40 [ 1030.645654] shmem_get_inode+0x74/0x780 [ 1030.649607] __shmem_file_setup.part.0+0x104/0x3c0 [ 1030.654515] ? shmem_rename2+0x6e0/0x6e0 [ 1030.658555] ? __alloc_fd+0x1bf/0x490 [ 1030.662337] SyS_memfd_create+0x1f6/0x3a0 [ 1030.666492] ? shmem_fcntl+0x120/0x120 [ 1030.670356] ? SyS_clock_settime+0x1a0/0x1a0 [ 1030.674741] ? do_syscall_64+0x4c/0x640 [ 1030.678706] ? shmem_fcntl+0x120/0x120 [ 1030.682587] do_syscall_64+0x1d5/0x640 [ 1030.686455] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1030.691635] RIP: 0033:0x45ca69 [ 1030.694800] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1030.702497] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1030.709746] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1030.716996] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1030.724247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1030.731980] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:32 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{0x0, 0x3938700}, {r3, r4+60000000}}, &(0x7f0000af9ff0)) 13:43:32 executing program 3 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:32 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB="2ce1"]) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) sendmmsg$sock(r1, &(0x7f0000001d00), 0x3, 0x48000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = socket$netlink(0x10, 0x3, 0x0) writev(r8, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r9, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) r10 = socket$netlink(0x10, 0x3, 0x1) writev(r10, &(0x7f0000000680)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000180)=@usbdevfs_driver={0x0, 0x3, &(0x7f0000000240)="7825748fe5d5ca75af28303a32fb3fe9cadcd5a6f36dbe70c3ed96509e2f24ea23945fae5bc3d33ce7f870c56fe3e6d1943d6d6b3507000000000000005c90d1873b4c987c49c20000000000000000fdfee7e55825fc0eb053cb724c8d1922ab97a5c8a2b313bc0048eea8beb4c1262e5e66251eae12911e43b6d9cd9668d3e58587aa57d4cdf358f78a67339ac487db8b864dbff2996b057945cff13a1686468a84868dff563eda40c42ac4eb11a477"}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1030.793311] Cannot find del_set index 0 as target [ 1030.808222] FAULT_INJECTION: forcing a failure. [ 1030.808222] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.824573] FAULT_INJECTION: forcing a failure. [ 1030.824573] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.846522] CPU: 1 PID: 23000 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1030.854414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1030.863928] Call Trace: [ 1030.866504] dump_stack+0x1b2/0x283 [ 1030.870119] should_fail.cold+0x10a/0x154 [ 1030.874252] should_failslab+0xd6/0x130 [ 1030.878215] kmem_cache_alloc+0x28e/0x3c0 [ 1030.882361] __kernfs_new_node+0x6f/0x470 [ 1030.886490] kernfs_new_node+0x7b/0xe0 [ 1030.890374] __kernfs_create_file+0x3d/0x320 [ 1030.894786] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1030.899470] internal_create_group+0x23b/0x7e0 [ 1030.904039] lo_ioctl+0x1108/0x1c00 [ 1030.907650] ? loop_clr_fd+0xac0/0xac0 [ 1030.911518] blkdev_ioctl+0x91d/0x17c0 [ 1030.915402] ? blkpg_ioctl+0x8d0/0x8d0 [ 1030.919276] ? trace_hardirqs_on+0x10/0x10 [ 1030.923509] block_ioctl+0xd9/0x120 [ 1030.927128] ? blkdev_fallocate+0x3a0/0x3a0 [ 1030.931465] do_vfs_ioctl+0x75a/0xfe0 [ 1030.935255] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1030.936924] Cannot find del_set index 0 as target 13:43:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1030.940869] ? ioctl_preallocate+0x1a0/0x1a0 [ 1030.940895] ? security_file_ioctl+0x76/0xb0 [ 1030.940905] ? security_file_ioctl+0x83/0xb0 [ 1030.940916] SyS_ioctl+0x7f/0xb0 [ 1030.940925] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1030.940936] do_syscall_64+0x1d5/0x640 [ 1030.940952] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1030.940959] RIP: 0033:0x45c937 [ 1030.940966] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1030.986177] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1030.993436] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1031.000700] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1031.007982] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1031.015246] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1031.022518] CPU: 0 PID: 23011 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1031.030401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1031.035554] Cannot find del_set index 0 as target [ 1031.039744] Call Trace: 13:43:32 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x53d) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1031.039762] dump_stack+0x1b2/0x283 [ 1031.039777] should_fail.cold+0x10a/0x154 [ 1031.039790] should_failslab+0xd6/0x130 [ 1031.058881] kmem_cache_alloc+0x28e/0x3c0 [ 1031.063033] get_empty_filp+0x86/0x3e0 [ 1031.066924] alloc_file+0x23/0x440 [ 1031.070467] __shmem_file_setup.part.0+0x198/0x3c0 [ 1031.075399] ? shmem_rename2+0x6e0/0x6e0 [ 1031.079454] ? __alloc_fd+0x1bf/0x490 [ 1031.083370] SyS_memfd_create+0x1f6/0x3a0 [ 1031.087534] ? shmem_fcntl+0x120/0x120 [ 1031.091430] ? SyS_clock_settime+0x1a0/0x1a0 [ 1031.095835] ? do_syscall_64+0x4c/0x640 [ 1031.099808] ? shmem_fcntl+0x120/0x120 [ 1031.103696] do_syscall_64+0x1d5/0x640 [ 1031.107589] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1031.112773] RIP: 0033:0x45ca69 [ 1031.115958] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1031.123664] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1031.130924] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1031.135978] gfs2: not a GFS2 filesystem [ 1031.138181] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1031.138188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1031.138194] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1031.167257] hfsplus: gid requires an argument [ 1031.181585] hfsplus: unable to parse mount options [ 1031.256001] hfsplus: gid requires an argument [ 1031.261265] hfsplus: unable to parse mount options 13:43:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99", 0x43}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:34 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKSECTGET(r5, 0x1267, &(0x7f0000000000)) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:34 executing program 3 (fault-call:4 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:34 executing program 2 (fault-call:4 fault-nth:19): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x2000000000, 0x9, 0x0, {0xffffffffffffffff, 0x0, 0x0, 0x400000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x7}}}, 0x78) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}}}, 0x78) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x1}}}, 0x78) getgroups(0x4, &(0x7f00000002c0)=[r1, 0x0, 0x0, r1]) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r9, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x91, "65ae66b01032accb40479316e9428e2da43c21a9ca615d6ecce00c651155dc0f86aebd67333f26f3de665c6cdd8c9bbf2735754ed3897a98cf25da0c711d17a5aee2889d32c99fd474691ca38733d2855f6a5fc4b15cc2b142edd6db29fdaea19f3963fae5c2a952a3047629581c7554ff370a4c91432cd371b014a3b0b45d127012e30f878df123f8d9735473e6557b1f"}, &(0x7f0000000080)=0x99) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000240)={r10, 0x4}, &(0x7f0000000280)=0x8) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6769643ddaad78043d502019876a13035b764cd5cdde20a9836f6b6b20866973641562d9cea0547496b8e759944787e7c72ee95d30d928a46cf9ec24bd61afd4dbbd4f6df70dd15fa543cb5257df90c731487b3745262f63e6", @ANYRESHEX=0x0, @ANYBLOB="207c4a9f6967024776e6c34c2a9cb5667601968d4687822cfcf8c2a75a2dcb95a9ec4c77f8d20edb06bc75a527ab3a3f8adb2a85b8aac446dffabb3e47b3b6fd234f651b394ac9d5c83c0c59eea88dc02802e9407163dbbdf5fd36f3b81ea41cbb65700379c43c4657317bd5d8b383446e1d8e37cffc54ff5b4e6a6bb976280a61c066681f97b0d44691340b49f3fb02384a67c9360fc76814c6d7ba2aa800a428723bb81c462b99f86dbc39b3a1f1cf538b3d2f3b75c391f71955e2a4"]) [ 1033.369440] FAULT_INJECTION: forcing a failure. [ 1033.369440] name failslab, interval 1, probability 0, space 0, times 0 [ 1033.382361] Cannot find del_set index 0 as target [ 1033.400571] hfsplus: unable to parse mount options [ 1033.406773] CPU: 1 PID: 23055 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1033.409899] FAULT_INJECTION: forcing a failure. [ 1033.409899] name failslab, interval 1, probability 0, space 0, times 0 [ 1033.414657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1033.414662] Call Trace: [ 1033.414680] dump_stack+0x1b2/0x283 [ 1033.414699] should_fail.cold+0x10a/0x154 [ 1033.445606] should_failslab+0xd6/0x130 [ 1033.449584] kmem_cache_alloc+0x28e/0x3c0 [ 1033.453751] selinux_file_alloc_security+0xaf/0x190 [ 1033.458770] security_file_alloc+0x66/0xa0 [ 1033.463006] ? selinux_is_enabled+0x5/0x50 [ 1033.467236] get_empty_filp+0x15c/0x3e0 [ 1033.471208] alloc_file+0x23/0x440 [ 1033.475007] __shmem_file_setup.part.0+0x198/0x3c0 [ 1033.479928] ? shmem_rename2+0x6e0/0x6e0 [ 1033.483982] ? __alloc_fd+0x1bf/0x490 [ 1033.487780] SyS_memfd_create+0x1f6/0x3a0 [ 1033.491914] ? shmem_fcntl+0x120/0x120 [ 1033.495781] ? SyS_clock_settime+0x1a0/0x1a0 [ 1033.500169] ? do_syscall_64+0x4c/0x640 [ 1033.504121] ? shmem_fcntl+0x120/0x120 [ 1033.507998] do_syscall_64+0x1d5/0x640 [ 1033.511875] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1033.517041] RIP: 0033:0x45ca69 [ 1033.520816] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1033.528509] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045ca69 [ 1033.535782] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1bd1 [ 1033.543037] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1033.550296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1033.557554] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:35 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0xe0001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSETXF(r5, 0x5434, &(0x7f0000000040)={0x1000, 0x5f, [0xbb, 0x8001, 0xd63c, 0x6, 0x2], 0x1f}) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000000)={0x8d, 0x14, &(0x7f0000000180)="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"}) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:35 executing program 3 (fault-call:4 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:35 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) creat(&(0x7f0000000240)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='fuseblk\x00', 0x0, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x453, 0x0, 0x0, 0x0, 'H'}, 0x14}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1033.565780] CPU: 0 PID: 23060 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1033.573670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1033.583033] Call Trace: [ 1033.585618] dump_stack+0x1b2/0x283 [ 1033.589250] should_fail.cold+0x10a/0x154 [ 1033.593410] should_failslab+0xd6/0x130 [ 1033.597384] __kmalloc+0x2c1/0x400 [ 1033.600922] ? kobject_get_path+0xb0/0x190 [ 1033.605154] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1033.610631] kobject_get_path+0xb0/0x190 [ 1033.614689] kobject_uevent_env+0x21e/0xc50 [ 1033.619018] lo_ioctl+0x1177/0x1c00 [ 1033.622661] ? loop_clr_fd+0xac0/0xac0 [ 1033.626547] blkdev_ioctl+0x91d/0x17c0 [ 1033.630521] ? blkpg_ioctl+0x8d0/0x8d0 [ 1033.631907] FAULT_INJECTION: forcing a failure. [ 1033.631907] name failslab, interval 1, probability 0, space 0, times 0 [ 1033.634415] ? trace_hardirqs_on+0x10/0x10 [ 1033.634440] block_ioctl+0xd9/0x120 [ 1033.634448] ? blkdev_fallocate+0x3a0/0x3a0 [ 1033.634468] do_vfs_ioctl+0x75a/0xfe0 13:43:35 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x208}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x2, 0x8, 0x5, 0x0, 0x0, {0x0, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_CLOSE_WAIT={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88fb}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x1b}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000010}, 0x8070) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1033.651423] audit: type=1107 audit(1591623815.026:881): pid=23075 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 msg='H' [ 1033.653455] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1033.653474] ? ioctl_preallocate+0x1a0/0x1a0 [ 1033.653492] ? security_file_ioctl+0x76/0xb0 [ 1033.687537] ? security_file_ioctl+0x83/0xb0 [ 1033.691933] SyS_ioctl+0x7f/0xb0 [ 1033.695287] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1033.699246] do_syscall_64+0x1d5/0x640 [ 1033.703123] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1033.708295] RIP: 0033:0x45c937 [ 1033.711466] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1033.719160] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1033.726416] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1033.733667] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1033.740959] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1033.748307] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1033.755575] CPU: 1 PID: 23076 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1033.763457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1033.772838] Call Trace: [ 1033.775427] dump_stack+0x1b2/0x283 [ 1033.779063] should_fail.cold+0x10a/0x154 [ 1033.783216] should_failslab+0xd6/0x130 [ 1033.787190] kmem_cache_alloc+0x28e/0x3c0 [ 1033.791337] getname_flags+0xc8/0x550 [ 1033.795153] do_sys_open+0x202/0x3e0 [ 1033.798865] ? filp_open+0x60/0x60 [ 1033.802405] ? fput+0xb/0x140 [ 1033.805509] ? do_syscall_64+0x4c/0x640 [ 1033.809486] ? do_sys_open+0x3e0/0x3e0 [ 1033.813374] do_syscall_64+0x1d5/0x640 13:43:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:35 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap$snddsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000004, 0x50, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1033.817263] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1033.822446] RIP: 0033:0x416861 [ 1033.825631] RSP: 002b:00007fb81a6b4a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1033.833339] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1033.840611] RDX: 00007fb81a6b4b0a RSI: 0000000000000002 RDI: 00007fb81a6b4b00 [ 1033.847881] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1033.855186] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1033.862467] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1033.909156] gfs2: not a GFS2 filesystem [ 1033.920212] Cannot find del_set index 0 as target [ 1033.928847] hfsplus: unable to parse mount options 13:43:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364", 0x64}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:37 executing program 3 (fault-call:4 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:37 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x80) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 13:43:37 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f0000000080)) r4 = socket$inet(0x10, 0x2000000003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f00000064c0), 0x40000000000004b, 0x142, 0x0) setreuid(0x0, r0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r6}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')GPL'}}]}}) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=virtio,', {[{@msize={'msize', 0x3d, 0xe63b}}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@fowner_lt={'fowner<', r6}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r6}}]}}) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@decompose='decompose'}]}) 13:43:37 executing program 2 (fault-call:4 fault-nth:20): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1036.433166] FAULT_INJECTION: forcing a failure. [ 1036.433166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1036.444993] CPU: 0 PID: 23109 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1036.452889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.462236] Call Trace: [ 1036.464855] dump_stack+0x1b2/0x283 [ 1036.468485] should_fail.cold+0x10a/0x154 [ 1036.472630] ? lock_acquire+0x170/0x3f0 [ 1036.476606] __alloc_pages_nodemask+0x22b/0x2730 [ 1036.478097] Cannot find del_set index 0 as target [ 1036.481382] ? trace_hardirqs_on+0x10/0x10 [ 1036.481397] ? quarantine_put+0xc9/0x190 [ 1036.481412] ? simple_xattr_get+0xe5/0x160 [ 1036.498726] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1036.502830] hfsplus: unable to find HFS+ superblock [ 1036.503567] ? trace_hardirqs_on+0x10/0x10 [ 1036.503585] ? __fsnotify_inode_delete+0x20/0x20 [ 1036.509700] FAULT_INJECTION: forcing a failure. [ 1036.509700] name failslab, interval 1, probability 0, space 0, times 0 [ 1036.512816] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 1036.512827] ? setattr_copy+0x143/0x550 [ 1036.512841] cache_grow_begin+0x91/0x410 [ 1036.512854] cache_alloc_refill+0x28c/0x360 [ 1036.547687] kmem_cache_alloc+0x333/0x3c0 [ 1036.551817] getname_flags+0xc8/0x550 [ 1036.555598] do_sys_open+0x202/0x3e0 [ 1036.559293] ? filp_open+0x60/0x60 [ 1036.562812] ? fput+0xb/0x140 [ 1036.565900] ? do_syscall_64+0x4c/0x640 [ 1036.569944] ? do_sys_open+0x3e0/0x3e0 [ 1036.573815] do_syscall_64+0x1d5/0x640 [ 1036.577694] entry_SYSCALL_64_after_hwframe+0x46/0xbb 13:43:38 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r4, 0x3, &(0x7f0000000140)={{}, {r5, r6+10000000}}, &(0x7f0000af9ff0)) [ 1036.582868] RIP: 0033:0x416861 [ 1036.586036] RSP: 002b:00007fb81a6b4a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1036.593726] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1036.600975] RDX: 00007fb81a6b4b0a RSI: 0000000000000002 RDI: 00007fb81a6b4b00 [ 1036.608226] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1036.615479] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1036.622817] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1036.644968] CPU: 1 PID: 23108 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1036.652866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.662213] Call Trace: [ 1036.664813] dump_stack+0x1b2/0x283 [ 1036.668448] should_fail.cold+0x10a/0x154 [ 1036.672772] should_failslab+0xd6/0x130 [ 1036.677178] __kmalloc+0x2c1/0x400 [ 1036.680711] ? kobject_get_path+0xb0/0x190 [ 1036.684940] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1036.690393] kobject_get_path+0xb0/0x190 [ 1036.694454] kobject_uevent_env+0x21e/0xc50 [ 1036.698785] lo_ioctl+0x1177/0x1c00 [ 1036.701462] gfs2: not a GFS2 filesystem [ 1036.702410] ? loop_clr_fd+0xac0/0xac0 [ 1036.702423] blkdev_ioctl+0x91d/0x17c0 [ 1036.702434] ? blkpg_ioctl+0x8d0/0x8d0 [ 1036.718040] ? trace_hardirqs_on+0x10/0x10 [ 1036.722288] block_ioctl+0xd9/0x120 [ 1036.725931] ? blkdev_fallocate+0x3a0/0x3a0 [ 1036.730255] do_vfs_ioctl+0x75a/0xfe0 [ 1036.734058] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1036.739682] ? ioctl_preallocate+0x1a0/0x1a0 13:43:38 executing program 4: r0 = timerfd_create(0x9, 0x180000) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000000)={{0x0, 0x0, @descriptor="d67297da36fbe165"}}) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1036.744097] ? security_file_ioctl+0x76/0xb0 [ 1036.748501] ? security_file_ioctl+0x83/0xb0 [ 1036.752914] SyS_ioctl+0x7f/0xb0 [ 1036.756278] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1036.760252] do_syscall_64+0x1d5/0x640 [ 1036.764142] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1036.769327] RIP: 0033:0x45c937 [ 1036.772511] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1036.780247] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1036.787567] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 13:43:38 executing program 3 (fault-call:4 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1036.794814] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1036.802069] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1036.809362] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1036.833728] gfs2: not a GFS2 filesystem 13:43:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:38 executing program 4: r0 = semget$private(0x0, 0x4, 0x100) semctl$SEM_INFO(r0, 0x1, 0x13, &(0x7f0000000000)=""/176) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3411, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev={0xfe, 0x80, [0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r4}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@getchain={0x34, 0x66, 0x10, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0x0, 0x2}, {}, {0xb, 0x8}}, [{0x8, 0xb, 0x2}, {0x8, 0xb, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x10) write$ppp(r2, &(0x7f0000000500), 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000001c0)=r5) [ 1036.860225] FAULT_INJECTION: forcing a failure. [ 1036.860225] name failslab, interval 1, probability 0, space 0, times 0 [ 1036.878449] CPU: 1 PID: 23140 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1036.886613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.895966] Call Trace: [ 1036.898557] dump_stack+0x1b2/0x283 [ 1036.902190] should_fail.cold+0x10a/0x154 [ 1036.906339] should_failslab+0xd6/0x130 [ 1036.910313] kmem_cache_alloc+0x28e/0x3c0 [ 1036.914466] selinux_file_alloc_security+0xaf/0x190 [ 1036.919484] security_file_alloc+0x66/0xa0 [ 1036.923726] ? selinux_is_enabled+0x5/0x50 [ 1036.927958] get_empty_filp+0x15c/0x3e0 [ 1036.931935] path_openat+0x87/0x2aa0 [ 1036.935646] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 1036.940139] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1036.944633] ? kmem_cache_alloc+0x124/0x3c0 [ 1036.948950] ? getname_flags+0xc8/0x550 [ 1036.952930] ? do_sys_open+0x202/0x3e0 [ 1036.956819] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1036.962213] ? simple_xattr_get+0xe5/0x160 [ 1036.966448] ? path_mountpoint+0x960/0x960 [ 1036.970681] ? trace_hardirqs_on+0x10/0x10 [ 1036.974917] ? fsnotify+0x897/0x1110 [ 1036.978629] ? shmem_setattr+0x238/0xb50 [ 1036.982694] do_filp_open+0x18e/0x250 [ 1036.986495] ? may_open_dev+0xe0/0xe0 [ 1036.990292] ? __alloc_fd+0x1bf/0x490 [ 1036.994097] ? lock_acquire+0x170/0x3f0 [ 1036.998068] ? lock_downgrade+0x6e0/0x6e0 [ 1037.002216] ? do_raw_spin_unlock+0x164/0x250 [ 1037.006707] ? __alloc_fd+0x1bf/0x490 [ 1037.010511] do_sys_open+0x292/0x3e0 [ 1037.014224] ? filp_open+0x60/0x60 [ 1037.017763] ? fput+0xb/0x140 [ 1037.020869] ? do_syscall_64+0x4c/0x640 [ 1037.024840] ? do_sys_open+0x3e0/0x3e0 [ 1037.028815] do_syscall_64+0x1d5/0x640 [ 1037.032715] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1037.037913] RIP: 0033:0x416861 [ 1037.041130] RSP: 002b:00007fb81a6b4a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1037.048833] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1037.053513] Cannot find del_set index 0 as target 13:43:38 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) bind(r5, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) accept4$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x800) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1037.056207] RDX: 00007fb81a6b4b0a RSI: 0000000000000002 RDI: 00007fb81a6b4b00 [ 1037.056213] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1037.056219] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1037.056225] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:40 executing program 2 (fault-call:4 fault-nth:21): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:40 executing program 3 (fault-call:4 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:40 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) read(r1, &(0x7f0000000040)=""/101, 0x65) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB='\x00\x00']) 13:43:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364", 0x64}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:40 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x48000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="50c8ff01", @ANYRES16=r1, @ANYBLOB="010000000000000000004c000000790084800a000500aaaaaaaaaa0000002c000680080001000000000008000300000008000800030000000000080001000400000008000000000000000000010041c7240bf4daa96be9e46d8f50e878e0372e345cd28d9437"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = timerfd_create(0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) bind(0xffffffffffffffff, &(0x7f0000000080)=@pptp={0x18, 0x2, {0x2, @private=0xa010100}}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, {0xfffffffc, 0x0, 0x0, 0x5}}}}]}, 0x78}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0xfffffffffffffd59, r1, 0x3, 0x60bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xd6, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) r9 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BLKTRACESTART(r9, 0x1274, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) timerfd_settime(r2, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000180)={0x6, 'bond0\x00', {0x5}}) 13:43:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1039.479341] Cannot find del_set index 0 as target [ 1039.488023] FAULT_INJECTION: forcing a failure. [ 1039.488023] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.501916] FAULT_INJECTION: forcing a failure. [ 1039.501916] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.514121] CPU: 1 PID: 23175 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1039.522013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.531361] Call Trace: [ 1039.537591] dump_stack+0x1b2/0x283 [ 1039.541304] should_fail.cold+0x10a/0x154 [ 1039.541364] Cannot find del_set index 0 as target [ 1039.545472] should_failslab+0xd6/0x130 [ 1039.545484] __kmalloc+0x2c1/0x400 [ 1039.545496] ? kobject_get_path+0xb0/0x190 [ 1039.562040] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1039.567499] kobject_get_path+0xb0/0x190 [ 1039.571553] kobject_uevent_env+0x21e/0xc50 [ 1039.575974] lo_ioctl+0x1177/0x1c00 [ 1039.579604] ? loop_clr_fd+0xac0/0xac0 [ 1039.583492] blkdev_ioctl+0x91d/0x17c0 [ 1039.587371] ? blkpg_ioctl+0x8d0/0x8d0 [ 1039.591244] ? trace_hardirqs_on+0x10/0x10 [ 1039.595487] block_ioctl+0xd9/0x120 [ 1039.599108] ? blkdev_fallocate+0x3a0/0x3a0 [ 1039.603429] do_vfs_ioctl+0x75a/0xfe0 [ 1039.607235] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1039.612941] ? ioctl_preallocate+0x1a0/0x1a0 [ 1039.617336] ? security_file_ioctl+0x76/0xb0 [ 1039.621723] ? security_file_ioctl+0x83/0xb0 [ 1039.626109] SyS_ioctl+0x7f/0xb0 [ 1039.629470] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1039.633427] do_syscall_64+0x1d5/0x640 [ 1039.637302] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1039.642472] RIP: 0033:0x45c937 [ 1039.645639] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1039.653327] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1039.660573] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1039.667822] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1039.675068] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1039.682323] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1039.689606] CPU: 0 PID: 23171 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1039.693286] hfsplus: gid requires an argument [ 1039.697481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.697485] Call Trace: [ 1039.697501] dump_stack+0x1b2/0x283 [ 1039.697516] should_fail.cold+0x10a/0x154 [ 1039.697530] should_failslab+0xd6/0x130 [ 1039.697540] kmem_cache_alloc+0x28e/0x3c0 13:43:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1039.697555] selinux_file_alloc_security+0xaf/0x190 [ 1039.697566] security_file_alloc+0x66/0xa0 [ 1039.697574] ? selinux_is_enabled+0x5/0x50 [ 1039.697585] get_empty_filp+0x15c/0x3e0 [ 1039.697596] path_openat+0x87/0x2aa0 [ 1039.697606] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 1039.697616] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1039.697625] ? kmem_cache_alloc+0x124/0x3c0 [ 1039.697633] ? getname_flags+0xc8/0x550 [ 1039.697640] ? do_sys_open+0x202/0x3e0 [ 1039.697651] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1039.697660] ? simple_xattr_get+0xe5/0x160 [ 1039.697669] ? path_mountpoint+0x960/0x960 [ 1039.697680] ? trace_hardirqs_on+0x10/0x10 [ 1039.697695] do_filp_open+0x18e/0x250 [ 1039.697705] ? may_open_dev+0xe0/0xe0 [ 1039.697714] ? __alloc_fd+0x1bf/0x490 [ 1039.697727] ? lock_acquire+0x170/0x3f0 [ 1039.702549] hfsplus: unable to parse mount options [ 1039.711543] ? lock_downgrade+0x6e0/0x6e0 [ 1039.711557] ? do_raw_spin_unlock+0x164/0x250 [ 1039.711568] ? __alloc_fd+0x1bf/0x490 [ 1039.711584] do_sys_open+0x292/0x3e0 [ 1039.711593] ? filp_open+0x60/0x60 13:43:41 executing program 3 (fault-call:4 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:41 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x8) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1039.711602] ? fput+0xb/0x140 [ 1039.711612] ? do_syscall_64+0x4c/0x640 [ 1039.711619] ? do_sys_open+0x3e0/0x3e0 [ 1039.711629] do_syscall_64+0x1d5/0x640 [ 1039.711645] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1039.711654] RIP: 0033:0x416861 [ 1039.734550] gfs2: not a GFS2 filesystem [ 1039.735056] RSP: 002b:00007fb81a6b4a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1039.735068] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 0000000000416861 [ 1039.735074] RDX: 00007fb81a6b4b0a RSI: 0000000000000002 RDI: 00007fb81a6b4b00 [ 1039.735080] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1039.735086] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 1039.735092] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1039.915205] FAULT_INJECTION: forcing a failure. [ 1039.915205] name failslab, interval 1, probability 0, space 0, times 0 13:43:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1039.930464] CPU: 1 PID: 23199 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1039.938351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.947699] Call Trace: [ 1039.950290] dump_stack+0x1b2/0x283 [ 1039.953923] should_fail.cold+0x10a/0x154 [ 1039.958078] should_failslab+0xd6/0x130 [ 1039.962057] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1039.966729] ? loop_get_status64+0x100/0x100 [ 1039.971137] __kthread_create_on_node+0xbe/0x3a0 [ 1039.975892] ? kthread_park+0x130/0x130 13:43:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1039.979917] ? lo_ioctl+0x87/0x1c00 [ 1039.983555] ? __mutex_lock+0x2cb/0x1430 [ 1039.987637] ? __fget+0x1ff/0x360 [ 1039.991108] ? loop_get_status64+0x100/0x100 [ 1039.995518] kthread_create_on_node+0xa8/0xd0 [ 1040.000014] ? __kthread_create_on_node+0x3a0/0x3a0 [ 1040.005040] ? __lockdep_init_map+0x100/0x560 [ 1040.009531] ? __lockdep_init_map+0x100/0x560 [ 1040.014040] lo_ioctl+0xca9/0x1c00 [ 1040.017583] ? loop_clr_fd+0xac0/0xac0 [ 1040.021470] blkdev_ioctl+0x91d/0x17c0 [ 1040.025350] ? blkpg_ioctl+0x8d0/0x8d0 [ 1040.029239] ? trace_hardirqs_on+0x10/0x10 [ 1040.033484] block_ioctl+0xd9/0x120 [ 1040.037105] ? blkdev_fallocate+0x3a0/0x3a0 [ 1040.041425] do_vfs_ioctl+0x75a/0xfe0 [ 1040.045225] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1040.050852] ? ioctl_preallocate+0x1a0/0x1a0 [ 1040.055265] ? security_file_ioctl+0x76/0xb0 [ 1040.059665] ? security_file_ioctl+0x83/0xb0 [ 1040.064070] SyS_ioctl+0x7f/0xb0 [ 1040.067436] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1040.071410] do_syscall_64+0x1d5/0x640 [ 1040.075302] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1040.080483] RIP: 0033:0x45c937 [ 1040.083664] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1040.091367] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1040.098633] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1040.105952] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1040.113236] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1040.120492] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:41 executing program 2 (fault-call:4 fault-nth:22): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:41 executing program 4: r0 = timerfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timerfd_settime(r3, 0x1, &(0x7f0000000280)={{r4, r5+60000000}}, &(0x7f00000002c0)) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r6 = gettid() ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80022, 0x0) keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x3}) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0xdb, 0x9, 0x1, 0x7, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0xffffffff, 0x3, 0x49, 0x4, 0x36}, r6, 0x1, 0xffffffffffffffff, 0x8) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) shmget(0x2, 0x8000, 0x1, &(0x7f0000ff8000/0x8000)=nil) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:41 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) clock_adjtime(0x6, &(0x7f0000000240)={0x0, 0x2, 0x9, 0x1000, 0x9, 0xb3, 0x7, 0x6, 0xb3, 0x101, 0x7fff, 0x8, 0x6, 0xfffffffffffffff9, 0xfff, 0x7, 0x100000001, 0x1ff, 0x100000000, 0x4, 0x6, 0x3, 0x5ec, 0x800, 0x7628, 0x6cd9da57}) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000140)="43867b6abd52ef582337958dfd0f079594f6912b9d6b1508ea730f6962b56cb4a5424496c0a38113d861e125618e38e1bb28cf8e8210eeffb3eedcd80a138a7b2550d5ba88c3087fee6dfba1f30ca4943a94fb9c8060ca19bcc384151eff4cbbcd6741984bd3e910038187f62eceef57c5113d9cfbbbe2811d515acf18ce237dbf36193ef5e7735da387a879198bbf99afb6a90bfc312d517a3e714c31072009adb73b5ce47cfd70e5056523a9e2620a230cbfaa2998", 0xb6) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f0000000080)=0x101) [ 1040.196141] hfsplus: gid requires an argument [ 1040.201461] hfsplus: unable to parse mount options [ 1040.253048] FAULT_INJECTION: forcing a failure. [ 1040.253048] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.270759] CPU: 0 PID: 23227 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1040.278654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.288003] Call Trace: [ 1040.290694] dump_stack+0x1b2/0x283 [ 1040.294319] should_fail.cold+0x10a/0x154 [ 1040.298448] should_failslab+0xd6/0x130 [ 1040.302419] kmem_cache_alloc_node+0x25f/0x400 [ 1040.306991] __alloc_skb+0x9a/0x4c0 [ 1040.310637] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1040.315460] ? netlink_has_listeners+0x1ff/0x310 [ 1040.320196] kobject_uevent_env+0x6d1/0xc50 [ 1040.324534] lo_ioctl+0x1177/0x1c00 [ 1040.328150] ? loop_clr_fd+0xac0/0xac0 [ 1040.332054] blkdev_ioctl+0x91d/0x17c0 [ 1040.335942] ? blkpg_ioctl+0x8d0/0x8d0 [ 1040.339817] ? trace_hardirqs_on+0x10/0x10 [ 1040.344211] block_ioctl+0xd9/0x120 [ 1040.347821] ? blkdev_fallocate+0x3a0/0x3a0 [ 1040.352143] do_vfs_ioctl+0x75a/0xfe0 [ 1040.355924] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1040.361531] ? ioctl_preallocate+0x1a0/0x1a0 [ 1040.365921] ? security_file_ioctl+0x76/0xb0 [ 1040.370309] ? security_file_ioctl+0x83/0xb0 [ 1040.374712] SyS_ioctl+0x7f/0xb0 [ 1040.378070] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1040.382037] do_syscall_64+0x1d5/0x640 [ 1040.385922] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1040.391089] RIP: 0033:0x45c937 [ 1040.394526] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1040.402226] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1040.409479] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1040.416742] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1040.424013] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1040.431274] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1040.445306] gfs2: not a GFS2 filesystem [ 1040.447163] hfsplus: gid requires an argument [ 1040.453768] hfsplus: unable to parse mount options 13:43:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364", 0x64}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:43 executing program 3 (fault-call:4 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:43 executing program 2 (fault-call:4 fault-nth:23): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:43 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB="848e"]) 13:43:43 executing program 4: getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = socket(0x4, 0x800, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r2, @ANYBLOB="250200000020000180080003689e55343abe45bb5e533913030001000000140002006873723000000000000000802800018008001100000000000000000000e09e94b3c148ac281b1aa3026a20e4955e6d147cee5cfb3146840da79a9308e3ade533f27a0e15321a67530a6ecb2a896abecb1af4c0cc36f8ecd4985a52ce6f5ac1b855dcea294d1fa141cb5772d19fa9c20998fa1c1e47a25c9c9cabf49fa720bc7103c8f798f6e72b47e7a82fa6b93633e4d1c1", @ANYRES32=r4, @ANYBLOB="140002007866726d3000000000000000000000000800030002000000300001800800030006000000080003000200000008000300020000001400020076657468305f746f5f6261746164760030000180080003000000000008000100", @ANYRES32=r7, @ANYBLOB="0800030001000000140002006d6163766c616e300000000000000000"], 0xc0}, 0x1, 0x0, 0x0, 0x40}, 0x40) r9 = timerfd_create(0x634b5721f519d39f, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) timerfd_settime(r9, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1042.520192] hfsplus: unable to parse mount options [ 1042.538332] FAULT_INJECTION: forcing a failure. [ 1042.538332] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.561036] FAULT_INJECTION: forcing a failure. [ 1042.561036] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.572909] CPU: 0 PID: 23259 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1042.580822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.590166] Call Trace: [ 1042.592755] dump_stack+0x1b2/0x283 [ 1042.596388] should_fail.cold+0x10a/0x154 [ 1042.600538] should_failslab+0xd6/0x130 [ 1042.604522] kmem_cache_alloc_node+0x25f/0x400 [ 1042.609107] __alloc_skb+0x9a/0x4c0 [ 1042.612733] ? __kmalloc_reserve.isra.0+0xd0/0xd0 13:43:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1042.617571] ? netlink_has_listeners+0x1ff/0x310 [ 1042.622321] kobject_uevent_env+0x6d1/0xc50 [ 1042.626654] lo_ioctl+0x1177/0x1c00 [ 1042.630281] ? loop_clr_fd+0xac0/0xac0 [ 1042.634164] blkdev_ioctl+0x91d/0x17c0 [ 1042.638044] ? blkpg_ioctl+0x8d0/0x8d0 [ 1042.641921] ? trace_hardirqs_on+0x10/0x10 [ 1042.646148] block_ioctl+0xd9/0x120 [ 1042.649758] ? blkdev_fallocate+0x3a0/0x3a0 [ 1042.654065] do_vfs_ioctl+0x75a/0xfe0 [ 1042.657855] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1042.663471] ? ioctl_preallocate+0x1a0/0x1a0 [ 1042.667868] ? security_file_ioctl+0x76/0xb0 [ 1042.672254] ? security_file_ioctl+0x83/0xb0 [ 1042.676649] SyS_ioctl+0x7f/0xb0 [ 1042.680093] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1042.684053] do_syscall_64+0x1d5/0x640 [ 1042.687930] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1042.693102] RIP: 0033:0x45c937 [ 1042.696279] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1042.703983] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1042.711241] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1042.718503] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1042.725764] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1042.733018] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1042.740283] CPU: 1 PID: 23261 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1042.748166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.753400] gfs2: not a GFS2 filesystem [ 1042.757508] Call Trace: [ 1042.757526] dump_stack+0x1b2/0x283 [ 1042.757544] should_fail.cold+0x10a/0x154 [ 1042.757558] should_failslab+0xd6/0x130 [ 1042.757567] kmem_cache_alloc+0x28e/0x3c0 [ 1042.757579] __kernfs_new_node+0x6f/0x470 [ 1042.784060] kernfs_new_node+0x7b/0xe0 [ 1042.788035] kernfs_create_dir_ns+0x3c/0x130 [ 1042.792441] internal_create_group+0xea/0x7e0 [ 1042.796943] lo_ioctl+0x1108/0x1c00 [ 1042.800575] ? loop_clr_fd+0xac0/0xac0 [ 1042.804515] blkdev_ioctl+0x91d/0x17c0 [ 1042.808406] ? blkpg_ioctl+0x8d0/0x8d0 [ 1042.812292] ? trace_hardirqs_on+0x10/0x10 [ 1042.816536] block_ioctl+0xd9/0x120 [ 1042.820159] ? blkdev_fallocate+0x3a0/0x3a0 [ 1042.824491] do_vfs_ioctl+0x75a/0xfe0 [ 1042.828294] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1042.833916] ? ioctl_preallocate+0x1a0/0x1a0 [ 1042.838331] ? security_file_ioctl+0x76/0xb0 [ 1042.842734] ? security_file_ioctl+0x83/0xb0 [ 1042.847137] SyS_ioctl+0x7f/0xb0 [ 1042.850496] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1042.854728] do_syscall_64+0x1d5/0x640 [ 1042.858619] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1042.863799] RIP: 0033:0x45c937 13:43:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, 0x0, 0x0) [ 1042.866981] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1042.874681] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1042.881946] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1042.889209] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1042.896469] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1042.903717] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:44 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) signalfd4(r1, &(0x7f0000000040)={[0x5]}, 0x8, 0x1000) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6769643d2fc5761d6ab30b3a98032632896fa01af578825c0ded2a9d2c2710c5f31009b7950be2ae230ee762ca7bc0eda38ec0dea453cc04a9e6a818a80cbe880f146310793131ab346c145bcfa517c3e4081b9274ce17ba0e61c38907bfda5dc823f85215266dc9420c453bb036e0d0061f93e762fae469fe43e1ff771c4e42e371a5894e4c035031fccd612336dd6defafd62ddb9178c8b501", @ANYRESHEX=r0, @ANYBLOB=',\x00']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_buf(r4, 0x0, 0x11, &(0x7f0000000100)=""/78, &(0x7f0000000180)=0x4e) 13:43:44 executing program 2 (fault-call:4 fault-nth:24): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1042.934308] gfs2: not a GFS2 filesystem 13:43:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, 0x0, 0x0) [ 1043.033585] FAULT_INJECTION: forcing a failure. [ 1043.033585] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.044957] CPU: 0 PID: 23302 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1043.052829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1043.062297] Call Trace: [ 1043.064868] dump_stack+0x1b2/0x283 [ 1043.068489] should_fail.cold+0x10a/0x154 [ 1043.072643] should_failslab+0xd6/0x130 [ 1043.076598] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1043.081683] __kmalloc_node_track_caller+0x38/0x70 [ 1043.086602] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1043.091257] __alloc_skb+0xca/0x4c0 [ 1043.094860] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1043.099680] ? netlink_has_listeners+0x1ff/0x310 [ 1043.104414] kobject_uevent_env+0x6d1/0xc50 [ 1043.108739] lo_ioctl+0x1177/0x1c00 [ 1043.112391] ? loop_clr_fd+0xac0/0xac0 [ 1043.116332] blkdev_ioctl+0x91d/0x17c0 [ 1043.120209] ? blkpg_ioctl+0x8d0/0x8d0 [ 1043.124080] ? trace_hardirqs_on+0x10/0x10 [ 1043.128318] block_ioctl+0xd9/0x120 [ 1043.131937] ? blkdev_fallocate+0x3a0/0x3a0 [ 1043.136249] do_vfs_ioctl+0x75a/0xfe0 [ 1043.140071] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1043.145687] ? ioctl_preallocate+0x1a0/0x1a0 [ 1043.150085] ? security_file_ioctl+0x76/0xb0 [ 1043.154507] ? security_file_ioctl+0x83/0xb0 [ 1043.159791] SyS_ioctl+0x7f/0xb0 [ 1043.163156] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1043.167122] do_syscall_64+0x1d5/0x640 [ 1043.171025] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1043.176196] RIP: 0033:0x45c937 [ 1043.179365] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1043.187059] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1043.194419] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1043.201677] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1043.208955] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1043.216250] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1043.227828] hfsplus: unable to parse mount options [ 1043.229155] gfs2: not a GFS2 filesystem [ 1043.278692] hfsplus: unable to parse mount options 13:43:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f0", 0x75}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:46 executing program 3 (fault-call:4 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, 0x0, 0x0) 13:43:46 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x6, 0x40) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x10101, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000140)={{}, {0x0, 0x989680}}, &(0x7f0000af9ff0)) 13:43:46 executing program 2 (fault-call:4 fault-nth:25): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:46 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 13:43:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1045.548615] FAULT_INJECTION: forcing a failure. [ 1045.548615] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.570612] CPU: 1 PID: 23326 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1045.578514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1045.581641] FAULT_INJECTION: forcing a failure. [ 1045.581641] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.587949] Call Trace: [ 1045.587968] dump_stack+0x1b2/0x283 [ 1045.587985] should_fail.cold+0x10a/0x154 [ 1045.587999] should_failslab+0xd6/0x130 [ 1045.588010] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1045.588025] __kmalloc_node_track_caller+0x38/0x70 [ 1045.588037] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1045.588050] __alloc_skb+0xca/0x4c0 [ 1045.588061] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1045.588073] ? netlink_has_listeners+0x1ff/0x310 [ 1045.588083] kobject_uevent_env+0x6d1/0xc50 [ 1045.588100] lo_ioctl+0x1177/0x1c00 [ 1045.650153] ? loop_clr_fd+0xac0/0xac0 [ 1045.654025] blkdev_ioctl+0x91d/0x17c0 [ 1045.657928] ? blkpg_ioctl+0x8d0/0x8d0 [ 1045.661803] ? trace_hardirqs_on+0x10/0x10 [ 1045.666028] block_ioctl+0xd9/0x120 [ 1045.669656] ? blkdev_fallocate+0x3a0/0x3a0 [ 1045.673978] do_vfs_ioctl+0x75a/0xfe0 [ 1045.677772] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1045.683387] ? ioctl_preallocate+0x1a0/0x1a0 [ 1045.687787] ? security_file_ioctl+0x76/0xb0 [ 1045.692178] ? security_file_ioctl+0x83/0xb0 [ 1045.696580] SyS_ioctl+0x7f/0xb0 [ 1045.700890] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1045.704850] do_syscall_64+0x1d5/0x640 [ 1045.708725] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1045.713904] RIP: 0033:0x45c937 [ 1045.717172] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1045.724884] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1045.732156] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1045.739423] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 13:43:47 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000000)=""/73) [ 1045.746685] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1045.753944] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1045.761212] CPU: 0 PID: 23333 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1045.769103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1045.776865] Cannot find del_set index 0 as target [ 1045.778468] Call Trace: [ 1045.778487] dump_stack+0x1b2/0x283 [ 1045.778504] should_fail.cold+0x10a/0x154 [ 1045.778518] should_failslab+0xd6/0x130 [ 1045.798064] kmem_cache_alloc+0x28e/0x3c0 [ 1045.798081] gfs2: not a GFS2 filesystem [ 1045.802206] __kernfs_new_node+0x6f/0x470 [ 1045.802220] kernfs_new_node+0x7b/0xe0 [ 1045.802233] __kernfs_create_file+0x3d/0x320 [ 1045.802243] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1045.802257] internal_create_group+0x23b/0x7e0 [ 1045.807419] hfsplus: gid requires an argument [ 1045.810364] lo_ioctl+0x1108/0x1c00 [ 1045.814722] hfsplus: unable to parse mount options [ 1045.818643] ? loop_clr_fd+0xac0/0xac0 [ 1045.818656] blkdev_ioctl+0x91d/0x17c0 [ 1045.818666] ? blkpg_ioctl+0x8d0/0x8d0 [ 1045.818676] ? trace_hardirqs_on+0x10/0x10 [ 1045.818695] block_ioctl+0xd9/0x120 [ 1045.818706] ? blkdev_fallocate+0x3a0/0x3a0 [ 1045.865504] do_vfs_ioctl+0x75a/0xfe0 [ 1045.869314] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1045.877986] ? ioctl_preallocate+0x1a0/0x1a0 [ 1045.882407] ? security_file_ioctl+0x76/0xb0 [ 1045.886820] ? security_file_ioctl+0x83/0xb0 [ 1045.891231] SyS_ioctl+0x7f/0xb0 [ 1045.894602] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1045.898580] do_syscall_64+0x1d5/0x640 [ 1045.902477] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1045.907664] RIP: 0033:0x45c937 [ 1045.910862] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1045.918567] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1045.925839] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1045.933106] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1045.940543] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 13:43:47 executing program 4: r0 = timerfd_create(0x1, 0x800) r1 = socket$inet6(0xa, 0xa, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1045.947810] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:43:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1045.993742] gfs2: not a GFS2 filesystem 13:43:47 executing program 3 (fault-call:4 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1046.087144] FAULT_INJECTION: forcing a failure. [ 1046.087144] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.105387] CPU: 1 PID: 23375 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1046.113374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1046.122726] Call Trace: [ 1046.125318] dump_stack+0x1b2/0x283 [ 1046.128953] should_fail.cold+0x10a/0x154 [ 1046.133103] should_failslab+0xd6/0x130 [ 1046.137076] kmem_cache_alloc+0x28e/0x3c0 [ 1046.141225] __kernfs_new_node+0x6f/0x470 [ 1046.145376] kernfs_new_node+0x7b/0xe0 [ 1046.149267] __kernfs_create_file+0x3d/0x320 [ 1046.153679] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1046.158362] internal_create_group+0x23b/0x7e0 [ 1046.162950] lo_ioctl+0x1108/0x1c00 [ 1046.166580] ? loop_clr_fd+0xac0/0xac0 [ 1046.170464] blkdev_ioctl+0x91d/0x17c0 [ 1046.174433] ? blkpg_ioctl+0x8d0/0x8d0 [ 1046.178319] ? trace_hardirqs_on+0x10/0x10 [ 1046.182562] block_ioctl+0xd9/0x120 [ 1046.186186] ? blkdev_fallocate+0x3a0/0x3a0 [ 1046.190509] do_vfs_ioctl+0x75a/0xfe0 [ 1046.194324] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1046.200732] ? ioctl_preallocate+0x1a0/0x1a0 [ 1046.205149] ? security_file_ioctl+0x76/0xb0 [ 1046.209564] ? security_file_ioctl+0x83/0xb0 [ 1046.213975] SyS_ioctl+0x7f/0xb0 [ 1046.217341] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1046.221318] do_syscall_64+0x1d5/0x640 [ 1046.225296] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1046.230482] RIP: 0033:0x45c937 [ 1046.233695] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1046.241406] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1046.248705] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1046.255969] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1046.263218] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1046.270517] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1046.289971] gfs2: not a GFS2 filesystem 13:43:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f0", 0x75}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:50 executing program 2 (fault-call:4 fault-nth:26): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:50 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6769643d1f91f3d0d9f81c766803bb40f16084557e5900c028a2c2969ea4e05975728943d91af14068afc341c23eaa47fa9110b4238842d6c2df09e73538b2cfbc6d3d74a120bfec828741289da32b75c8096917db125f1361bd9075efab6c876c4c986a024e66a3ce118ed907fe1e663a6b9831e44b8bc223cea795df18f8bec80381ce2827e16add40a32078b57048d61c915597", @ANYRESHEX=r0, @ANYBLOB=',\x00']) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/psched\x00') ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000080)={0xcf, &(0x7f0000000240)=""/207}) 13:43:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:43:50 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x9, 0x9, 0xfe, 0x7}, {0x9, 0x20, 0xff, 0x2}, {0x4, 0x2, 0x2, 0x3}]}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:43:50 executing program 3 (fault-call:4 fault-nth:14): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1048.575122] hfsplus: unable to parse mount options [ 1048.579788] FAULT_INJECTION: forcing a failure. [ 1048.579788] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.585465] FAULT_INJECTION: forcing a failure. [ 1048.585465] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.622873] CPU: 1 PID: 23396 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1048.630860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.640210] Call Trace: [ 1048.642800] dump_stack+0x1b2/0x283 [ 1048.646435] should_fail.cold+0x10a/0x154 [ 1048.650588] should_failslab+0xd6/0x130 [ 1048.654569] kmem_cache_alloc_node+0x25f/0x400 [ 1048.659235] __alloc_skb+0x9a/0x4c0 [ 1048.662864] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1048.667704] ? netlink_has_listeners+0x1ff/0x310 [ 1048.672476] kobject_uevent_env+0x6d1/0xc50 [ 1048.676795] lo_ioctl+0x1177/0x1c00 [ 1048.678847] Cannot find del_set index 0 as target [ 1048.680417] ? loop_clr_fd+0xac0/0xac0 [ 1048.680430] blkdev_ioctl+0x91d/0x17c0 [ 1048.680439] ? blkpg_ioctl+0x8d0/0x8d0 [ 1048.680448] ? trace_hardirqs_on+0x10/0x10 [ 1048.680467] block_ioctl+0xd9/0x120 [ 1048.704763] ? blkdev_fallocate+0x3a0/0x3a0 [ 1048.709084] do_vfs_ioctl+0x75a/0xfe0 [ 1048.713030] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1048.718663] ? ioctl_preallocate+0x1a0/0x1a0 [ 1048.723068] ? security_file_ioctl+0x76/0xb0 [ 1048.727476] ? security_file_ioctl+0x83/0xb0 [ 1048.732321] SyS_ioctl+0x7f/0xb0 [ 1048.735686] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1048.739663] do_syscall_64+0x1d5/0x640 [ 1048.743554] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1048.748739] RIP: 0033:0x45c937 [ 1048.751920] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1048.759614] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1048.766870] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 13:43:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x81}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1048.774129] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1048.781389] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1048.788640] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1048.792402] Cannot find del_set index 0 as target [ 1048.802673] gfs2: not a GFS2 filesystem 13:43:50 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x5d) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), 0x4) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000040)=0x80000000004) ioctl$VIDIOC_EXPBUF(r6, 0xc0405610, &(0x7f0000000000)={0x7, 0x9, 0x4, 0x80000, r2}) [ 1048.821586] hfsplus: unable to parse mount options [ 1048.832672] CPU: 0 PID: 23399 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1048.840566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.849922] Call Trace: [ 1048.852515] dump_stack+0x1b2/0x283 [ 1048.856144] should_fail.cold+0x10a/0x154 [ 1048.860412] should_failslab+0xd6/0x130 [ 1048.864387] kmem_cache_alloc+0x28e/0x3c0 [ 1048.868535] __kernfs_new_node+0x6f/0x470 [ 1048.872683] kernfs_new_node+0x7b/0xe0 [ 1048.876569] __kernfs_create_file+0x3d/0x320 [ 1048.880977] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1048.885648] internal_create_group+0x23b/0x7e0 [ 1048.890354] lo_ioctl+0x1108/0x1c00 [ 1048.893986] ? loop_clr_fd+0xac0/0xac0 [ 1048.897873] blkdev_ioctl+0x91d/0x17c0 [ 1048.901846] ? blkpg_ioctl+0x8d0/0x8d0 [ 1048.905733] ? trace_hardirqs_on+0x10/0x10 [ 1048.909975] block_ioctl+0xd9/0x120 [ 1048.913599] ? blkdev_fallocate+0x3a0/0x3a0 [ 1048.917927] do_vfs_ioctl+0x75a/0xfe0 [ 1048.921728] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1048.927355] ? ioctl_preallocate+0x1a0/0x1a0 [ 1048.931774] ? security_file_ioctl+0x76/0xb0 [ 1048.936182] ? security_file_ioctl+0x83/0xb0 [ 1048.940588] SyS_ioctl+0x7f/0xb0 [ 1048.943962] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1048.947931] do_syscall_64+0x1d5/0x640 [ 1048.951822] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1048.956997] RIP: 0033:0x45c937 [ 1048.960164] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1048.967850] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 13:43:50 executing program 2 (fault-call:4 fault-nth:27): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1048.975098] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1048.982345] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1048.989595] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1048.996847] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1049.017950] gfs2: not a GFS2 filesystem 13:43:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1049.028844] FAULT_INJECTION: forcing a failure. [ 1049.028844] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.040220] CPU: 0 PID: 23435 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1049.048095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1049.057443] Call Trace: [ 1049.060037] dump_stack+0x1b2/0x283 [ 1049.063669] should_fail.cold+0x10a/0x154 [ 1049.067821] should_failslab+0xd6/0x130 [ 1049.071795] kmem_cache_alloc_node_trace+0x25a/0x400 13:43:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1049.076903] __kmalloc_node_track_caller+0x38/0x70 [ 1049.080813] Cannot find del_set index 0 as target [ 1049.081830] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1049.081844] __alloc_skb+0xca/0x4c0 [ 1049.081853] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1049.081866] ? netlink_has_listeners+0x1ff/0x310 [ 1049.104523] kobject_uevent_env+0x6d1/0xc50 [ 1049.108855] lo_ioctl+0x1177/0x1c00 [ 1049.112488] ? loop_clr_fd+0xac0/0xac0 [ 1049.116390] blkdev_ioctl+0x91d/0x17c0 [ 1049.120277] ? blkpg_ioctl+0x8d0/0x8d0 [ 1049.124160] ? trace_hardirqs_on+0x10/0x10 [ 1049.128414] block_ioctl+0xd9/0x120 [ 1049.132106] ? blkdev_fallocate+0x3a0/0x3a0 [ 1049.136422] do_vfs_ioctl+0x75a/0xfe0 [ 1049.140218] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1049.145822] ? ioctl_preallocate+0x1a0/0x1a0 [ 1049.150230] ? security_file_ioctl+0x76/0xb0 [ 1049.154630] ? security_file_ioctl+0x83/0xb0 [ 1049.159019] SyS_ioctl+0x7f/0xb0 [ 1049.162378] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1049.166333] do_syscall_64+0x1d5/0x640 [ 1049.170200] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1049.175383] RIP: 0033:0x45c937 [ 1049.178566] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1049.186253] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1049.193762] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1049.201009] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1049.208287] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1049.215624] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1049.226002] gfs2: not a GFS2 filesystem 13:43:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f0", 0x75}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:43:53 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:43:53 executing program 3 (fault-call:4 fault-nth:15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:53 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x0, 0x9, 0x81, 0x0, 0x9, 0xa0200, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, 0x4, @perf_config_ext={0x9, 0x5}, 0x0, 0x7fff, 0x1ff, 0x3, 0xffffffffffffa892, 0x753, 0x400}, 0x0, 0x0, r2, 0x8) 13:43:53 executing program 2 (fault-call:4 fault-nth:28): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1051.589584] FAULT_INJECTION: forcing a failure. [ 1051.589584] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.621920] FAULT_INJECTION: forcing a failure. [ 1051.621920] name failslab, interval 1, probability 0, space 0, times 0 [ 1051.628209] CPU: 0 PID: 23457 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1051.640993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.650332] Call Trace: [ 1051.652906] dump_stack+0x1b2/0x283 [ 1051.656559] should_fail.cold+0x10a/0x154 [ 1051.660692] should_failslab+0xd6/0x130 [ 1051.664646] kmem_cache_alloc+0x28e/0x3c0 [ 1051.668783] __kernfs_new_node+0x6f/0x470 [ 1051.672919] kernfs_new_node+0x7b/0xe0 [ 1051.676788] __kernfs_create_file+0x3d/0x320 [ 1051.681181] sysfs_add_file_mode_ns+0x1e1/0x450 13:43:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1051.685858] internal_create_group+0x23b/0x7e0 [ 1051.690600] lo_ioctl+0x1108/0x1c00 [ 1051.694213] ? loop_clr_fd+0xac0/0xac0 [ 1051.698094] blkdev_ioctl+0x91d/0x17c0 [ 1051.701982] ? blkpg_ioctl+0x8d0/0x8d0 [ 1051.705864] ? trace_hardirqs_on+0x10/0x10 [ 1051.710108] block_ioctl+0xd9/0x120 [ 1051.713728] ? blkdev_fallocate+0x3a0/0x3a0 [ 1051.718039] do_vfs_ioctl+0x75a/0xfe0 [ 1051.721841] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1051.727468] ? ioctl_preallocate+0x1a0/0x1a0 [ 1051.731879] ? security_file_ioctl+0x76/0xb0 13:43:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x8}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1051.736286] ? security_file_ioctl+0x83/0xb0 [ 1051.740687] SyS_ioctl+0x7f/0xb0 [ 1051.744041] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1051.748094] do_syscall_64+0x1d5/0x640 [ 1051.751980] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1051.757164] RIP: 0033:0x45c937 [ 1051.760348] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1051.768049] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1051.775305] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1051.782558] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1051.789808] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1051.797071] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1051.804334] CPU: 1 PID: 23464 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1051.808916] Cannot find del_set index 0 as target [ 1051.812209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1051.812214] Call Trace: [ 1051.812230] dump_stack+0x1b2/0x283 [ 1051.812245] should_fail.cold+0x10a/0x154 [ 1051.836713] should_failslab+0xd6/0x130 [ 1051.840672] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1051.845765] __kmalloc_node_track_caller+0x38/0x70 [ 1051.850692] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1051.855363] __alloc_skb+0xca/0x4c0 [ 1051.858986] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1051.863827] ? netlink_has_listeners+0x1ff/0x310 [ 1051.868668] kobject_uevent_env+0x6d1/0xc50 [ 1051.873092] lo_ioctl+0x1177/0x1c00 [ 1051.876699] ? loop_clr_fd+0xac0/0xac0 [ 1051.880565] blkdev_ioctl+0x91d/0x17c0 [ 1051.884446] ? blkpg_ioctl+0x8d0/0x8d0 [ 1051.888317] ? trace_hardirqs_on+0x10/0x10 [ 1051.892540] block_ioctl+0xd9/0x120 [ 1051.896198] ? blkdev_fallocate+0x3a0/0x3a0 [ 1051.900508] do_vfs_ioctl+0x75a/0xfe0 [ 1051.904306] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1051.909911] ? ioctl_preallocate+0x1a0/0x1a0 [ 1051.914323] ? security_file_ioctl+0x76/0xb0 [ 1051.918760] ? security_file_ioctl+0x83/0xb0 [ 1051.923145] SyS_ioctl+0x7f/0xb0 [ 1051.926488] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1051.930440] do_syscall_64+0x1d5/0x640 [ 1051.934363] entry_SYSCALL_64_after_hwframe+0x46/0xbb 13:43:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:53 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f0000000000)) [ 1051.939596] RIP: 0033:0x45c937 [ 1051.942842] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1051.950551] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1051.957807] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1051.965054] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1051.972316] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1051.979832] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:43:53 executing program 2 (fault-call:4 fault-nth:29): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1052.007655] gfs2: not a GFS2 filesystem [ 1052.022364] hfsplus: gid requires an argument [ 1052.029655] hfsplus: unable to parse mount options [ 1052.031701] gfs2: not a GFS2 filesystem [ 1052.066654] Cannot find del_set index 0 as target 13:43:53 executing program 3 (fault-call:4 fault-nth:16): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1052.132720] FAULT_INJECTION: forcing a failure. [ 1052.132720] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.149422] CPU: 0 PID: 23494 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1052.157324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.159632] FAULT_INJECTION: forcing a failure. [ 1052.159632] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.166669] Call Trace: [ 1052.166688] dump_stack+0x1b2/0x283 [ 1052.166704] should_fail.cold+0x10a/0x154 [ 1052.166719] should_failslab+0xd6/0x130 [ 1052.166730] kmem_cache_alloc_node+0x25f/0x400 [ 1052.166745] __alloc_skb+0x9a/0x4c0 [ 1052.166756] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1052.166770] ? netlink_has_listeners+0x1ff/0x310 [ 1052.166781] kobject_uevent_env+0x6d1/0xc50 [ 1052.166801] lo_ioctl+0x1177/0x1c00 [ 1052.217897] ? loop_clr_fd+0xac0/0xac0 [ 1052.221778] blkdev_ioctl+0x91d/0x17c0 [ 1052.225656] ? blkpg_ioctl+0x8d0/0x8d0 [ 1052.229529] ? trace_hardirqs_on+0x10/0x10 [ 1052.233755] block_ioctl+0xd9/0x120 [ 1052.237369] ? blkdev_fallocate+0x3a0/0x3a0 [ 1052.241682] do_vfs_ioctl+0x75a/0xfe0 [ 1052.245468] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1052.251075] ? ioctl_preallocate+0x1a0/0x1a0 [ 1052.255482] ? security_file_ioctl+0x76/0xb0 [ 1052.259877] ? security_file_ioctl+0x83/0xb0 [ 1052.264275] SyS_ioctl+0x7f/0xb0 [ 1052.267621] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1052.271752] do_syscall_64+0x1d5/0x640 [ 1052.275648] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1052.280823] RIP: 0033:0x45c937 [ 1052.283991] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1052.291676] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1052.298936] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1052.306199] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1052.313461] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1052.320720] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1052.327984] CPU: 1 PID: 23502 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1052.335883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1052.339190] gfs2: not a GFS2 filesystem [ 1052.345227] Call Trace: [ 1052.345245] dump_stack+0x1b2/0x283 [ 1052.345260] should_fail.cold+0x10a/0x154 [ 1052.345274] should_failslab+0xd6/0x130 [ 1052.363523] kmem_cache_alloc+0x28e/0x3c0 [ 1052.367670] __kernfs_new_node+0x6f/0x470 [ 1052.371816] kernfs_new_node+0x7b/0xe0 [ 1052.375703] __kernfs_create_file+0x3d/0x320 [ 1052.380110] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1052.384780] internal_create_group+0x23b/0x7e0 [ 1052.389365] lo_ioctl+0x1108/0x1c00 [ 1052.392992] ? loop_clr_fd+0xac0/0xac0 [ 1052.396884] blkdev_ioctl+0x91d/0x17c0 [ 1052.400767] ? blkpg_ioctl+0x8d0/0x8d0 [ 1052.404651] ? trace_hardirqs_on+0x10/0x10 [ 1052.408897] block_ioctl+0xd9/0x120 [ 1052.412526] ? blkdev_fallocate+0x3a0/0x3a0 [ 1052.416846] do_vfs_ioctl+0x75a/0xfe0 [ 1052.420651] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1052.426448] ? ioctl_preallocate+0x1a0/0x1a0 [ 1052.430864] ? security_file_ioctl+0x76/0xb0 [ 1052.435268] ? security_file_ioctl+0x83/0xb0 [ 1052.439672] SyS_ioctl+0x7f/0xb0 [ 1052.443038] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1052.447017] do_syscall_64+0x1d5/0x640 [ 1052.450906] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1052.456089] RIP: 0033:0x45c937 [ 1052.459273] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1052.467761] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1052.475023] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1052.482310] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1052.489557] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1052.496804] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1052.511653] gfs2: not a GFS2 filesystem 13:43:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:56 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000000)={0x3f, 0x5, 0x3, 0x6, 0x1, [{0x9, 0x1, 0xfffffffffffffffd, [], 0x168e}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r4 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)=r4) process_vm_writev(r4, &(0x7f0000000800)=[{&(0x7f0000000240)=""/238, 0xee}, {&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f00000004c0)=""/138, 0x8a}, {&(0x7f0000000580)=""/245, 0xf5}, {&(0x7f0000000380)=""/11, 0xb}, {&(0x7f0000000680)=""/155, 0x9b}], 0x6, &(0x7f0000000ac0)=[{&(0x7f0000000740)=""/4, 0x4}, {&(0x7f0000000880)=""/89, 0x59}, {&(0x7f0000000900)=""/42, 0x2a}, {&(0x7f0000000940)=""/17, 0x11}, {&(0x7f0000000980)=""/192, 0xc0}, {&(0x7f0000000a40)=""/118, 0x76}], 0x6, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x6, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) getsockopt$rose(r2, 0x104, 0x6, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r8, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 13:43:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private=0xa010101, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:56 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) 13:43:56 executing program 2 (fault-call:4 fault-nth:30): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:56 executing program 3 (fault-call:4 fault-nth:17): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1054.650104] Cannot find del_set index 0 as target [ 1054.661554] FAULT_INJECTION: forcing a failure. [ 1054.661554] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.687988] CPU: 1 PID: 23524 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1054.695891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.705270] Call Trace: [ 1054.707977] dump_stack+0x1b2/0x283 [ 1054.711609] should_fail.cold+0x10a/0x154 [ 1054.715761] should_failslab+0xd6/0x130 [ 1054.719757] kmem_cache_alloc+0x28e/0x3c0 [ 1054.723905] __kernfs_new_node+0x6f/0x470 [ 1054.728056] kernfs_new_node+0x7b/0xe0 [ 1054.731968] __kernfs_create_file+0x3d/0x320 [ 1054.736379] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1054.741060] internal_create_group+0x23b/0x7e0 [ 1054.745648] lo_ioctl+0x1108/0x1c00 [ 1054.749279] ? loop_clr_fd+0xac0/0xac0 [ 1054.753165] blkdev_ioctl+0x91d/0x17c0 [ 1054.757048] ? blkpg_ioctl+0x8d0/0x8d0 [ 1054.760932] ? trace_hardirqs_on+0x10/0x10 [ 1054.765174] block_ioctl+0xd9/0x120 [ 1054.768795] ? blkdev_fallocate+0x3a0/0x3a0 [ 1054.773115] do_vfs_ioctl+0x75a/0xfe0 [ 1054.776919] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1054.782546] ? ioctl_preallocate+0x1a0/0x1a0 [ 1054.786966] ? security_file_ioctl+0x76/0xb0 [ 1054.791371] ? security_file_ioctl+0x83/0xb0 [ 1054.795779] SyS_ioctl+0x7f/0xb0 [ 1054.799144] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1054.803116] do_syscall_64+0x1d5/0x640 [ 1054.807007] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1054.812188] RIP: 0033:0x45c937 [ 1054.815369] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1054.823072] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1054.830335] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1054.837597] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 13:43:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private=0xa010102, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key=0x2c08}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1054.844860] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1054.852208] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1054.863458] FAULT_INJECTION: forcing a failure. [ 1054.863458] name failslab, interval 1, probability 0, space 0, times 0 [ 1054.884449] Cannot find del_set index 0 as target 13:43:56 executing program 4: r0 = timerfd_create(0x6, 0x80000) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) truncate(&(0x7f0000000000)='./file0\x00', 0x8) 13:43:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0xffffff00, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1054.915872] Cannot find del_set index 0 as target [ 1054.921397] CPU: 0 PID: 23527 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1054.929292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1054.938642] Call Trace: [ 1054.941242] dump_stack+0x1b2/0x283 [ 1054.944873] should_fail.cold+0x10a/0x154 [ 1054.949024] should_failslab+0xd6/0x130 [ 1054.952999] kmem_cache_alloc_node+0x25f/0x400 [ 1054.957587] __alloc_skb+0x9a/0x4c0 [ 1054.961216] ? __kmalloc_reserve.isra.0+0xd0/0xd0 13:43:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00', {0xff}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1054.966062] ? netlink_has_listeners+0x1ff/0x310 [ 1054.970820] kobject_uevent_env+0x6d1/0xc50 [ 1054.974644] Cannot find del_set index 0 as target [ 1054.975151] lo_ioctl+0x1177/0x1c00 [ 1054.975164] ? loop_clr_fd+0xac0/0xac0 [ 1054.987479] blkdev_ioctl+0x91d/0x17c0 [ 1054.991362] ? blkpg_ioctl+0x8d0/0x8d0 [ 1054.995245] ? trace_hardirqs_on+0x10/0x10 [ 1054.999490] block_ioctl+0xd9/0x120 [ 1055.003116] ? blkdev_fallocate+0x3a0/0x3a0 [ 1055.007440] do_vfs_ioctl+0x75a/0xfe0 13:43:56 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x5, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{0x77359400}, {r3, r4+10000000}}, &(0x7f0000000040)) [ 1055.011328] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1055.016960] ? ioctl_preallocate+0x1a0/0x1a0 [ 1055.021385] ? security_file_ioctl+0x76/0xb0 [ 1055.025794] ? security_file_ioctl+0x83/0xb0 [ 1055.030204] SyS_ioctl+0x7f/0xb0 [ 1055.033571] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1055.037546] do_syscall_64+0x1d5/0x640 [ 1055.041437] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1055.046623] RIP: 0033:0x45c937 [ 1055.049803] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1055.057509] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1055.064869] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1055.072131] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1055.079394] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1055.086655] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1055.108209] Cannot find del_set index 0 as target [ 1055.133265] gfs2: not a GFS2 filesystem [ 1055.135711] gfs2: not a GFS2 filesystem 13:43:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00', {}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:43:59 executing program 2 (fault-call:4 fault-nth:31): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:59 executing program 3 (fault-call:4 fault-nth:18): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:43:59 executing program 4: timerfd_create(0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x2000, &(0x7f0000000080)=ANY=[@ANYBLOB="75d97065726469723d2e2f66696c65302c696e6465783d6f66662c776f726b6469723d2e2f66696c65302c78696e6f3d6f6e2c6e66735f6578706f72743d6f66662c6c6f7765726469723d2e2f66696c65302c66756e633d4250524d5f434845434b2c00"]) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) timerfd_settime(r4, 0x3, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, &(0x7f0000af9ff0)) 13:43:59 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7adf4dbae50af970, r1) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB="2c002f354b988f371dd69588b61850010be99da7b8eab400c9bb80e771bb13d52028297c830b8ed8bfc2be93a897cf645d7fb344d016ff906b9bd7d8bff0c8"]) [ 1057.674357] hfsplus: gid requires an argument [ 1057.678880] hfsplus: unable to parse mount options [ 1057.689274] FAULT_INJECTION: forcing a failure. [ 1057.689274] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.701563] FAULT_INJECTION: forcing a failure. [ 1057.701563] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.703627] CPU: 0 PID: 23569 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 13:43:59 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {r3, r4+10000000}}, &(0x7f0000af9ff0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x140f, 0x100, 0x70bd25, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x8800) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r9, 0x8983, &(0x7f0000000180)={0x8, 'batadv_slave_0\x00', {'bond0\x00'}}) [ 1057.720641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1057.730004] Call Trace: [ 1057.732602] dump_stack+0x1b2/0x283 [ 1057.736230] should_fail.cold+0x10a/0x154 [ 1057.740376] should_failslab+0xd6/0x130 [ 1057.744352] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1057.749446] __kmalloc_node_track_caller+0x38/0x70 [ 1057.754371] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1057.759042] __alloc_skb+0xca/0x4c0 [ 1057.762664] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1057.766904] Cannot find del_set index 0 as target [ 1057.767499] ? netlink_has_listeners+0x1ff/0x310 [ 1057.776040] ptrace attach of "/root/syz-executor.5"[23584] was attempted by "/root/syz-executor.5"[23585] [ 1057.777063] kobject_uevent_env+0x6d1/0xc50 [ 1057.777084] lo_ioctl+0x1177/0x1c00 [ 1057.777096] ? loop_clr_fd+0xac0/0xac0 [ 1057.798808] blkdev_ioctl+0x91d/0x17c0 [ 1057.802691] ? blkpg_ioctl+0x8d0/0x8d0 [ 1057.806566] ? trace_hardirqs_on+0x10/0x10 [ 1057.810790] block_ioctl+0xd9/0x120 [ 1057.814402] ? blkdev_fallocate+0x3a0/0x3a0 [ 1057.818710] do_vfs_ioctl+0x75a/0xfe0 13:43:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f", 0x7d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1057.822493] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1057.828099] ? ioctl_preallocate+0x1a0/0x1a0 [ 1057.832500] ? security_file_ioctl+0x76/0xb0 [ 1057.836905] ? security_file_ioctl+0x83/0xb0 [ 1057.841306] SyS_ioctl+0x7f/0xb0 [ 1057.844666] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1057.848638] do_syscall_64+0x1d5/0x640 [ 1057.852528] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1057.857721] RIP: 0033:0x45c937 [ 1057.860900] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1057.868597] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1057.875849] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1057.883105] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1057.890363] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1057.897664] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1057.905027] CPU: 1 PID: 23576 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1057.913348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1057.922700] Call Trace: [ 1057.925289] dump_stack+0x1b2/0x283 [ 1057.928409] gfs2: not a GFS2 filesystem [ 1057.928919] should_fail.cold+0x10a/0x154 [ 1057.928936] should_failslab+0xd6/0x130 [ 1057.928946] __kmalloc+0x2c1/0x400 [ 1057.928957] ? kobject_get_path+0xb0/0x190 [ 1057.948767] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1057.954221] kobject_get_path+0xb0/0x190 [ 1057.958284] kobject_uevent_env+0x21e/0xc50 [ 1057.962615] lo_ioctl+0x1177/0x1c00 [ 1057.966245] ? loop_clr_fd+0xac0/0xac0 [ 1057.970133] blkdev_ioctl+0x91d/0x17c0 [ 1057.974020] ? blkpg_ioctl+0x8d0/0x8d0 [ 1057.977993] ? trace_hardirqs_on+0x10/0x10 [ 1057.982938] block_ioctl+0xd9/0x120 [ 1057.986572] ? blkdev_fallocate+0x3a0/0x3a0 [ 1057.990932] do_vfs_ioctl+0x75a/0xfe0 [ 1057.994735] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1058.000360] ? ioctl_preallocate+0x1a0/0x1a0 [ 1058.004779] ? security_file_ioctl+0x76/0xb0 [ 1058.009189] ? security_file_ioctl+0x83/0xb0 [ 1058.013600] SyS_ioctl+0x7f/0xb0 [ 1058.016967] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1058.020943] do_syscall_64+0x1d5/0x640 [ 1058.024839] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1058.030023] RIP: 0033:0x45c937 [ 1058.033201] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1058.040890] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1058.048139] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1058.055400] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1058.062741] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 13:43:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00', {}, {}, 0xcc, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:43:59 executing program 2 (fault-call:4 fault-nth:32): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:43:59 executing program 3 (fault-call:4 fault-nth:19): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1058.069994] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1058.091010] gfs2: not a GFS2 filesystem 13:43:59 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB="000076f0c70bbeef480000006d2c256aedcae97a39619e91298093106eb17866743f196b66518895728356c3a98337352ac2f3709cc5ccb56dd0d31c06a69e736c14884127758ddfb1d1e1861ee8bf9791baa9bfaf0e705c18a34908ed000000000000000000"]) 13:43:59 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0x4) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1058.139126] Cannot find del_set index 0 as target 13:43:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00', {}, {}, 0x0, 0x1, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1058.187787] FAULT_INJECTION: forcing a failure. [ 1058.187787] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.217033] FAULT_INJECTION: forcing a failure. [ 1058.217033] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.223316] CPU: 0 PID: 23609 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 13:43:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00', {}, {}, 0x0, 0x0, 0x12}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1058.236123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.245475] Call Trace: [ 1058.248066] dump_stack+0x1b2/0x283 [ 1058.251703] should_fail.cold+0x10a/0x154 [ 1058.255871] should_failslab+0xd6/0x130 [ 1058.259827] Cannot find del_set index 0 as target [ 1058.264675] __kmalloc+0x2c1/0x400 [ 1058.268208] ? kobject_get_path+0xb0/0x190 [ 1058.272433] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1058.277874] kobject_get_path+0xb0/0x190 [ 1058.282805] kobject_uevent_env+0x21e/0xc50 [ 1058.287139] lo_ioctl+0x1177/0x1c00 [ 1058.290773] ? loop_clr_fd+0xac0/0xac0 [ 1058.294658] blkdev_ioctl+0x91d/0x17c0 [ 1058.298544] ? blkpg_ioctl+0x8d0/0x8d0 [ 1058.302424] ? trace_hardirqs_on+0x10/0x10 [ 1058.306667] block_ioctl+0xd9/0x120 [ 1058.310289] ? blkdev_fallocate+0x3a0/0x3a0 [ 1058.314606] do_vfs_ioctl+0x75a/0xfe0 [ 1058.318410] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1058.320115] Cannot find del_set index 0 as target [ 1058.324042] ? ioctl_preallocate+0x1a0/0x1a0 [ 1058.324065] ? security_file_ioctl+0x76/0xb0 13:43:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x92c, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1058.324075] ? security_file_ioctl+0x83/0xb0 [ 1058.324085] SyS_ioctl+0x7f/0xb0 [ 1058.324094] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1058.324105] do_syscall_64+0x1d5/0x640 [ 1058.324121] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1058.324128] RIP: 0033:0x45c937 [ 1058.324133] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1058.324144] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1058.324149] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 13:43:59 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000000)={0x8, 'hsr0\x00', {'ip6tnl0\x00'}, 0xc9}) [ 1058.324157] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1058.391593] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1058.398878] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1058.407615] CPU: 1 PID: 23614 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1058.415511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.424873] Call Trace: [ 1058.426608] gfs2: not a GFS2 filesystem [ 1058.427460] dump_stack+0x1b2/0x283 [ 1058.427475] should_fail.cold+0x10a/0x154 [ 1058.427489] should_failslab+0xd6/0x130 [ 1058.443170] kmem_cache_alloc_node+0x25f/0x400 [ 1058.446338] Cannot find del_set index 0 as target [ 1058.447756] __alloc_skb+0x9a/0x4c0 [ 1058.447767] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1058.447780] ? netlink_has_listeners+0x1ff/0x310 [ 1058.465883] kobject_uevent_env+0x6d1/0xc50 [ 1058.470456] lo_ioctl+0x1177/0x1c00 [ 1058.474066] ? loop_clr_fd+0xac0/0xac0 [ 1058.478377] blkdev_ioctl+0x91d/0x17c0 [ 1058.482251] ? blkpg_ioctl+0x8d0/0x8d0 [ 1058.486119] ? trace_hardirqs_on+0x10/0x10 [ 1058.490344] block_ioctl+0xd9/0x120 [ 1058.493952] ? blkdev_fallocate+0x3a0/0x3a0 [ 1058.498254] do_vfs_ioctl+0x75a/0xfe0 [ 1058.502040] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1058.507701] ? ioctl_preallocate+0x1a0/0x1a0 [ 1058.512107] ? security_file_ioctl+0x76/0xb0 [ 1058.516546] ? security_file_ioctl+0x83/0xb0 [ 1058.520953] SyS_ioctl+0x7f/0xb0 [ 1058.524311] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1058.529934] do_syscall_64+0x1d5/0x640 [ 1058.533894] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1058.539064] RIP: 0033:0x45c937 [ 1058.542233] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1058.549922] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1058.557172] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1058.564421] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1058.571691] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1058.578940] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 13:44:00 executing program 3 (fault-call:4 fault-nth:20): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1058.592784] hfsplus: gid requires an argument [ 1058.597471] hfsplus: unable to parse mount options [ 1058.607025] gfs2: not a GFS2 filesystem [ 1058.715511] FAULT_INJECTION: forcing a failure. [ 1058.715511] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.734972] CPU: 1 PID: 23643 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1058.742873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1058.753006] Call Trace: [ 1058.755599] dump_stack+0x1b2/0x283 [ 1058.759236] should_fail.cold+0x10a/0x154 [ 1058.763477] should_failslab+0xd6/0x130 [ 1058.767451] __kmalloc+0x2c1/0x400 [ 1058.771096] ? kobject_get_path+0xb0/0x190 [ 1058.775330] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1058.780779] kobject_get_path+0xb0/0x190 [ 1058.784848] kobject_uevent_env+0x21e/0xc50 [ 1058.789179] lo_ioctl+0x1177/0x1c00 [ 1058.792810] ? loop_clr_fd+0xac0/0xac0 [ 1058.796793] blkdev_ioctl+0x91d/0x17c0 [ 1058.800682] ? blkpg_ioctl+0x8d0/0x8d0 [ 1058.804570] ? trace_hardirqs_on+0x10/0x10 [ 1058.808824] block_ioctl+0xd9/0x120 [ 1058.812458] ? blkdev_fallocate+0x3a0/0x3a0 [ 1058.816780] do_vfs_ioctl+0x75a/0xfe0 [ 1058.821034] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1058.826672] ? ioctl_preallocate+0x1a0/0x1a0 [ 1058.831092] ? security_file_ioctl+0x76/0xb0 [ 1058.835505] ? security_file_ioctl+0x83/0xb0 [ 1058.839916] SyS_ioctl+0x7f/0xb0 [ 1058.843282] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1058.847259] do_syscall_64+0x1d5/0x640 [ 1058.851238] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1058.856437] RIP: 0033:0x45c937 [ 1058.859624] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1058.867332] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1058.874602] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1058.881880] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1058.889147] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1058.896425] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1058.920039] gfs2: not a GFS2 filesystem 13:44:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7", 0x81}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:02 executing program 2 (fault-call:4 fault-nth:33): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:02 executing program 4: r0 = timerfd_create(0x0, 0x800) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_DV_TIMINGS(r4, 0xc0845658, &(0x7f0000000000)={0x0, @reserved}) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 13:44:02 executing program 3 (fault-call:4 fault-nth:21): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:02 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\a\x00', @ANYRES16=r4, @ANYBLOB="200025bd7000fcdbdf250700000014000300fe80000000000000000000000000003014000000fc010000000000000000000000000001"], 0x3c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x70, r4, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_SECCTX={0x23, 0x7, 'system_u:object_r:su_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netdevsim0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}]}, 0x70}, 0x1, 0x0, 0x0, 0x4800}, 0x20000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r7, 0xc00c55ca, &(0x7f0000000280)={0x5, 0x4, 0xffffff7f}) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:44:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 1060.893197] FAULT_INJECTION: forcing a failure. [ 1060.893197] name failslab, interval 1, probability 0, space 0, times 0 [ 1060.911974] CPU: 0 PID: 23660 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1060.919876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1060.929400] Call Trace: [ 1060.931993] dump_stack+0x1b2/0x283 [ 1060.935630] should_fail.cold+0x10a/0x154 13:44:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x0, 0x10, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1060.939794] should_failslab+0xd6/0x130 [ 1060.943771] kmem_cache_alloc_node+0x25f/0x400 [ 1060.948358] __alloc_skb+0x9a/0x4c0 [ 1060.951991] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1060.956835] ? netlink_has_listeners+0x1ff/0x310 [ 1060.961594] kobject_uevent_env+0x6d1/0xc50 [ 1060.966012] lo_ioctl+0x1177/0x1c00 [ 1060.969640] ? loop_clr_fd+0xac0/0xac0 [ 1060.972661] Cannot find del_set index 0 as target [ 1060.973542] blkdev_ioctl+0x91d/0x17c0 [ 1060.973552] ? blkpg_ioctl+0x8d0/0x8d0 [ 1060.973562] ? trace_hardirqs_on+0x10/0x10 13:44:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x0, 0x0, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1060.973584] block_ioctl+0xd9/0x120 [ 1060.973595] ? blkdev_fallocate+0x3a0/0x3a0 [ 1060.998931] do_vfs_ioctl+0x75a/0xfe0 [ 1061.002738] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1061.008365] ? ioctl_preallocate+0x1a0/0x1a0 [ 1061.012786] ? security_file_ioctl+0x76/0xb0 [ 1061.017192] ? security_file_ioctl+0x83/0xb0 [ 1061.017608] Cannot find del_set index 0 as target [ 1061.021593] SyS_ioctl+0x7f/0xb0 [ 1061.021606] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1061.021619] do_syscall_64+0x1d5/0x640 [ 1061.021638] entry_SYSCALL_64_after_hwframe+0x46/0xbb 13:44:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6, 0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1061.042812] RIP: 0033:0x45c937 [ 1061.045995] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1061.053704] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1061.055952] Cannot find del_set index 0 as target [ 1061.060972] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1061.060978] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1061.060984] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1061.060990] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1061.068071] gfs2: not a GFS2 filesystem [ 1061.083972] hfsplus: gid requires an argument [ 1061.088964] FAULT_INJECTION: forcing a failure. [ 1061.088964] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.115864] CPU: 0 PID: 23680 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1061.120032] hfsplus: unable to parse mount options [ 1061.123739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.123743] Call Trace: [ 1061.123762] dump_stack+0x1b2/0x283 13:44:02 executing program 4: r0 = timerfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@isdn={0x22, 0x40, 0x3f, 0x8, 0x5}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000080)={'broute\x00', 0x0, 0x3, 0xf6, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000180)=""/246}, &(0x7f0000000100)=0x78) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 1061.123778] should_fail.cold+0x10a/0x154 [ 1061.123793] should_failslab+0xd6/0x130 [ 1061.123804] kmem_cache_alloc_node+0x25f/0x400 [ 1061.123817] __alloc_skb+0x9a/0x4c0 [ 1061.123828] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1061.123841] ? netlink_has_listeners+0x1ff/0x310 [ 1061.123851] kobject_uevent_env+0x6d1/0xc50 [ 1061.123870] lo_ioctl+0x1177/0x1c00 [ 1061.123883] ? loop_clr_fd+0xac0/0xac0 [ 1061.123894] blkdev_ioctl+0x91d/0x17c0 [ 1061.123904] ? blkpg_ioctl+0x8d0/0x8d0 [ 1061.123914] ? trace_hardirqs_on+0x10/0x10 [ 1061.123935] block_ioctl+0xd9/0x120 [ 1061.123943] ? blkdev_fallocate+0x3a0/0x3a0 [ 1061.123955] do_vfs_ioctl+0x75a/0xfe0 [ 1061.123970] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1061.211585] ? ioctl_preallocate+0x1a0/0x1a0 [ 1061.216031] ? security_file_ioctl+0x76/0xb0 [ 1061.220422] ? security_file_ioctl+0x83/0xb0 [ 1061.224818] SyS_ioctl+0x7f/0xb0 [ 1061.228168] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1061.232126] do_syscall_64+0x1d5/0x640 [ 1061.236001] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1061.241171] RIP: 0033:0x45c937 [ 1061.244382] RSP: 002b:00007fb81a693a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1061.252083] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1061.259342] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1061.266596] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 000000000000000a [ 1061.273847] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1061.281100] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6946d4 [ 1061.292550] gfs2: not a GFS2 filesystem 13:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 13:44:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7", 0x81}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:05 executing program 3 (fault-call:4 fault-nth:22): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:05 executing program 2 (fault-call:4 fault-nth:34): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:05 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e5daa74", @ANYRESHEX=r0, @ANYBLOB=',\x00']) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}]}, 0x78}}, 0x0) r5 = socket(0x1f, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) bind(r1, &(0x7f0000000080)=@ll={0x11, 0xf8, r6, 0x1, 0x7, 0x6, @multicast}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000024000b0f00"/20, @ANYRES32=r8, @ANYBLOB="00000000ff0300ff000000009bfd0100736671004c1f02000000000000000000000000000000000000000000000000000100000000000000020000000700"/96], 0x78}}, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000040)={r8, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) 13:44:05 executing program 4: r0 = timerfd_create(0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20c082, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={r6, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r6, 0x3, 0x1ff, 0x6, 0x77e8000, 0xff}, &(0x7f00000002c0)=0x14) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000200)={0x990000, 0x40, 0x998a, r7, 0x0, &(0x7f00000001c0)={0x9a0912, 0xc93, [], @p_u16=&(0x7f0000000180)=0x2}}) ioctl$IOC_PR_PREEMPT(r8, 0x401870cb, &(0x7f0000000240)={0x4d3, 0x2c0f}) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r10, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x1410, 0x2, 0x70bd2b, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x20000011) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 1063.950139] FAULT_INJECTION: forcing a failure. [ 1063.950139] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.965854] CPU: 0 PID: 23716 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1063.973774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.983139] Call Trace: [ 1063.985725] dump_stack+0x1b2/0x283 [ 1063.989351] should_fail.cold+0x10a/0x154 [ 1063.993500] should_failslab+0xd6/0x130 13:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1063.997480] kmem_cache_alloc_node+0x25f/0x400 [ 1064.002075] __alloc_skb+0x9a/0x4c0 [ 1064.005704] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1064.010551] ? netlink_has_listeners+0x1ff/0x310 [ 1064.015311] kobject_uevent_env+0x6d1/0xc50 [ 1064.019645] lo_ioctl+0x1177/0x1c00 [ 1064.023266] ? loop_clr_fd+0xac0/0xac0 [ 1064.027140] blkdev_ioctl+0x91d/0x17c0 [ 1064.031120] ? blkpg_ioctl+0x8d0/0x8d0 [ 1064.034993] ? trace_hardirqs_on+0x10/0x10 [ 1064.039225] block_ioctl+0xd9/0x120 [ 1064.042850] ? blkdev_fallocate+0x3a0/0x3a0 [ 1064.047151] do_vfs_ioctl+0x75a/0xfe0 [ 1064.050950] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1064.057074] ? ioctl_preallocate+0x1a0/0x1a0 [ 1064.061475] ? security_file_ioctl+0x76/0xb0 [ 1064.065882] ? security_file_ioctl+0x83/0xb0 [ 1064.066914] Cannot find del_set index 0 as target [ 1064.070288] SyS_ioctl+0x7f/0xb0 [ 1064.070300] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1064.070314] do_syscall_64+0x1d5/0x640 [ 1064.086325] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1064.091514] RIP: 0033:0x45c937 [ 1064.094789] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1064.102483] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1064.109754] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1064.117022] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1064.124270] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1064.131564] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x6]}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1064.153522] FAULT_INJECTION: forcing a failure. [ 1064.153522] name failslab, interval 1, probability 0, space 0, times 0 [ 1064.155312] hfsplus: unable to parse mount options [ 1064.165949] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1064.180345] gfs2: not a GFS2 filesystem 13:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private=0xa010100, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1064.205478] CPU: 0 PID: 23720 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1064.213395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.222754] Call Trace: [ 1064.226851] dump_stack+0x1b2/0x283 [ 1064.226910] Cannot find del_set index 0 as target [ 1064.230492] should_fail.cold+0x10a/0x154 [ 1064.230509] should_failslab+0xd6/0x130 [ 1064.230520] kmem_cache_alloc_node+0x25f/0x400 [ 1064.230533] __alloc_skb+0x9a/0x4c0 13:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port=0x4e23, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1064.251651] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1064.256503] ? netlink_has_listeners+0x1ff/0x310 [ 1064.261267] kobject_uevent_env+0x6d1/0xc50 [ 1064.265601] lo_ioctl+0x1177/0x1c00 [ 1064.265984] Cannot find del_set index 0 as target [ 1064.269227] ? loop_clr_fd+0xac0/0xac0 [ 1064.269241] blkdev_ioctl+0x91d/0x17c0 [ 1064.269251] ? blkpg_ioctl+0x8d0/0x8d0 [ 1064.269261] ? trace_hardirqs_on+0x10/0x10 [ 1064.269280] block_ioctl+0xd9/0x120 [ 1064.293572] ? blkdev_fallocate+0x3a0/0x3a0 [ 1064.297899] do_vfs_ioctl+0x75a/0xfe0 13:44:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1064.301704] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1064.305163] Cannot find del_set index 0 as target [ 1064.307328] ? ioctl_preallocate+0x1a0/0x1a0 [ 1064.307351] ? security_file_ioctl+0x76/0xb0 [ 1064.307360] ? security_file_ioctl+0x83/0xb0 [ 1064.307377] SyS_ioctl+0x7f/0xb0 [ 1064.329261] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1064.333235] do_syscall_64+0x1d5/0x640 [ 1064.337128] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1064.341453] Cannot find del_set index 0 as target [ 1064.342312] RIP: 0033:0x45c937 13:44:05 executing program 2 (fault-call:4 fault-nth:35): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1064.342319] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1064.342330] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1064.342335] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1064.342341] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1064.342346] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1064.342351] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1064.421128] gfs2: not a GFS2 filesystem [ 1064.463728] FAULT_INJECTION: forcing a failure. [ 1064.463728] name failslab, interval 1, probability 0, space 0, times 0 [ 1064.480690] CPU: 1 PID: 23758 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1064.488589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.498027] Call Trace: [ 1064.500619] dump_stack+0x1b2/0x283 [ 1064.504255] should_fail.cold+0x10a/0x154 [ 1064.508407] should_failslab+0xd6/0x130 [ 1064.512390] kmem_cache_alloc+0x28e/0x3c0 [ 1064.516544] getname_flags+0xc8/0x550 [ 1064.520349] SyS_mkdirat+0x83/0x220 [ 1064.523979] ? SyS_mknod+0x30/0x30 [ 1064.527516] ? fput+0xb/0x140 [ 1064.530619] ? do_syscall_64+0x4c/0x640 [ 1064.534592] ? SyS_mkdirat+0x220/0x220 [ 1064.538482] do_syscall_64+0x1d5/0x640 [ 1064.542378] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1064.547566] RIP: 0033:0x45bee7 [ 1064.550753] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1064.558548] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1064.565819] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1064.573089] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1064.580358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1064.587655] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1064.634120] hfsplus: unable to parse mount options 13:44:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7", 0x81}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:08 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) timerfd_settime(r4, 0x1, &(0x7f0000000140), &(0x7f0000af9ff0)) 13:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0xff, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:08 executing program 3 (fault-call:4 fault-nth:23): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:08 executing program 2 (fault-call:4 fault-nth:36): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x48, 0x6, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0xc005}, 0x4020) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000000000)) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000c80)={{0x14}, [@NFT_MSG_NEWSET={0x1c, 0x9, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x4}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWCHAIN={0x128, 0x3, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7f}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x100000001}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x50, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_HOOK_DEV={0x14, 0x3, 'batadv_slave_1\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth0_to_batadv\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'netdevsim0\x00'}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_HOOK={0x44, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1605d0ba}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_HOOK_DEV={0x14, 0x3, 'erspan0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_DEV={0x14, 0x3, 'wg1\x00'}]}]}, @NFT_MSG_NEWFLOWTABLE={0x20, 0x16, 0xa, 0x401, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xffff99fc}]}]}, @NFT_MSG_NEWFLOWTABLE={0x34, 0x16, 0xa, 0x200, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x3}, @NFT_OBJECT_CONNLIMIT=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWFLOWTABLE={0x60, 0x16, 0xa, 0x101, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x38, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'team_slave_0\x00'}, {0x14, 0x1, 'veth0_to_bond\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWRULE={0x80, 0x6, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x6}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_COMPAT={0x34, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x5c}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x1d4, 0x16, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFTA_FLOWTABLE_HOOK={0x14c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg1\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xcc, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip6gre0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_bridge\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}, {0x14, 0x1, 'macvlan1\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'veth1_to_hsr\x00'}, {0x14, 0x1, 'batadv0\x00'}, {0x14, 0x1, 'vcan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'netdevsim0\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3f0000}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'nr0\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x78, 0x6, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x9}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}, @NFTA_RULE_USERDATA={0x55, 0x7, 0x1, 0x0, "6088b746c5cf093b3f4fcaa4ffa7c2d5a1105ba390486d9ecc70f27a721dc2a8232ef1858f5b586c29d998fe6d8bd6ec061f26d977c6f7b6689b65af1c007207733ddc3b0af71b1687b92722a9714ea76e"}]}, @NFT_MSG_DELOBJ={0x2c, 0x14, 0xa, 0x3, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}]}], {0x14}}, 0x538}, 0x1, 0x0, 0x0, 0x1}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2000020, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',\x00']) 13:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0xffffff00, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1066.990225] Cannot find del_set index 0 as target [ 1067.001938] FAULT_INJECTION: forcing a failure. [ 1067.001938] name failslab, interval 1, probability 0, space 0, times 0 13:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00', {}, {0xff}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1067.032100] CPU: 0 PID: 23782 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1067.040016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.048523] Cannot find del_set index 0 as target [ 1067.049368] Call Trace: [ 1067.056830] dump_stack+0x1b2/0x283 [ 1067.060462] should_fail.cold+0x10a/0x154 [ 1067.064613] should_failslab+0xd6/0x130 [ 1067.068587] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1067.073693] __kmalloc_node_track_caller+0x38/0x70 13:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00', {}, {}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1067.078717] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1067.080407] Cannot find del_set index 0 as target [ 1067.083387] __alloc_skb+0xca/0x4c0 [ 1067.083400] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1067.083412] ? netlink_has_listeners+0x1ff/0x310 [ 1067.083424] kobject_uevent_env+0x6d1/0xc50 [ 1067.083442] lo_ioctl+0x1177/0x1c00 [ 1067.109804] ? loop_clr_fd+0xac0/0xac0 [ 1067.113691] blkdev_ioctl+0x91d/0x17c0 [ 1067.117576] ? blkpg_ioctl+0x8d0/0x8d0 [ 1067.121442] ? trace_hardirqs_on+0x10/0x10 [ 1067.125675] block_ioctl+0xd9/0x120 [ 1067.129285] ? blkdev_fallocate+0x3a0/0x3a0 [ 1067.133589] do_vfs_ioctl+0x75a/0xfe0 [ 1067.137437] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1067.143046] ? ioctl_preallocate+0x1a0/0x1a0 [ 1067.147442] ? security_file_ioctl+0x76/0xb0 [ 1067.151847] ? security_file_ioctl+0x83/0xb0 [ 1067.156253] SyS_ioctl+0x7f/0xb0 [ 1067.159622] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1067.163588] do_syscall_64+0x1d5/0x640 [ 1067.167474] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1067.172836] RIP: 0033:0x45c937 [ 1067.176658] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1067.184361] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1067.191699] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1067.198949] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1067.206374] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1067.213623] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1067.227356] FAULT_INJECTION: forcing a failure. 13:44:08 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000000), 0x4) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f0000000080)={0x9a0000, 0x9, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x990af8, 0x9, [], @value64=0x1}}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r6, 0x6, 0x21, &(0x7f00000000c0)="6899a0b1a113b556fbec638c00182dca", 0x10) [ 1067.227356] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.245493] gfs2: not a GFS2 filesystem [ 1067.254980] CPU: 0 PID: 23779 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1067.262877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.272313] Call Trace: [ 1067.274907] dump_stack+0x1b2/0x283 [ 1067.278978] should_fail.cold+0x10a/0x154 [ 1067.283130] should_failslab+0xd6/0x130 [ 1067.287107] kmem_cache_alloc+0x28e/0x3c0 [ 1067.291259] __d_alloc+0x2a/0x9b0 [ 1067.294719] d_alloc+0x46/0x240 [ 1067.297999] __lookup_hash+0x51/0x180 [ 1067.301799] filename_create+0x156/0x3f0 [ 1067.305859] ? kern_path_mountpoint+0x40/0x40 [ 1067.310360] SyS_mkdirat+0x95/0x220 [ 1067.313990] ? SyS_mknod+0x30/0x30 [ 1067.317532] ? do_syscall_64+0x4c/0x640 [ 1067.318742] Cannot find del_set index 0 as target [ 1067.321506] ? SyS_mkdirat+0x220/0x220 [ 1067.321521] do_syscall_64+0x1d5/0x640 [ 1067.321540] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1067.321547] RIP: 0033:0x45bee7 [ 1067.321552] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1067.350171] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1067.357436] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1067.364711] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1067.372063] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 13:44:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00', {}, {}, 0x62, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:08 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x24, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x4, 0x1, 'syz0\x00'}]}]}, 0x24}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x250, r4, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x101}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5aa2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x56b0a70f}]}]}, @TIPC_NLA_SOCK={0x5c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x54}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff2e8e}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_BEARER={0x130, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7d4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2904}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'ib', 0x3a, 'batadv_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @private0}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @remote, 0x4}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdd5f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5d}]}]}]}, 0x250}}, 0x4000) r5 = timerfd_create(0x0, 0x0) r6 = socket$inet6(0xa, 0x5, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) timerfd_settime(r5, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) write$P9_RREAD(r7, &(0x7f0000000000)={0x36, 0x75, 0x1, {0x2b, "6aa19fa50ecf8db755731d7e1f9df90e1b1205f12b17eb6afec4403aeecf33e85e48f11bd413e7bf500fa6"}}, 0x36) [ 1067.379328] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1067.447419] Cannot find del_set index 0 as target 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00', {}, {}, 0x0, 0x3, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62e", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:11 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0xffffffffffffff58, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x10, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa327}}}}]}, 0x78}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0x2c}}]}, 0x50}}, 0x4000) 13:44:11 executing program 2 (fault-call:4 fault-nth:37): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:11 executing program 3 (fault-call:4 fault-nth:24): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:11 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xfffffffffffffddd, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r4, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_INDEX={0xfffffffffffffedb, 0x1, 0x0}]}, 0x34}, 0x1, 0x0, 0x0, 0x14008094}, 0x4000881) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r4, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7f}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040010}, 0x20000800) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00', {}, {}, 0x0, 0x0, 0x1}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1070.025137] Cannot find del_set index 0 as target [ 1070.036554] FAULT_INJECTION: forcing a failure. [ 1070.036554] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.049432] CPU: 0 PID: 23836 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1070.057345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.066705] Call Trace: [ 1070.069301] dump_stack+0x1b2/0x283 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x28, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1070.072934] should_fail.cold+0x10a/0x154 [ 1070.075749] Cannot find del_set index 0 as target [ 1070.077081] should_failslab+0xd6/0x130 [ 1070.077095] kmem_cache_alloc_node+0x25f/0x400 [ 1070.077108] __alloc_skb+0x9a/0x4c0 [ 1070.077119] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1070.099468] ? netlink_has_listeners+0x1ff/0x310 [ 1070.104230] kobject_uevent_env+0x6d1/0xc50 [ 1070.108560] lo_ioctl+0x1177/0x1c00 [ 1070.110316] Cannot find del_set index 0 as target [ 1070.112194] ? loop_clr_fd+0xac0/0xac0 [ 1070.112207] blkdev_ioctl+0x91d/0x17c0 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1070.112215] ? blkpg_ioctl+0x8d0/0x8d0 [ 1070.112237] block_ioctl+0xd9/0x120 [ 1070.112245] ? blkdev_fallocate+0x3a0/0x3a0 [ 1070.112260] do_vfs_ioctl+0x75a/0xfe0 [ 1070.143380] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1070.149008] ? ioctl_preallocate+0x1a0/0x1a0 [ 1070.153427] ? security_file_ioctl+0x76/0xb0 [ 1070.157835] ? security_file_ioctl+0x83/0xb0 [ 1070.162245] SyS_ioctl+0x7f/0xb0 [ 1070.165610] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1070.169588] do_syscall_64+0x1d5/0x640 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}, {0x0, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1070.173481] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1070.178665] RIP: 0033:0x45c937 [ 1070.181849] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1070.189553] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1070.196826] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1070.204091] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1070.211356] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1070.218621] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1070.222145] Cannot find del_set index 0 as target [ 1070.236224] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1070.244297] hfsplus: unable to parse mount options [ 1070.250320] FAULT_INJECTION: forcing a failure. [ 1070.250320] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.273587] gfs2: not a GFS2 filesystem [ 1070.281122] CPU: 0 PID: 23841 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1070.289014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.298367] Call Trace: [ 1070.300335] Cannot find del_set index 0 as target [ 1070.300955] dump_stack+0x1b2/0x283 [ 1070.309420] should_fail.cold+0x10a/0x154 [ 1070.313577] should_failslab+0xd6/0x130 [ 1070.317560] kmem_cache_alloc+0x28e/0x3c0 [ 1070.321715] __d_alloc+0x2a/0x9b0 [ 1070.325168] d_alloc+0x46/0x240 [ 1070.328447] __lookup_hash+0x51/0x180 [ 1070.332251] filename_create+0x156/0x3f0 [ 1070.336312] ? kern_path_mountpoint+0x40/0x40 [ 1070.340813] SyS_mkdirat+0x95/0x220 [ 1070.344439] ? SyS_mknod+0x30/0x30 [ 1070.347983] ? do_syscall_64+0x4c/0x640 [ 1070.351957] ? SyS_mkdirat+0x220/0x220 [ 1070.355862] do_syscall_64+0x1d5/0x640 [ 1070.359754] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1070.364937] RIP: 0033:0x45bee7 [ 1070.368121] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1070.375912] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1070.383177] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1070.390441] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1070.397709] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1070.404975] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1070.452781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23874 comm=syz-executor.0 [ 1070.555501] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23858 comm=syz-executor.0 [ 1070.586712] hfsplus: unable to parse mount options 13:44:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62e", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local, @port=0x4e20, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:14 executing program 3 (fault-call:4 fault-nth:25): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:14 executing program 2 (fault-call:4 fault-nth:38): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:14 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDENABIO(r3, 0x4b36) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:44:14 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x1c, r5, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8}]}, 0x1c}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9bcde16047a1a255}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa0, r5, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr=' \x01\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast2}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0xa0}, 0x1, 0x0, 0x0, 0x14}, 0x40000000) [ 1073.054222] Cannot find del_set index 0 as target [ 1073.071777] hfsplus: gid requires an argument [ 1073.076293] hfsplus: unable to parse mount options [ 1073.080079] FAULT_INJECTION: forcing a failure. [ 1073.080079] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.087387] FAULT_INJECTION: forcing a failure. [ 1073.087387] name failslab, interval 1, probability 0, space 0, times 0 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local, @port, @port=0x4e21}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1073.103218] CPU: 0 PID: 23906 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1073.111950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.121302] Call Trace: [ 1073.123894] dump_stack+0x1b2/0x283 [ 1073.127525] should_fail.cold+0x10a/0x154 [ 1073.131722] should_failslab+0xd6/0x130 [ 1073.132227] Cannot find del_set index 0 as target [ 1073.135693] kmem_cache_alloc+0x28e/0x3c0 [ 1073.135706] __d_alloc+0x2a/0x9b0 [ 1073.135718] d_alloc+0x46/0x240 [ 1073.151818] __lookup_hash+0x51/0x180 [ 1073.155626] filename_create+0x156/0x3f0 [ 1073.159694] ? kern_path_mountpoint+0x40/0x40 [ 1073.164196] SyS_mkdirat+0x95/0x220 [ 1073.167822] ? SyS_mknod+0x30/0x30 [ 1073.171394] ? do_syscall_64+0x4c/0x640 [ 1073.175359] ? SyS_mkdirat+0x220/0x220 [ 1073.176238] ptrace attach of "/root/syz-executor.5"[23919] was attempted by "/root/syz-executor.5"[23920] [ 1073.179259] do_syscall_64+0x1d5/0x640 [ 1073.179278] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1073.179289] RIP: 0033:0x45bee7 [ 1073.201186] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1073.208887] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1073.216139] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1073.223389] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1073.230640] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1073.237898] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1073.245221] CPU: 1 PID: 23902 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1073.253115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.262472] Call Trace: [ 1073.265063] dump_stack+0x1b2/0x283 [ 1073.268694] should_fail.cold+0x10a/0x154 [ 1073.272969] should_failslab+0xd6/0x130 [ 1073.276951] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1073.282057] __kmalloc_node_track_caller+0x38/0x70 [ 1073.286990] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1073.291660] __alloc_skb+0xca/0x4c0 [ 1073.295289] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1073.300129] ? netlink_has_listeners+0x1ff/0x310 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x7}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62e", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1073.300712] Cannot find del_set index 0 as target [ 1073.305314] kobject_uevent_env+0x6d1/0xc50 [ 1073.305337] lo_ioctl+0x1177/0x1c00 [ 1073.305351] ? loop_clr_fd+0xac0/0xac0 [ 1073.305362] blkdev_ioctl+0x91d/0x17c0 [ 1073.305370] ? blkpg_ioctl+0x8d0/0x8d0 [ 1073.305379] ? trace_hardirqs_on+0x10/0x10 [ 1073.305400] block_ioctl+0xd9/0x120 [ 1073.305408] ? blkdev_fallocate+0x3a0/0x3a0 [ 1073.305419] do_vfs_ioctl+0x75a/0xfe0 [ 1073.305433] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1073.351384] ? ioctl_preallocate+0x1a0/0x1a0 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1073.355807] ? security_file_ioctl+0x76/0xb0 [ 1073.361178] ? security_file_ioctl+0x83/0xb0 [ 1073.365590] SyS_ioctl+0x7f/0xb0 [ 1073.368964] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1073.372942] do_syscall_64+0x1d5/0x640 [ 1073.376835] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1073.382016] RIP: 0033:0x45c937 [ 1073.385212] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.392926] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1073.400192] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1073.407458] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1073.414723] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1073.421990] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1073.422184] Cannot find del_set index 0 as target 13:44:15 executing program 3 (fault-call:4 fault-nth:26): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:15 executing program 2 (fault-call:4 fault-nth:39): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1073.457094] gfs2: not a GFS2 filesystem [ 1073.476331] hfsplus: gid requires an argument [ 1073.493771] hfsplus: unable to parse mount options [ 1073.498733] Cannot find add_set index 0 as target [ 1073.563508] FAULT_INJECTION: forcing a failure. [ 1073.563508] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.575056] CPU: 0 PID: 23953 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1073.582941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.592288] Call Trace: [ 1073.594866] dump_stack+0x1b2/0x283 [ 1073.598478] should_fail.cold+0x10a/0x154 [ 1073.602611] should_failslab+0xd6/0x130 [ 1073.607783] kmem_cache_alloc_node+0x25f/0x400 [ 1073.612348] __alloc_skb+0x9a/0x4c0 [ 1073.615957] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1073.620782] ? netlink_has_listeners+0x1ff/0x310 [ 1073.625520] kobject_uevent_env+0x6d1/0xc50 [ 1073.629852] lo_ioctl+0x1177/0x1c00 [ 1073.633465] ? loop_clr_fd+0xac0/0xac0 [ 1073.637335] blkdev_ioctl+0x91d/0x17c0 [ 1073.641202] ? blkpg_ioctl+0x8d0/0x8d0 [ 1073.645164] ? trace_hardirqs_on+0x10/0x10 [ 1073.649583] block_ioctl+0xd9/0x120 [ 1073.653197] ? blkdev_fallocate+0x3a0/0x3a0 [ 1073.657498] do_vfs_ioctl+0x75a/0xfe0 [ 1073.661279] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1073.666882] ? ioctl_preallocate+0x1a0/0x1a0 [ 1073.671339] ? security_file_ioctl+0x76/0xb0 [ 1073.675782] ? security_file_ioctl+0x83/0xb0 [ 1073.680172] SyS_ioctl+0x7f/0xb0 [ 1073.683519] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1073.687661] do_syscall_64+0x1d5/0x640 [ 1073.691584] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1073.696830] RIP: 0033:0x45c937 [ 1073.699999] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.707714] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1073.714970] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1073.722994] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1073.730245] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1073.737499] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1073.748814] FAULT_INJECTION: forcing a failure. [ 1073.748814] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.751127] gfs2: not a GFS2 filesystem 13:44:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:15 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) ioctl$KDSKBLED(r1, 0x4b65, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCGETX(r4, 0x5432, &(0x7f0000000000)) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xff1, 0x129140) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000180)) getgroups(0x2, &(0x7f00000000c0)=[0xee00, r1]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x420, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r3}}]}) [ 1073.796476] CPU: 1 PID: 23949 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1073.804383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.813823] Call Trace: [ 1073.816416] dump_stack+0x1b2/0x283 [ 1073.820050] should_fail.cold+0x10a/0x154 [ 1073.824201] should_failslab+0xd6/0x130 [ 1073.828261] kmem_cache_alloc+0x28e/0x3c0 [ 1073.832415] selinux_inode_alloc_security+0xb1/0x2a0 [ 1073.837521] security_inode_alloc+0x8f/0xd0 [ 1073.841845] inode_init_always+0x576/0xb10 [ 1073.846080] alloc_inode+0x7a/0x170 [ 1073.849710] new_inode_pseudo+0x14/0xe0 [ 1073.853684] new_inode+0x1b/0x40 [ 1073.857139] __ext4_new_inode+0x356/0x4e80 [ 1073.861386] ? ext4_free_inode+0x14a0/0x14a0 [ 1073.865789] ? avc_has_perm+0x1a4/0x320 [ 1073.869764] ? __dquot_initialize+0x3f4/0x980 [ 1073.874258] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 1073.879332] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1073.884533] ? security_transition_sid+0xcb/0x120 [ 1073.889375] ? security_transition_sid+0x9d/0x120 [ 1073.894248] ext4_mkdir+0x2e4/0xb60 [ 1073.897882] ? selinux_dentry_init_security+0x220/0x220 [ 1073.903261] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1073.907934] ? security_inode_mkdir+0xcc/0x100 [ 1073.912516] vfs_mkdir+0x3af/0x620 [ 1073.916058] SyS_mkdirat+0x1b5/0x220 [ 1073.919771] ? SyS_mknod+0x30/0x30 [ 1073.923312] ? do_syscall_64+0x4c/0x640 [ 1073.927282] ? SyS_mkdirat+0x220/0x220 [ 1073.931171] do_syscall_64+0x1d5/0x640 [ 1073.935069] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1073.940261] RIP: 0033:0x45bee7 13:44:15 executing program 3 (fault-call:4 fault-nth:27): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1073.943472] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1073.951176] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1073.958447] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1073.965713] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1073.972983] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1073.980249] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1074.040140] Cannot find add_set index 0 as target [ 1074.091039] FAULT_INJECTION: forcing a failure. [ 1074.091039] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.103057] CPU: 1 PID: 23977 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1074.110983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.120334] Call Trace: [ 1074.122925] dump_stack+0x1b2/0x283 [ 1074.126584] should_fail.cold+0x10a/0x154 [ 1074.130733] should_failslab+0xd6/0x130 [ 1074.134707] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1074.139810] __kmalloc_node_track_caller+0x38/0x70 [ 1074.144736] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1074.149435] __alloc_skb+0xca/0x4c0 [ 1074.153062] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1074.158085] ? netlink_has_listeners+0x1ff/0x310 [ 1074.162840] kobject_uevent_env+0x6d1/0xc50 [ 1074.167167] lo_ioctl+0x1177/0x1c00 [ 1074.170806] ? loop_clr_fd+0xac0/0xac0 [ 1074.174693] blkdev_ioctl+0x91d/0x17c0 [ 1074.178574] ? blkpg_ioctl+0x8d0/0x8d0 [ 1074.182453] ? trace_hardirqs_on+0x10/0x10 [ 1074.186702] block_ioctl+0xd9/0x120 [ 1074.190331] ? blkdev_fallocate+0x3a0/0x3a0 [ 1074.194651] do_vfs_ioctl+0x75a/0xfe0 [ 1074.198451] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1074.204079] ? ioctl_preallocate+0x1a0/0x1a0 [ 1074.208492] ? security_file_ioctl+0x76/0xb0 [ 1074.212905] ? security_file_ioctl+0x83/0xb0 [ 1074.217309] SyS_ioctl+0x7f/0xb0 [ 1074.220676] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1074.224650] do_syscall_64+0x1d5/0x640 [ 1074.228559] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1074.233728] RIP: 0033:0x45c937 [ 1074.236903] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.244599] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1074.251864] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1074.259121] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1074.266380] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1074.273851] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1074.323581] gfs2: not a GFS2 filesystem 13:44:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:17 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x6, &(0x7f0000ffa000/0x3000)=nil, 0x2) 13:44:17 executing program 2 (fault-call:4 fault-nth:40): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:17 executing program 3 (fault-call:4 fault-nth:28): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:17 executing program 4: r0 = timerfd_create(0x6, 0x100000) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1076.314471] FAULT_INJECTION: forcing a failure. [ 1076.314471] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.337267] CPU: 1 PID: 23998 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1076.345957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.351691] FAULT_INJECTION: forcing a failure. [ 1076.351691] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.355307] Call Trace: [ 1076.355329] dump_stack+0x1b2/0x283 [ 1076.355350] should_fail.cold+0x10a/0x154 [ 1076.376850] should_failslab+0xd6/0x130 [ 1076.380829] kmem_cache_alloc+0x28e/0x3c0 [ 1076.384982] ? ext4_sync_fs+0x7e0/0x7e0 [ 1076.388960] ext4_alloc_inode+0x19/0x610 [ 1076.393020] ? ext4_sync_fs+0x7e0/0x7e0 [ 1076.396992] alloc_inode+0x5d/0x170 [ 1076.400621] new_inode_pseudo+0x14/0xe0 [ 1076.404592] new_inode+0x1b/0x40 [ 1076.406425] Cannot find add_set index 0 as target 13:44:17 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) close(r3) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r4, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="a9b7a7bc9972001d0e83cff3879c2e53f19277af50b1086f4733bab6b53d27bd32ceadf95e5b19a74fb101e0afda4109a0207f79bdec04c7bfb2c732a14e6631c0113ec58b4d2c933b6f93318749a2771903f95b16b288e1225c3b7f199cc39e87a7b5f5a1", @ANYRES16=r4, @ANYBLOB="00022abd7000fedbdf2501000000000000000841000000140018000000047564703a73797a3200000000"], 0x30}, 0x1, 0x0, 0x0, 0x4000040}, 0x40081) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1076.407950] __ext4_new_inode+0x356/0x4e80 [ 1076.407978] ? ext4_free_inode+0x14a0/0x14a0 [ 1076.421414] ? avc_has_perm+0x1a4/0x320 [ 1076.425384] ? __dquot_initialize+0x3f4/0x980 [ 1076.429871] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 1076.434534] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1076.439727] ? security_transition_sid+0xcb/0x120 [ 1076.444563] ? security_transition_sid+0x9d/0x120 [ 1076.449571] ext4_mkdir+0x2e4/0xb60 [ 1076.453194] ? selinux_dentry_init_security+0x220/0x220 [ 1076.458557] ? ext4_init_dot_dotdot+0x4b0/0x4b0 13:44:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4, 0x2], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1076.463229] ? security_inode_mkdir+0xcc/0x100 [ 1076.467815] vfs_mkdir+0x3af/0x620 [ 1076.471358] SyS_mkdirat+0x1b5/0x220 [ 1076.475070] ? SyS_mknod+0x30/0x30 [ 1076.478688] ? do_syscall_64+0x4c/0x640 [ 1076.482661] ? SyS_mkdirat+0x220/0x220 [ 1076.486541] do_syscall_64+0x1d5/0x640 [ 1076.490426] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1076.495606] RIP: 0033:0x45bee7 [ 1076.498811] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1076.506712] Cannot find del_set index 0 as target [ 1076.507374] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1076.507380] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1076.507385] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1076.507391] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1076.507396] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1076.538520] CPU: 1 PID: 23997 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1076.557451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.566782] Call Trace: [ 1076.569378] dump_stack+0x1b2/0x283 [ 1076.573116] should_fail.cold+0x10a/0x154 [ 1076.577339] should_failslab+0xd6/0x130 [ 1076.581293] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1076.586375] __kmalloc_node_track_caller+0x38/0x70 [ 1076.591339] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1076.596514] __alloc_skb+0xca/0x4c0 [ 1076.600119] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1076.604968] ? netlink_has_listeners+0x1ff/0x310 [ 1076.610161] kobject_uevent_env+0x6d1/0xc50 [ 1076.614467] lo_ioctl+0x1177/0x1c00 [ 1076.618074] ? loop_clr_fd+0xac0/0xac0 [ 1076.621944] blkdev_ioctl+0x91d/0x17c0 [ 1076.625806] ? blkpg_ioctl+0x8d0/0x8d0 [ 1076.629673] ? trace_hardirqs_on+0x10/0x10 [ 1076.633893] block_ioctl+0xd9/0x120 [ 1076.637497] ? blkdev_fallocate+0x3a0/0x3a0 [ 1076.641815] do_vfs_ioctl+0x75a/0xfe0 [ 1076.645613] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1076.651224] ? ioctl_preallocate+0x1a0/0x1a0 [ 1076.655625] ? security_file_ioctl+0x76/0xb0 [ 1076.660548] ? security_file_ioctl+0x83/0xb0 [ 1076.664936] SyS_ioctl+0x7f/0xb0 [ 1076.668280] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1076.672232] do_syscall_64+0x1d5/0x640 [ 1076.676100] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1076.681287] RIP: 0033:0x45c937 [ 1076.684453] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1076.692147] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1076.699392] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1076.706639] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 13:44:18 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{}, {r3, r4+10000000}}, &(0x7f0000af9ff0)) 13:44:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5, 0x4], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:18 executing program 2 (fault-call:4 fault-nth:41): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1076.713885] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1076.721138] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1076.744746] hfsplus: gid requires an argument 13:44:18 executing program 3 (fault-call:4 fault-nth:29): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:18 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x80) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1076.765371] hfsplus: unable to parse mount options [ 1076.781724] gfs2: not a GFS2 filesystem [ 1076.800101] Cannot find del_set index 0 as target [ 1076.835792] FAULT_INJECTION: forcing a failure. [ 1076.835792] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.847282] CPU: 0 PID: 24029 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1076.855346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.864699] Call Trace: [ 1076.867296] dump_stack+0x1b2/0x283 [ 1076.870933] should_fail.cold+0x10a/0x154 [ 1076.875086] should_failslab+0xd6/0x130 [ 1076.879061] __kmalloc+0x6d/0x400 [ 1076.882542] ? context_struct_to_string+0x323/0x610 [ 1076.887562] context_struct_to_string+0x323/0x610 [ 1076.892408] ? dump_masked_av_helper+0x90/0x90 [ 1076.897006] ? sidtab_search_core+0x17f/0x2a0 [ 1076.901503] security_sid_to_context_core+0x187/0x200 [ 1076.906699] selinux_inode_init_security+0x45a/0x680 [ 1076.911801] ? ext4_get_acl+0xcb/0x500 [ 1076.915688] ? selinux_inode_create+0x30/0x30 [ 1076.920183] ? ext4_get_acl+0xd0/0x500 [ 1076.924075] security_inode_init_security+0x15f/0x320 [ 1076.929269] ? ext4_init_acl+0x190/0x190 [ 1076.933333] ? security_kernel_post_read_file+0xd0/0xd0 [ 1076.938709] ? insert_inode_locked+0x39e/0x4b0 [ 1076.943298] __ext4_new_inode+0x35ed/0x4e80 [ 1076.947632] ? ext4_free_inode+0x14a0/0x14a0 [ 1076.952047] ? avc_has_perm+0x1a4/0x320 [ 1076.956021] ? __dquot_initialize+0x3f4/0x980 [ 1076.960515] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 1076.965186] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1076.970377] ? security_transition_sid+0xcb/0x120 [ 1076.975218] ? security_transition_sid+0x9d/0x120 [ 1076.980072] ext4_mkdir+0x2e4/0xb60 [ 1076.984138] ? selinux_dentry_init_security+0x220/0x220 [ 1076.989508] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1076.994211] ? security_inode_mkdir+0xcc/0x100 [ 1076.999230] vfs_mkdir+0x3af/0x620 [ 1077.002778] SyS_mkdirat+0x1b5/0x220 [ 1077.006513] ? SyS_mknod+0x30/0x30 [ 1077.010051] ? do_syscall_64+0x4c/0x640 [ 1077.014041] ? SyS_mkdirat+0x220/0x220 [ 1077.017931] do_syscall_64+0x1d5/0x640 [ 1077.021823] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1077.027007] RIP: 0033:0x45bee7 [ 1077.030193] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1077.038331] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1077.045598] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1077.052863] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1077.060129] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1077.067392] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1077.070840] FAULT_INJECTION: forcing a failure. [ 1077.070840] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.111214] CPU: 1 PID: 24050 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1077.119112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.128454] Call Trace: [ 1077.131030] dump_stack+0x1b2/0x283 [ 1077.134649] should_fail.cold+0x10a/0x154 [ 1077.138796] should_failslab+0xd6/0x130 [ 1077.142751] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1077.147907] __kmalloc_node_track_caller+0x38/0x70 [ 1077.152826] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1077.157484] __alloc_skb+0xca/0x4c0 [ 1077.161097] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1077.165927] ? netlink_has_listeners+0x1ff/0x310 [ 1077.170660] kobject_uevent_env+0x6d1/0xc50 [ 1077.174982] lo_ioctl+0x1177/0x1c00 [ 1077.178590] ? loop_clr_fd+0xac0/0xac0 [ 1077.182457] blkdev_ioctl+0x91d/0x17c0 [ 1077.186324] ? blkpg_ioctl+0x8d0/0x8d0 [ 1077.190188] ? trace_hardirqs_on+0x10/0x10 [ 1077.194409] block_ioctl+0xd9/0x120 [ 1077.198011] ? blkdev_fallocate+0x3a0/0x3a0 [ 1077.202313] do_vfs_ioctl+0x75a/0xfe0 [ 1077.206096] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1077.211710] ? ioctl_preallocate+0x1a0/0x1a0 [ 1077.216122] ? security_file_ioctl+0x76/0xb0 [ 1077.220525] ? security_file_ioctl+0x83/0xb0 [ 1077.224925] SyS_ioctl+0x7f/0xb0 [ 1077.228287] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1077.232251] do_syscall_64+0x1d5/0x640 [ 1077.236128] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1077.241301] RIP: 0033:0x45c937 [ 1077.244479] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.252169] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1077.259860] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1077.267125] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1077.274372] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1077.281627] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1077.292762] gfs2: not a GFS2 filesystem 13:44:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:20 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000001c0)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x8001) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x400, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000040)={0x6}, 0x1) 13:44:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1, 0x5], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:20 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@remote, 0x3, r4}) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:20 executing program 2 (fault-call:4 fault-nth:42): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:20 executing program 3 (fault-call:4 fault-nth:30): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1079.384068] hfsplus: gid requires an argument [ 1079.394695] FAULT_INJECTION: forcing a failure. [ 1079.394695] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.407145] hfsplus: unable to parse mount options [ 1079.407455] Cannot find del_set index 0 as target [ 1079.417845] CPU: 1 PID: 24069 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 13:44:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1079.425736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.435084] Call Trace: [ 1079.437687] dump_stack+0x1b2/0x283 [ 1079.441318] should_fail.cold+0x10a/0x154 [ 1079.445467] should_failslab+0xd6/0x130 [ 1079.449442] kmem_cache_alloc_node+0x25f/0x400 [ 1079.454024] __alloc_skb+0x9a/0x4c0 [ 1079.457635] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1079.462469] ? netlink_has_listeners+0x1ff/0x310 [ 1079.467328] kobject_uevent_env+0x6d1/0xc50 [ 1079.471686] lo_ioctl+0x1177/0x1c00 [ 1079.475325] ? loop_clr_fd+0xac0/0xac0 [ 1079.479190] blkdev_ioctl+0x91d/0x17c0 [ 1079.483052] ? blkpg_ioctl+0x8d0/0x8d0 [ 1079.486917] ? trace_hardirqs_on+0x10/0x10 [ 1079.491139] block_ioctl+0xd9/0x120 [ 1079.494759] ? blkdev_fallocate+0x3a0/0x3a0 [ 1079.499068] do_vfs_ioctl+0x75a/0xfe0 [ 1079.502846] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1079.508452] ? ioctl_preallocate+0x1a0/0x1a0 [ 1079.512846] ? security_file_ioctl+0x76/0xb0 [ 1079.517231] ? security_file_ioctl+0x83/0xb0 [ 1079.521631] SyS_ioctl+0x7f/0xb0 [ 1079.524975] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1079.528934] do_syscall_64+0x1d5/0x640 [ 1079.532825] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1079.538250] RIP: 0033:0x45c937 [ 1079.541421] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1079.549170] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1079.556513] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1079.563765] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1079.571013] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1079.578261] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1079.591341] FAULT_INJECTION: forcing a failure. [ 1079.591341] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.602653] CPU: 1 PID: 24071 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1079.610530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.619876] Call Trace: [ 1079.622465] dump_stack+0x1b2/0x283 [ 1079.626104] should_fail.cold+0x10a/0x154 [ 1079.630254] should_failslab+0xd6/0x130 [ 1079.634240] kmem_cache_alloc+0x40/0x3c0 [ 1079.638302] __es_insert_extent+0x241/0xe20 [ 1079.642634] ext4_es_insert_extent+0x1b9/0x530 [ 1079.647216] ? lock_downgrade+0x6e0/0x6e0 [ 1079.651361] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1079.657160] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1079.661084] Cannot find del_set index 0 as target [ 1079.662608] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1079.662620] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 1079.662631] ext4_ext_put_gap_in_cache+0xbb/0xf0 13:44:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x7], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1079.682979] ? ext4_zeroout_es+0x160/0x160 [ 1079.687209] ? ext4_find_extent+0x66a/0x9f0 [ 1079.691537] ext4_ext_map_blocks+0x1bbf/0x4b30 [ 1079.696125] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1079.701134] ? ext4_es_lookup_extent+0x321/0xac0 [ 1079.704679] gfs2: not a GFS2 filesystem [ 1079.705884] ? lock_acquire+0x170/0x3f0 [ 1079.705897] ? lock_acquire+0x170/0x3f0 [ 1079.705909] ? ext4_map_blocks+0x3c7/0x1600 [ 1079.722099] ext4_map_blocks+0xc8f/0x1600 [ 1079.726258] ? rcu_lockdep_current_cpu_online+0xed/0x140 13:44:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1079.731713] ? ext4_issue_zeroout+0x150/0x150 [ 1079.733504] Cannot find del_set index 0 as target [ 1079.736206] ? __ext4_new_inode+0x278/0x4e80 [ 1079.736227] ext4_getblk+0x98/0x3f0 [ 1079.736239] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1079.753370] ? __dquot_initialize+0x3f4/0x980 [ 1079.757950] ext4_bread+0x6c/0x1a0 [ 1079.761486] ? ext4_getblk+0x3f0/0x3f0 [ 1079.765367] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1079.770551] ? security_transition_sid+0xcb/0x120 [ 1079.775390] ? security_transition_sid+0x9d/0x120 [ 1079.780232] ext4_append+0x143/0x350 13:44:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [], 0x0, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1079.783948] ext4_mkdir+0x4c9/0xb60 [ 1079.787578] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1079.792249] ? security_inode_mkdir+0xcc/0x100 [ 1079.796834] vfs_mkdir+0x3af/0x620 [ 1079.799904] Cannot find del_set index 0 as target [ 1079.800369] SyS_mkdirat+0x1b5/0x220 [ 1079.808903] ? SyS_mknod+0x30/0x30 [ 1079.812447] ? do_syscall_64+0x4c/0x640 [ 1079.816418] ? SyS_mkdirat+0x220/0x220 [ 1079.820306] do_syscall_64+0x1d5/0x640 [ 1079.824196] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1079.829378] RIP: 0033:0x45bee7 13:44:21 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0xa8200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1079.832560] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1079.840264] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1079.847538] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1079.854802] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1079.862064] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1079.869327] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:21 executing program 3 (fault-call:4 fault-nth:31): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:21 executing program 0: syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0xc60000, 0x8, &(0x7f00000016c0)=[{&(0x7f0000000140)="4a1ed986826f0ae6938214b0c65e", 0xe, 0x2}, {&(0x7f0000000240)="8c69e7d4a63230e78d96b1e3a91ba1d307cc995d424be2ac4667242afd6746e541e2246cd92de2f23ea69f0c58202257a4c001aabae2369b7a92ffa12a31f5b492f368a10057f86224bd4c1b00f79e283c5e3cbbb31c3292585ba161a9cdf1fcc0b086b95a517e68ab5601b3f3599272b2bc22f4bd22f918cd6b89c1ecab87bca29c92e33329cc6e6c3d558b5e3ccda1867291322658f75c8c23548b6699b72273356971900493249c2959aec2d127851a852f09bd5a05e04cad10f880d3aab299e379c3dcbe4b30de3bb7fbcbdf85e193078b8d39c870488a872f54a7a623d490b5e9f749b91b91e224feb749f3a8a4469ee43f3ccc0de0c5", 0xf9, 0x9}, {&(0x7f0000000180)="b947bc65ac614a7537959e0127f999", 0xf, 0xfffffffffffff896}, {&(0x7f0000000340)="4acf3b792c1e079ca3a9c3619e0e6475deb43246552a35ef15e92c9ad1abec09578e4d9aca85f45a84cb0a824c2703ad64000cffbf235094dc8db1be589d36b6eb7608cee50ca371a64b582e0f2a4346acb7b81d7649a6a270e52d56a05d70a45505280ef0dc4cbdc04eb3dc4cef3320bae7852ad733c3ad615f13091f2f508f0cb9fa07af37661a8612acb0f43cfd3e7ffdb9785178f5599199503f41277ffb67b8c91cb207850de4b2b7d7cfb0d359682c162054e3a091dc517a0c", 0xbc}, {&(0x7f0000001780)="1820d5baa178d8fbb64d9cf5a561e04f118a7b24b32fd7db4508787f1cf7c1f40022ce56fac1d1d42596cd417afb51c918c1f4f8c86649e4a6df74bd29a82c09d01e97750b80342d2423fadedbe1d39d127b83688d8c467eb2ea0403e4ffd2c77a27feab967b9f79b6d1e5b3fa537568d41d3a8fdbee06e0ba49abee4c10672078f84b8d376883c0e1a5e633e8999492aaa2edd83dcfe8973adb55916870aa1ffe02b82ccb0e49121048df040fb1ad264b66949d4d687a31ea77c78133c2e4197ade69272b4e61b70b6c44ed9dab0cb0992feb95a3d63a2fde434d979f9f28cbab7411297c13ebeacea8ec7e81ae5a115b8e64c4a802a2d4b0f09c1c5d1a55d89ddcf6803374107a467b4e7d42c9c28258baa6484bd39f31f312dabf4a30c77a0734fdb18e25bfdc6e69a4a2d9caba931c853d5385047f2cda05e27b52727c2574cb5ad8728c42072fd7beaf7524740c8fb2b19f0098b9fd9d6dad810d2f8879c1e60c395285d5ff9a43cc29019b49c56f1e6d9d8fd5b76b879697165fe50201cee3d7824c419b672b3080408c4d3760bad8f3c622e3b0a5b1a815a27eb8d50ebec9a9897ce6924935483fcb6f1ca2f1742937a742b43be3e4bc35e95c9eff48f1d05bef211972fd7d117a74e533cfe4d89e2ffd03b9ff1f0fa9a2fad813b3db96a5d35d3bee2e693f0986934456574541f41ab3996241428b2c1891d487d7680238da2284f7b67e219f24bdd6459f7fafd1a0a4e19387199a76ccde89fbc4c9319021c1cf5e7f4f252f10183e47e940cb7f2a57422776ff1d96e8a0099293d646240b4b3837bb57fb8ad93be47f899c7a576cebb5c3064fe96fc3fc13baaf8d2c656c5218d8946f4a396353e2ee7e9a033d0bc06829601a0713c3e921c39049e83e74685f61aadd0155d81111b1af1bc3c3dc9fe995254147a0eda9e8b957087e524dfe465710d5c8ab86f1835155e78a42313716c36544343a4c23cb42e31d1872d4ce23e12ef1b5c96f2f3cd206d3652b6037dd28fa2c4628ffc7844c5447dd242b66668779e1c5f5dd8a946da65e7d837d102c24856944949aee03ef755648fa20e6c2e274518a6b31284281ad22cf97d5278aff28a0f6e8215780bb5e1a5e18f8ccf2434b9385de64698996ac5df91d25c498098d5e9373c7afb8671394b4dda9a76a2e1244a80a15694e63a4ef64aae8b44edb0b6c4798a637563957277970d8a060c53e4dcb37ed06c5d63c0747d3adb826b70a878125f9ad83aa6886ce00ee99e62806ce83acb59cb4db56accf2691f96dde8d84e2e4d02b848dd624e61d9b4e2b2c9d5519054f62ce5cc6e6ba30f14d97ff54ad42762c93200cca17ce967c84bcecc2008801644dbe1408533b860f64a3db4cb5874cdfcf153fd3d5b63caeac787890255cc7698c14bbad0f1fd0ea4e4a162c2b8adb985b426a7c6527270dfaf7bf6ebbb2835f0a0ba6e0e97f7fa1639afdc5580dbf548dc641ca9ef32b86f740fcfda6b1715c078b4fa036b88d16fc85f2635b3c28d93c7d3d724203cd7a61b3c773cd6719060c0610ad5589cf914209ab709e71c19be9f126cca6273ecc6dab045a2d0b6b557d7cf6b907f81914ba33e7ded8c3971676018a9f6e9769957c16a6072fb6923d38f56cea3406f95731c15c2824656c4dbe2f48b19dd0db72ca312936890ebc1fb4aa0d2a507c53095011327c86c4dd02631d7deaf34c278309262b6f9fe7a5c90f829fa6cd54da57e5ad1c06ca134bea86114e5ef191b0ef6fc64eb84d0a605ef180c55a969893dc97429ebad7c64a7152466cc32c626dcf30a55aecf5d711cc1cac985206a8595f23bd5d03a2f6fea62a4cefc3f95c544ec544c8ef7b227def915fcd1430ca5362631f3b2943cfb138e153df977d5be4f47c83ffd4285019b26eaa239bf0c581dda7863930b761020809fb7b66f54faab553257efdfb09a2e9dd6b9e499b3dfd66566dd3a550152cc3d638db101720f0e607fd7f7b64b627019f0dade7998cbd2e2e86a4049aa27e41f6a008019f11afa0c25fd4a1d02e7ad69c21d3371647b98fc0a53d957d21b5f376ee0234a4c154f469154f8048beb1e3c7395a8531c7f9dfa9c130b3f0c4e1524dbaea2575ce42733d0eb4eb8a77c8e89e6168fb2e1723aa5c4e53d29b32da8be37f56e941b433e108c4dff4d3dd15ad3faf0d537e5c54ba6730fa082e6c04a5ec2876b0209d24dd1b0f805e8ca35b4c653f5442fe7f6cb9f2a0907e77c7024c04d033a2cb6d7800dbdbaf61860b383e4d9d01efb74e45323e93b02b5e03e975f5d82689c218d37bd566f4f5e33ac10c14afdc65e675f10d5051ebd70abb5d30af1e353d3cc6c3f4a7536a7a57c272334e26d912c9a536ed6bf960dab78c90647edd80f0eb66061fe1f5f9716cb4a98a48064e5d8a6ea3f2a96ed0721291ca63c7c2ee7a5f5414273ac5ff6aa0e97732706ca7092dbed60e2851f42743dfd428e452d9c81d9b5d76f650c8606982021948b9a51f2c6e2674359936d850f7c58717e71305cc0989eddb8684dce157528f35f0aaa76595bd84f23b4065b9b0df79cabd99009fa6df5ee1939f99f0d43613278cce4404faf4098b38164b71d78ee15db49d45d4ae6fdb7f4059de88d726f3ccca2ac93a5e49104279968727d07c8a84ba612d51241e76d7987fa50270d005218e2a2c311c77f638326a96ebe1e1ec580373d5c23ac3b651194066f987aaef8f7c33650790292713e27cae4909fa53872ebd566dad99b3706bce892bd13ffe0ea17870b66c44aea51a26b0d36ebcb386c36c44ad3424f617276bcc7bb57ba8cf660b8ab75cba6b950e6b507fcdac4d6b4b7dbf291da4dd0ca7cc59de6be07436923a7354dbc98bfc9a556203e8c4f9b950ba4430db0fe9d3093a0707cbcd61a9ea1e2a4d86984a92181b01fe964bc87d38254f69ba89279a42bb88246b93a7b32542cbc79986891f1246905ed12783ce12b14413476e32173f23a1c33ac02d42c5b0cb5df759cc29d312f4106363097323b36c7d6e4052d4226e69653d7ebc39910ddf89a5df86a7d2a1ae120615bd2d983e4bc955f99306b990f63a462d472bad4671552ef3b656e297b82dfbd4afbfc21fffd27f900402c34302b9824748f1891d74a5b3dfd74620962c8d144635d6342b3b8889e71915990f09eb957ad063622952b99e41744802ff7587d9e52ac604a348517b5061bfff89c212f101fa73445d4664600b10d76d8184e56ed05f51b68225da5bfaab80f60cc116ac720cff07ae45b3d4ceb857a47b4d99d12f952397647e7e62add3109282bcea75c9bb352541530d3fc8b1788f6aff68f89478f98dee5f66240f7cdae772b01361ea6f3c7331ddb33abba4cb4e18749888c2d71456cb7cd5e7e53452adb0f34c62f299fa1dcb19013bf2338d1588271a45b64879d292ad866903c019466c918248193d49fcdd4346be5f84cb1c0402cec8278afbc9f21a20c40a73f6afc01f8f54efa079ea8c595e1c90d37e984a6ad3360ccc0252b66f99c429b770c6c6989d5d1968c301615c58007f204c7f30fbeacd81d3d4d637ec8d7d55938d8868f8fd32c875a7fa6aaad87aa264443caed2cb0d458929319bcaf3fd137b7ba5f6ac55246dde01ca2738911e0a9fc6a7a7df30d35ff8d06c4b5c7ad7cae5e0c270f7021479fefc2f211cda39cd43e27be2018a97c23506b2e46b70b21dd55845e8496a496cca0a3300433b30b00c172f4a7698d75aa4c0f7b862b9c2238fae06551f4066e96bc2338018036e31784c6dafae8a972b70d1206c34d38a638c75499eac92aded6a6ebb9d5a460cf322d260d7ca62a9cbe84ffb40f08ab5f076c4eebec73d8ef66a50ab9550127990344608a4d183f25d62c42d560ac79e6e65f5ec02afa751f2465e10323f15784ad1891174d89eb21b4700024c2bb2519386d9dd766a411814ad801a488c1b8133ac75244096f4d1e18838c6f93d2a697ea527873e68551355361247a6417dd2d5599c11d284c19c5a44132c06afc278381f39d6b19374aaa4c25bfabe05fabb4c12e7df37f8d1e83f40039f7772972b9b8d426b3ef5f38b91367a63f849cb7cc3f442d9c9ceb83aa8be818d59db9e35dc310323f061220be459ac6f3d6c36877a7a332954eff16ffc0c0226b1ff7ab041420acf299a235453609613737a739c3bdc1ce04806a42625e7f75c1b047f5689cd0a4510ea2c4d18085c80d9f42a4659bcc4dc63564fff660ac11b286a37f7aee2e2f6fcf034758b577f8f475846b9d1fc7a7d131cf45e9a6c19f1bdb8a918396418f5a3f620b8ef6443dd4593e911d65ea3dee0453269a210767334695025f4295b3644d0eae3725b73c4205859bb3cfc3e71f2129e62df5789c8b63f05a78a451f62aa6fe2db041d4574885eaf4299849f69d19b60f67e789892e64c83504fd99b50d8352a9a5de73b6d4a4fed3a8fe0c9f13e09023914bb68162eeb47dff73e9a39861ff32519a988a8c6eaf9a9d5a2d8aa0221358204b4c6f7cbb744006d5b3ca42156036b6ef83c24438c3948f323beedd1b431e68a59127b7ee42d907193210429b35011f1301af89f56342f63a0fc55bba9c286f1d9ff14e292b64dd508c21afca3bd396a283d42342bd8686ffb5092a587885fe65c77ecc31be2a94647451829a6cae2c90828b74b03c59c3b0cc4efc0069feba03f5f84ced048d9879a4d61a61dd428d4f3bb0cc347e3e05a3b320008c7c348453689cacfe7f6c82032e940219a6491a83e67bb08cbb750781357943b4822fd220420929f3ab042c8736215d313b474a3ff92e11f01cdb7fcc4fedce7cc070c2296ad35aa74b96bdfb6670859931d576f27020e57acbe1c3994506cbd47bb4d692dd68f58886331c80e78893d77ccda455faf84fdc6739013553b749cf23f42ac7297b397dab7d5d5368ffce3c43fc31d04bd0ac44a60f085b46debd2e1eef9cf72bd73d33e8c106066c3edb7deb5a6e09d483d81181a31c809311709ed13b9466d4fef41aedc1aab7aca7a2cc8dbdbc07d70ea6736b71e8562278e1fceccf0c9c16544bbcb594e694651d5daec54b8f4fcbf3878f917a2964c76b0b8f61d3a33950ee476fb3e91c33c312ff13c3d4e9fc5c5d02215a1c8c49ab0fd5d16f9fefec22f2574b1e4f0b49009fb8a5b00126266e26625894b86a16b52425a067d56841a72c74a7027c1e158fb43add2af7968965bce8d042ff5681d285a1af8f5fcaff8efb84d5d53496259f6fadca023bf6bafa15eed08cafcb667784a259e6d4a53def295d18016c26aafa513aac78c9d29e8dfe103841447b59f28cd06e5fd547e851aecf60c29572f1fedf40bc50608a3571b835ecde761b33910c60eed60b95ba69513f4c519878c04ad536d0d5982b28292927b7bf7d03d69689b2e5daf6535d2f8eecf94c729b1a76751426fdfbe20e4ba049bf0fabcee669c0d7f9c724691f411a1cb2f47ecaa59667354752f886270d7420f4f64ae8c13ced6b6799c24ab17b189ec05bfe80f0ab3daa327f8c20726797a28394e1ffd7980c9022a47a151c1ebb0376e62d320eeccf8602e2f514a4027360e2d5181fc1358030b701af5b0f1602ab584cc5028515e49f47e8a9e3b17b4f88405adcc5dbaed3143fe9d45c48b4141999d4b926f197d4b5ed9121149e5bf11979e371286698b8ddfb1d3af33d71d8a56bcf0f4fe1da78160233d6d7b80937298b52962eb7f8bab3cc612703579e7730bc1ffb0702cc24e3edac7a5180a2b93d967562cdcc7794a45ac4f05f44a36296d3350", 0x1000, 0x40}, {&(0x7f0000001400)="6af3ddbd392f854cdd1f9339323069af30de588e4327015b23b25453eb344353e4d93192b9e5600ff6dc707060672f75f6b26019f1ec690f29578dfb9f92555ca11c0218bfa323454a3798d2a87018c1836c6a34468287b8664e4f5ab656e33b9e10fa64a94e11f91f979e84ee7e6962e758259d314dbe14be2e43494048bfbaba75c28340574c90ead84ebb60ed7d88606a3c28aa68f6625d66b6778d4310ffaca6f167cae524ecfdc25cd752db30972cbcad0981be5f186a81ac385f8e2a3b458ea5ab8e86b258122677c2", 0xcc, 0x3b}, {&(0x7f0000001500)="ebfe8cbce27a674b5f867d1fd7d8d47cd6bdb518e876e8ecac251a830aa0fc13f029c0db82da2311d24979eed32c39ae827a066c2f9a6c315ec29f5184dfd4c96287b46bca149eff39380c074c61b65b2b89b494347962404ced9ef979ed2558d26ced14a42fdd7dbae9e2f78844db95e8bca77891f3bb594ef88b2f9a0ad1ad87ccd5ecb188da42882e38a53e710525403f761e025ccff6299c742fafb1c593f03abc52860af2fa1d06cbd3bf9b35ed95fb4b288c05fac3dc6d6bd16cfeae88003f5b9b9eb3f2e358b084aed9e565", 0xcf, 0x100000001}, {&(0x7f0000001600)="d5e562c1975728d62db945dacababc06812d7ad853f3bc36d3405c2cc385b7a97984db2da5b95b2f5bd6daaa70706b4004f45b041b64bde67cb85b46a914bd66e9a44a0961187272c7682dce9534d5c1ffbd6e00421c379b4b02b029670fbad5e5817d510b5e82f69e76782314b0fb8f6ecc3e20e5f67789f3c57334f776506511aa6e85eec06d775adbf9e05782b73d08f206a9250cc78caeff49b58dee758acdc0", 0xa2, 0x2}], 0x800000, &(0x7f00000001c0)='\x00') getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB="9793fd7e33d88d2156a525a3390e87d385be52ab458a93337119"]) [ 1079.903089] hfsplus: unable to parse mount options [ 1079.910837] gfs2: not a GFS2 filesystem [ 1079.918059] Cannot find del_set index 0 as target [ 1079.985760] FAULT_INJECTION: forcing a failure. [ 1079.985760] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.998140] CPU: 1 PID: 24116 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1080.006033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.015379] Call Trace: [ 1080.017951] dump_stack+0x1b2/0x283 [ 1080.021565] should_fail.cold+0x10a/0x154 [ 1080.027868] should_failslab+0xd6/0x130 [ 1080.031822] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1080.036924] __kmalloc_node_track_caller+0x38/0x70 [ 1080.041834] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1080.046490] __alloc_skb+0xca/0x4c0 [ 1080.050096] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1080.054921] ? netlink_has_listeners+0x1ff/0x310 [ 1080.059657] kobject_uevent_env+0x6d1/0xc50 [ 1080.063967] lo_ioctl+0x1177/0x1c00 [ 1080.067576] ? loop_clr_fd+0xac0/0xac0 [ 1080.071445] blkdev_ioctl+0x91d/0x17c0 [ 1080.075310] ? blkpg_ioctl+0x8d0/0x8d0 [ 1080.079177] ? trace_hardirqs_on+0x10/0x10 [ 1080.083399] block_ioctl+0xd9/0x120 [ 1080.087005] ? blkdev_fallocate+0x3a0/0x3a0 [ 1080.091307] do_vfs_ioctl+0x75a/0xfe0 [ 1080.095086] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1080.100699] ? ioctl_preallocate+0x1a0/0x1a0 [ 1080.105103] ? security_file_ioctl+0x76/0xb0 [ 1080.109492] ? security_file_ioctl+0x83/0xb0 [ 1080.114054] SyS_ioctl+0x7f/0xb0 [ 1080.117397] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1080.121433] do_syscall_64+0x1d5/0x640 [ 1080.125362] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1080.130525] RIP: 0033:0x45c937 [ 1080.133690] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.141375] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1080.148631] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1080.155886] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1080.163146] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1080.170389] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1080.180900] gfs2: not a GFS2 filesystem [ 1080.187623] ceph: device name is missing path (no : separator in /dev/loop0) [ 1080.238042] hfsplus: unable to parse mount options [ 1080.290098] ceph: device name is missing path (no : separator in /dev/loop0) [ 1080.332541] hfsplus: unable to parse mount options 13:44:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:23 executing program 2 (fault-call:4 fault-nth:43): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:23 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:23 executing program 3 (fault-call:4 fault-nth:32): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) prlimit64(r1, 0x4, &(0x7f0000000040)={0x80000001, 0x1}, &(0x7f0000000080)) getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')GPL'}}]}}) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}}}, 0x78) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000140)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nls={'nls', 0x3d, 'macgaelic'}}], [{@euid_eq={'euid', 0x3d, r2}}]}) [ 1082.407414] Cannot find del_set index 0 as target [ 1082.418715] FAULT_INJECTION: forcing a failure. [ 1082.418715] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.430143] CPU: 0 PID: 24151 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1082.438023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.442492] Cannot find del_set index 0 as target [ 1082.447367] Call Trace: 13:44:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0x0, [0x0, 0x1, 0x5, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1082.447384] dump_stack+0x1b2/0x283 [ 1082.447401] should_fail.cold+0x10a/0x154 [ 1082.447416] should_failslab+0xd6/0x130 [ 1082.447431] kmem_cache_alloc+0x40/0x3c0 [ 1082.466585] hfsplus: unable to parse mount options [ 1082.470574] __es_insert_extent+0x241/0xe20 [ 1082.470588] ext4_es_insert_extent+0x1b9/0x530 [ 1082.470600] ? lock_downgrade+0x6e0/0x6e0 [ 1082.470613] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1082.491075] Cannot find del_set index 0 as target [ 1082.494570] ? rcu_lockdep_current_cpu_online+0xed/0x140 13:44:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0x0, [0x0, 0x1, 0x5], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1082.494582] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1082.494594] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 1082.494609] ext4_ext_put_gap_in_cache+0xbb/0xf0 [ 1082.520398] ? ext4_zeroout_es+0x160/0x160 [ 1082.524019] Cannot find del_set index 0 as target [ 1082.524634] ? ext4_find_extent+0x66a/0x9f0 [ 1082.524650] ext4_ext_map_blocks+0x1bbf/0x4b30 [ 1082.524665] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1082.540920] FAULT_INJECTION: forcing a failure. [ 1082.540920] name failslab, interval 1, probability 0, space 0, times 0 13:44:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0x0, [0x0, 0x1], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1082.543351] ? ext4_es_lookup_extent+0x321/0xac0 [ 1082.543367] ? lock_acquire+0x170/0x3f0 [ 1082.543379] ? lock_acquire+0x170/0x3f0 [ 1082.543393] ? ext4_map_blocks+0x3c7/0x1600 [ 1082.571515] ext4_map_blocks+0xc8f/0x1600 [ 1082.575110] Cannot find del_set index 0 as target [ 1082.575662] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1082.585915] ? ext4_issue_zeroout+0x150/0x150 [ 1082.590400] ? __ext4_new_inode+0x278/0x4e80 [ 1082.594807] ext4_getblk+0x98/0x3f0 [ 1082.598424] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1082.602750] ? __dquot_initialize+0x3f4/0x980 13:44:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0x0, [], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1082.607240] ext4_bread+0x6c/0x1a0 [ 1082.610776] ? ext4_getblk+0x3f0/0x3f0 [ 1082.614654] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1082.619833] ? security_transition_sid+0xcb/0x120 [ 1082.624666] ? security_transition_sid+0x9d/0x120 [ 1082.629494] ext4_append+0x143/0x350 [ 1082.631441] Cannot find del_set index 0 as target [ 1082.633199] ext4_mkdir+0x4c9/0xb60 [ 1082.633217] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1082.633232] ? security_inode_mkdir+0xcc/0x100 [ 1082.633245] vfs_mkdir+0x3af/0x620 [ 1082.633257] SyS_mkdirat+0x1b5/0x220 13:44:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}, {0x0, [], 0x0, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1082.658129] ? SyS_mknod+0x30/0x30 [ 1082.661661] ? do_syscall_64+0x4c/0x640 [ 1082.665629] ? SyS_mkdirat+0x220/0x220 [ 1082.669514] do_syscall_64+0x1d5/0x640 [ 1082.673404] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1082.678582] RIP: 0033:0x45bee7 [ 1082.681774] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1082.689300] Cannot find del_set index 0 as target [ 1082.689466] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1082.701545] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1082.708808] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1082.716075] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1082.723338] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1082.730616] CPU: 1 PID: 24155 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1082.738503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.747854] Call Trace: [ 1082.750450] dump_stack+0x1b2/0x283 [ 1082.754082] should_fail.cold+0x10a/0x154 [ 1082.758322] should_failslab+0xd6/0x130 [ 1082.762297] kmem_cache_alloc_node+0x25f/0x400 [ 1082.766881] __alloc_skb+0x9a/0x4c0 [ 1082.770510] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1082.772608] gfs2: not a GFS2 filesystem [ 1082.775352] ? netlink_has_listeners+0x1ff/0x310 [ 1082.775365] kobject_uevent_env+0x6d1/0xc50 [ 1082.775384] lo_ioctl+0x1177/0x1c00 [ 1082.792003] ? loop_clr_fd+0xac0/0xac0 [ 1082.795894] blkdev_ioctl+0x91d/0x17c0 [ 1082.799780] ? blkpg_ioctl+0x8d0/0x8d0 [ 1082.803662] ? trace_hardirqs_on+0x10/0x10 [ 1082.807909] block_ioctl+0xd9/0x120 [ 1082.811536] ? blkdev_fallocate+0x3a0/0x3a0 [ 1082.815859] do_vfs_ioctl+0x75a/0xfe0 [ 1082.819662] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1082.825285] ? ioctl_preallocate+0x1a0/0x1a0 [ 1082.829716] ? security_file_ioctl+0x76/0xb0 [ 1082.834106] ? security_file_ioctl+0x83/0xb0 [ 1082.838509] SyS_ioctl+0x7f/0xb0 [ 1082.841906] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1082.845860] do_syscall_64+0x1d5/0x640 [ 1082.849733] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1082.855012] RIP: 0033:0x45c937 [ 1082.858197] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1082.865890] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1082.873140] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1082.880424] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1082.887778] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1082.895029] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1082.910616] gfs2: not a GFS2 filesystem 13:44:26 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:26 executing program 2 (fault-call:4 fault-nth:44): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:26 executing program 3 (fault-call:4 fault-nth:33): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:26 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) prctl$PR_SET_DUMPABLE(0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$rds(r2, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) clock_settime(0x4, &(0x7f0000000040)={0x77359400}) 13:44:26 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x140a, 0x10, 0x70bd2a, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008851) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1085.463373] FAULT_INJECTION: forcing a failure. [ 1085.463373] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.463579] Cannot find del_set index 0 as target [ 1085.493327] CPU: 0 PID: 24201 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1085.501222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.510568] Call Trace: [ 1085.513159] dump_stack+0x1b2/0x283 [ 1085.516792] should_fail.cold+0x10a/0x154 [ 1085.520944] should_failslab+0xd6/0x130 [ 1085.524922] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1085.530031] __kmalloc_node_track_caller+0x38/0x70 [ 1085.534962] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1085.539631] __alloc_skb+0xca/0x4c0 [ 1085.543259] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 1085.548138] ? netlink_has_listeners+0x1ff/0x310 [ 1085.552982] kobject_uevent_env+0x6d1/0xc50 [ 1085.557315] lo_ioctl+0x1177/0x1c00 [ 1085.560959] ? loop_clr_fd+0xac0/0xac0 [ 1085.564845] blkdev_ioctl+0x91d/0x17c0 [ 1085.568730] ? blkpg_ioctl+0x8d0/0x8d0 [ 1085.572616] ? trace_hardirqs_on+0x10/0x10 [ 1085.576859] block_ioctl+0xd9/0x120 [ 1085.580483] ? blkdev_fallocate+0x3a0/0x3a0 [ 1085.584801] do_vfs_ioctl+0x75a/0xfe0 [ 1085.589989] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1085.595689] ? ioctl_preallocate+0x1a0/0x1a0 [ 1085.600095] ? security_file_ioctl+0x76/0xb0 [ 1085.604620] ? security_file_ioctl+0x83/0xb0 [ 1085.609009] SyS_ioctl+0x7f/0xb0 [ 1085.612365] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1085.616327] do_syscall_64+0x1d5/0x640 [ 1085.620210] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1085.625387] RIP: 0033:0x45c937 [ 1085.628558] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1085.636347] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1085.643597] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1085.650848] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 13:44:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:27 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f0000000040)=0x5) [ 1085.658115] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1085.665369] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1085.680597] FAULT_INJECTION: forcing a failure. [ 1085.680597] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.691860] CPU: 0 PID: 24207 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1085.699744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.709093] Call Trace: [ 1085.711689] dump_stack+0x1b2/0x283 [ 1085.715320] should_fail.cold+0x10a/0x154 [ 1085.719478] should_failslab+0xd6/0x130 [ 1085.723453] kmem_cache_alloc+0x40/0x3c0 [ 1085.727514] __es_insert_extent+0x241/0xe20 [ 1085.731838] ext4_es_insert_extent+0x1b9/0x530 [ 1085.736425] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1085.742227] ext4_map_blocks+0x9f6/0x1600 [ 1085.746381] ? ext4_issue_zeroout+0x150/0x150 [ 1085.750877] ? __ext4_new_inode+0x278/0x4e80 [ 1085.755292] ext4_getblk+0x98/0x3f0 [ 1085.758916] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1085.763238] ? __dquot_initialize+0x3f4/0x980 [ 1085.767738] ext4_bread+0x6c/0x1a0 [ 1085.771279] ? ext4_getblk+0x3f0/0x3f0 [ 1085.775161] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1085.780347] ? security_transition_sid+0xcb/0x120 [ 1085.785184] ? security_transition_sid+0x9d/0x120 [ 1085.786515] Cannot find add_set index 0 as target [ 1085.790020] ext4_append+0x143/0x350 [ 1085.790035] ext4_mkdir+0x4c9/0xb60 [ 1085.790052] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1085.790066] ? security_inode_mkdir+0xcc/0x100 [ 1085.790078] vfs_mkdir+0x3af/0x620 13:44:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1085.790090] SyS_mkdirat+0x1b5/0x220 [ 1085.790101] ? SyS_mknod+0x30/0x30 [ 1085.790112] ? do_syscall_64+0x4c/0x640 [ 1085.790120] ? SyS_mkdirat+0x220/0x220 [ 1085.790131] do_syscall_64+0x1d5/0x640 [ 1085.833998] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1085.839179] RIP: 0033:0x45bee7 [ 1085.842361] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1085.850154] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1085.857420] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1085.864688] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1085.871953] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1085.879219] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1085.896295] gfs2: not a GFS2 filesystem [ 1085.906526] gfs2: not a GFS2 filesystem [ 1085.908905] Cannot find add_set index 0 as target 13:44:27 executing program 3 (fault-call:4 fault-nth:34): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:27 executing program 4: timerfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) socket$phonet_pipe(0x23, 0x5, 0x2) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="14000000100001000000e6ffffff07000102000000000000000000000000140000001100010000000000000000000000000a"], 0x3c}}, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x10000) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r5, 0x3, &(0x7f0000000140)={{r6, r7+10000000}, {0x77359400}}, &(0x7f0000000040)) [ 1085.911771] hfsplus: gid requires an argument [ 1085.925683] hfsplus: unable to parse mount options 13:44:27 executing program 2 (fault-call:4 fault-nth:45): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1086.028191] FAULT_INJECTION: forcing a failure. [ 1086.028191] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.031376] FAULT_INJECTION: forcing a failure. [ 1086.031376] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.050685] CPU: 1 PID: 24251 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1086.058557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.067895] Call Trace: [ 1086.070473] dump_stack+0x1b2/0x283 [ 1086.074097] should_fail.cold+0x10a/0x154 [ 1086.078249] should_failslab+0xd6/0x130 [ 1086.082220] kmem_cache_alloc+0x40/0x3c0 [ 1086.086270] __es_insert_extent+0x241/0xe20 [ 1086.090593] ext4_es_insert_extent+0x1b9/0x530 [ 1086.095164] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1086.100968] ext4_map_blocks+0x9f6/0x1600 [ 1086.105119] ? ext4_issue_zeroout+0x150/0x150 [ 1086.109608] ? __ext4_new_inode+0x278/0x4e80 [ 1086.114016] ext4_getblk+0x98/0x3f0 [ 1086.117635] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1086.121949] ? __dquot_initialize+0x3f4/0x980 [ 1086.126461] ext4_bread+0x6c/0x1a0 [ 1086.129990] ? ext4_getblk+0x3f0/0x3f0 [ 1086.133872] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1086.139060] ? security_transition_sid+0xcb/0x120 [ 1086.143893] ? security_transition_sid+0x9d/0x120 [ 1086.148728] ext4_append+0x143/0x350 [ 1086.152443] ext4_mkdir+0x4c9/0xb60 [ 1086.156066] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1086.160731] ? security_inode_mkdir+0xcc/0x100 [ 1086.165314] vfs_mkdir+0x3af/0x620 [ 1086.168848] SyS_mkdirat+0x1b5/0x220 [ 1086.172546] ? SyS_mknod+0x30/0x30 [ 1086.176072] ? do_syscall_64+0x4c/0x640 [ 1086.180035] ? SyS_mkdirat+0x220/0x220 [ 1086.183921] do_syscall_64+0x1d5/0x640 [ 1086.187816] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1086.192997] RIP: 0033:0x45bee7 [ 1086.196181] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1086.203883] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1086.211145] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000fc0 [ 1086.218407] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1086.225670] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1086.232929] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1086.240193] CPU: 0 PID: 24249 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1086.248081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.257426] Call Trace: [ 1086.260019] dump_stack+0x1b2/0x283 [ 1086.263675] should_fail.cold+0x10a/0x154 [ 1086.264271] gfs2: not a GFS2 filesystem [ 1086.267819] should_failslab+0xd6/0x130 [ 1086.267832] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1086.267842] ? kobject_create_and_add.cold+0x3f/0x3f [ 1086.267855] call_usermodehelper_setup+0x73/0x2e0 [ 1086.272158] Cannot find add_set index 0 as target [ 1086.275768] kobject_uevent_env+0xa79/0xc50 [ 1086.275791] lo_ioctl+0x1177/0x1c00 [ 1086.275804] ? loop_clr_fd+0xac0/0xac0 [ 1086.306946] blkdev_ioctl+0x91d/0x17c0 [ 1086.310823] ? blkpg_ioctl+0x8d0/0x8d0 [ 1086.314695] ? trace_hardirqs_on+0x10/0x10 [ 1086.318971] block_ioctl+0xd9/0x120 [ 1086.322579] ? blkdev_fallocate+0x3a0/0x3a0 [ 1086.326884] do_vfs_ioctl+0x75a/0xfe0 [ 1086.330751] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 1086.336354] ? ioctl_preallocate+0x1a0/0x1a0 [ 1086.340748] ? security_file_ioctl+0x76/0xb0 [ 1086.345132] ? security_file_ioctl+0x83/0xb0 [ 1086.349516] SyS_ioctl+0x7f/0xb0 [ 1086.352863] ? do_vfs_ioctl+0xfe0/0xfe0 [ 1086.356818] do_syscall_64+0x1d5/0x640 [ 1086.360688] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1086.365860] RIP: 0033:0x45c937 [ 1086.369104] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1086.376798] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045c937 [ 1086.384046] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1086.391299] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1086.398574] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1086.405822] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1086.431532] gfs2: not a GFS2 filesystem 13:44:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:29 executing program 2 (fault-call:4 fault-nth:46): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:29 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e1ea8b6", @ANYRESHEX=r0, @ANYBLOB=',\x00']) 13:44:29 executing program 3 (fault-call:4 fault-nth:35): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:29 executing program 4: r0 = socket$inet6(0xa, 0x80000, 0x0) r1 = dup(r0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r1, 0x1) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200803, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000140)={{}, {0x77359400}}, &(0x7f0000af9ff0)) [ 1088.504128] hfsplus: unable to parse mount options [ 1088.517700] FAULT_INJECTION: forcing a failure. [ 1088.517700] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.521831] FAULT_INJECTION: forcing a failure. [ 1088.521831] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.536507] CPU: 1 PID: 24281 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1088.547981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.557341] Call Trace: [ 1088.559930] dump_stack+0x1b2/0x283 [ 1088.563558] should_fail.cold+0x10a/0x154 [ 1088.567708] should_failslab+0xd6/0x130 [ 1088.571770] __kmalloc_track_caller+0x2bc/0x400 [ 1088.576436] ? strndup_user+0x5b/0xf0 [ 1088.580237] memdup_user+0x22/0xa0 [ 1088.583867] strndup_user+0x5b/0xf0 [ 1088.587490] ? copy_mnt_ns+0x8a0/0x8a0 [ 1088.591375] SyS_mount+0x39/0x120 [ 1088.594834] ? copy_mnt_ns+0x8a0/0x8a0 [ 1088.598722] do_syscall_64+0x1d5/0x640 [ 1088.602612] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1088.607791] RIP: 0033:0x45f4ba [ 1088.610968] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1088.618665] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1088.625922] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1088.633205] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1088.640462] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1088.647727] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:30 executing program 2 (fault-call:4 fault-nth:47): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1088.656861] CPU: 0 PID: 24280 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1088.664761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.674108] Call Trace: [ 1088.676693] dump_stack+0x1b2/0x283 [ 1088.680321] should_fail.cold+0x10a/0x154 [ 1088.684473] should_failslab+0xd6/0x130 [ 1088.688448] kmem_cache_alloc+0x28e/0x3c0 [ 1088.692698] getname_flags+0xc8/0x550 [ 1088.696506] SyS_mkdirat+0x83/0x220 [ 1088.700133] ? SyS_mknod+0x30/0x30 [ 1088.703670] ? fput+0xb/0x140 13:44:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1088.706772] ? do_syscall_64+0x4c/0x640 [ 1088.710743] ? SyS_mkdirat+0x220/0x220 [ 1088.714633] do_syscall_64+0x1d5/0x640 [ 1088.718526] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1088.723711] RIP: 0033:0x45bee7 [ 1088.726902] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1088.734609] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1088.741880] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1088.749146] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 13:44:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1088.756419] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1088.763683] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78) getgroups(0x3e, &(0x7f00000000c0)=[0xee00, r2]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r3}}]}) 13:44:30 executing program 3 (fault-call:4 fault-nth:36): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1088.805369] Cannot find add_set index 0 as target 13:44:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1088.858354] FAULT_INJECTION: forcing a failure. [ 1088.858354] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.885543] CPU: 0 PID: 24312 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1088.893478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.902828] Call Trace: [ 1088.905418] dump_stack+0x1b2/0x283 [ 1088.909049] should_fail.cold+0x10a/0x154 [ 1088.913217] should_failslab+0xd6/0x130 [ 1088.917192] __kmalloc_track_caller+0x2bc/0x400 [ 1088.921859] ? strndup_user+0x5b/0xf0 [ 1088.925661] memdup_user+0x22/0xa0 [ 1088.929235] strndup_user+0x5b/0xf0 [ 1088.932858] ? copy_mnt_ns+0x8a0/0x8a0 [ 1088.936829] SyS_mount+0x68/0x120 [ 1088.938054] FAULT_INJECTION: forcing a failure. [ 1088.938054] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.940271] ? copy_mnt_ns+0x8a0/0x8a0 [ 1088.940285] do_syscall_64+0x1d5/0x640 [ 1088.940307] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1088.964372] RIP: 0033:0x45f4ba [ 1088.967547] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1088.975234] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1088.982491] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1088.989757] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1088.997014] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1089.004260] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1089.011524] CPU: 1 PID: 24325 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1089.019402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.028746] Call Trace: [ 1089.031331] dump_stack+0x1b2/0x283 [ 1089.032371] Cannot find add_set index 0 as target [ 1089.035044] should_fail.cold+0x10a/0x154 [ 1089.035062] should_failslab+0xd6/0x130 [ 1089.035073] kmem_cache_alloc+0x28e/0x3c0 [ 1089.035087] ? ext4_sync_fs+0x7e0/0x7e0 [ 1089.056084] ext4_alloc_inode+0x19/0x610 [ 1089.060152] ? ext4_sync_fs+0x7e0/0x7e0 [ 1089.064237] alloc_inode+0x5d/0x170 [ 1089.067862] new_inode_pseudo+0x14/0xe0 [ 1089.071835] new_inode+0x1b/0x40 [ 1089.075198] __ext4_new_inode+0x356/0x4e80 [ 1089.079443] ? ext4_free_inode+0x14a0/0x14a0 [ 1089.083843] ? avc_has_perm+0x1a4/0x320 [ 1089.087816] ? __dquot_initialize+0x3f4/0x980 [ 1089.092308] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 1089.096980] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1089.098403] hfsplus: gid requires an argument [ 1089.102187] ? security_transition_sid+0xcb/0x120 [ 1089.102198] ? security_transition_sid+0x9d/0x120 [ 1089.102215] ext4_mkdir+0x2e4/0xb60 [ 1089.102230] ? selinux_dentry_init_security+0x220/0x220 [ 1089.102242] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1089.102256] ? security_inode_mkdir+0xcc/0x100 [ 1089.102267] vfs_mkdir+0x3af/0x620 [ 1089.102279] SyS_mkdirat+0x1b5/0x220 [ 1089.114671] hfsplus: unable to parse mount options [ 1089.116404] ? SyS_mknod+0x30/0x30 [ 1089.116417] ? do_syscall_64+0x4c/0x640 [ 1089.116426] ? SyS_mkdirat+0x220/0x220 [ 1089.116437] do_syscall_64+0x1d5/0x640 [ 1089.116456] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1089.167586] RIP: 0033:0x45bee7 [ 1089.170766] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1089.178515] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1089.185766] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1089.193028] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1089.200280] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1089.207581] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:32 executing program 2 (fault-call:4 fault-nth:48): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:32 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x100, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x90}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, 0x0, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x3f}, @NL80211_ATTR_REG_RULES={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4085) listen(r3, 0x8001) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4, @broadcast}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e24, 0x7f, @loopback, 0x6c000000}, @in6={0xa, 0x4e23, 0x5, @private0}, @in6={0xa, 0x4e20, 0x9, @mcast2, 0x4}], 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_SET_KEYBIT(r6, 0x40045565, 0x167) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:32 executing program 3 (fault-call:4 fault-nth:37): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:32 executing program 0: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000140)={[0x9, 0x8, 0x1, 0x255, 0x61, 0x9, 0x7, 0xfffffffffffffe00, 0x8000, 0xc7af, 0x7fffffff, 0x9c, 0x3f, 0x1, 0x7ff, 0x3], 0x2000, 0x400110}) getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB='b']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x11000080, &(0x7f0000000240)="b9c55bcb82327b5bf740ab58b577a4a31ad9e6356dccdf88cbe21b61a49af66c6c82f410b8f8056608969823259d6283c10ac5657d39f3ba110f01b636424cd80907bdb27f400da74669c3f115af471c82cbde32c06f52096229f2631cd8b37a5e79610fde44afa3ef85cbaf3c726e1202bba56fdc8338b11595447ac4679e04b4a2a8d26d983d2ddee3d3be1dea4f432431ba97d713a36175a940fbf20596110248e768fab36a40bffb938d54aaa992ee2abd12c8a6ba61c5811cb39a41297336f7d2f73cbae6e61894183a793be13e2db3bfeafb34", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000340)="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") r3 = fcntl$dupfd(r2, 0x0, r1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x4) [ 1091.524506] FAULT_INJECTION: forcing a failure. [ 1091.524506] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.534245] hfsplus: gid requires an argument [ 1091.536580] FAULT_INJECTION: forcing a failure. [ 1091.536580] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.552197] CPU: 1 PID: 24356 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1091.555694] Cannot find add_set index 0 as target [ 1091.560080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.560085] Call Trace: [ 1091.560105] dump_stack+0x1b2/0x283 [ 1091.560121] should_fail.cold+0x10a/0x154 [ 1091.560136] should_failslab+0xd6/0x130 [ 1091.560148] __kmalloc_track_caller+0x2bc/0x400 [ 1091.560159] ? strndup_user+0x5b/0xf0 [ 1091.560171] memdup_user+0x22/0xa0 [ 1091.560183] strndup_user+0x5b/0xf0 [ 1091.560192] ? copy_mnt_ns+0x8a0/0x8a0 [ 1091.560201] SyS_mount+0x68/0x120 [ 1091.560210] ? copy_mnt_ns+0x8a0/0x8a0 [ 1091.560222] do_syscall_64+0x1d5/0x640 [ 1091.560237] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1091.560245] RIP: 0033:0x45f4ba [ 1091.560250] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1091.560259] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1091.560264] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1091.560272] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1091.576675] hfsplus: unable to parse mount options [ 1091.577008] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 13:44:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1091.669384] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1091.679078] CPU: 1 PID: 24357 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1091.686969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.696315] Call Trace: [ 1091.698906] dump_stack+0x1b2/0x283 [ 1091.701628] hfsplus: gid requires an argument [ 1091.702533] should_fail.cold+0x10a/0x154 [ 1091.707031] hfsplus: unable to parse mount options [ 1091.711165] should_failslab+0xd6/0x130 [ 1091.711175] kmem_cache_alloc+0x28e/0x3c0 [ 1091.711187] ? ext4_sync_fs+0x7e0/0x7e0 [ 1091.711196] ext4_alloc_inode+0x19/0x610 [ 1091.711204] ? ext4_sync_fs+0x7e0/0x7e0 [ 1091.711215] alloc_inode+0x5d/0x170 [ 1091.739904] new_inode_pseudo+0x14/0xe0 [ 1091.743887] new_inode+0x1b/0x40 [ 1091.747249] __ext4_new_inode+0x356/0x4e80 [ 1091.751488] ? ext4_free_inode+0x14a0/0x14a0 [ 1091.755893] ? avc_has_perm+0x1a4/0x320 [ 1091.759867] ? __dquot_initialize+0x3f4/0x980 [ 1091.764356] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 1091.769025] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1091.770144] Cannot find add_set index 0 as target [ 1091.774213] ? security_transition_sid+0xcb/0x120 [ 1091.774224] ? security_transition_sid+0x9d/0x120 [ 1091.774240] ext4_mkdir+0x2e4/0xb60 [ 1091.774254] ? selinux_dentry_init_security+0x220/0x220 [ 1091.797693] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1091.802362] ? security_inode_mkdir+0xcc/0x100 [ 1091.806946] vfs_mkdir+0x3af/0x620 [ 1091.810770] SyS_mkdirat+0x1b5/0x220 [ 1091.814568] ? SyS_mknod+0x30/0x30 [ 1091.818106] ? do_syscall_64+0x4c/0x640 [ 1091.822075] ? SyS_mkdirat+0x220/0x220 13:44:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:33 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000180)={0x8, 0x7fff, 0x4}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x5b, "0d3ab6bf7ec7109d33e73a3f7846d798f7782d33d106c1ce14e4245d183b2a251636cfc0c6b20d0944c6aa9ad9a9fb2c97637299fa77659abec067f20b8c6ca3a86e6289124c8ce64f637d83621a224e0a07aff641faf712402b1f"}, &(0x7f00000000c0)=0x63) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r7, 0x4) [ 1091.825961] do_syscall_64+0x1d5/0x640 [ 1091.829851] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1091.835035] RIP: 0033:0x45bee7 [ 1091.838218] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1091.845922] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1091.854318] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1091.856914] Cannot find add_set index 0 as target [ 1091.861580] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 13:44:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:33 executing program 3 (fault-call:4 fault-nth:38): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1091.861585] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1091.861590] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:33 executing program 2 (fault-call:4 fault-nth:49): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:33 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3ff) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000000180)="2b70e31aff5b89fa1e335e4de8025a7658f943b886859b5373b003e76b6384f5d4ba543f4bb42c0332a20ab89262f4f89d1dac41449fc0c5138a61c5a84d0e18f3b102b9390dd5b414d078d28405e0b54bfd9dea0bf9d44904eb20ffecc0b1c957ded4262b883843b1c52db56c344588358541293dd20398190f6136bf4df14929dd4268750bbc9a9e8a3d59e5fd4a97", 0x90}, {&(0x7f0000000240)="f60ed161412bd35c75dd452040d6adfb0d717be71527e5bfbd7c27d8745094304a1f877909b77a2d12237a3f2b28181d6bde3b4cb070448487c25b9a9fbb18d3c9a6381a59340aa3f4ffe271ced8cae9caaea134c6203cdac27d3e76dba8458834474a5d144ce7e70598208a994afdc74813991d6e5e53132fcf08d26dd9d139487f58ca16a11179b111022f0a00fcda7d4795c166b1aae0cb136ed2d2d5a925908d14ca5bdbb469ad46aa9c134b0595eb587329249b1ddbbe70ca4c1b8311714c7e4a8bfa7abd6f9d9b64ba001fa9095823a60143e90339dafe4b523503ec1de1a79eea40c17753c60dea715d0fb2491b18c39856e7", 0xf6}, {&(0x7f0000000340)="500dcd5c6cef033c3732b66a5896abcb0c010d1db2cefa34c02043a4029071231e4e9dd27d3b67de9dcbf969c6da8c4e2eb8db1ab4f23c885af383c28d0e5843220b7027c896d124ba44460f93e215e842c21b858c", 0x55}, {&(0x7f00000003c0)="59a9d390da665b6a0b821fa4a9a83873b2dc182459b30c7cc41a55f462f1c7d6e21f187591f04c3cb804b8c8dda324ba4121ac3fe05ece4b4fd268498b17ccef89217eb193abf41fefd1ab2943e4f15767", 0x51}, {&(0x7f0000000440)="895019dd6bc5fcc7f15fe77656a91225dd608ccb02a2ba0f2a6386afea444bdad0aa7ac4d1cd5a788c672b71a80845aa2ed90b57a0f5db12f963618fdebef975f4edeaa53e834026ef582c6995d3a21de2cc2fe52902e30f7abbf48dbad889ace1483609a25f", 0x66}, {&(0x7f0000000100)="6fa83d490de6ca3ad1682fd0ecb6", 0xe}, {&(0x7f00000004c0)="b8062d94694790228f5de3cf18f4b152629367d60eaa2ef38ff8827440109ff61b7a5a5e8c9cd1ef44189113549a040afe463076dfe59ad13bfae58c5afd97828b9c23baebff6337db38af2cc3f651a4", 0x50}], 0x7, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff4000/0x9000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000000)="d063bb00c0eaedd9757d90029a75803151c617833d32dbcf6d8ae82e77ef9292cfa1019d177e8749824daed7cd177ca36455b36c983d435926f3f80e132272007b381f025f771d3dfbb641a125e77c09e2a63dc0a8f938e4f57de9a781a5239f6efca0b28ef41f8a3e50c51bfd5b8285d8", 0x71, r2}, 0x68) 13:44:33 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB='s\x00']) [ 1091.984093] FAULT_INJECTION: forcing a failure. [ 1091.984093] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.003707] Cannot find add_set index 0 as target [ 1092.007043] FAULT_INJECTION: forcing a failure. [ 1092.007043] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.014723] hfsplus: unable to parse mount options [ 1092.020240] CPU: 1 PID: 24410 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1092.032933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.042273] Call Trace: [ 1092.044850] dump_stack+0x1b2/0x283 [ 1092.048478] should_fail.cold+0x10a/0x154 [ 1092.052623] should_failslab+0xd6/0x130 [ 1092.056587] __kmalloc+0x6d/0x400 [ 1092.057561] Cannot find add_set index 0 as target [ 1092.060028] ? context_struct_to_string+0x323/0x610 [ 1092.060043] context_struct_to_string+0x323/0x610 [ 1092.060056] ? dump_masked_av_helper+0x90/0x90 [ 1092.060066] ? sidtab_search_core+0x17f/0x2a0 [ 1092.060077] security_sid_to_context_core+0x187/0x200 [ 1092.060091] selinux_inode_init_security+0x45a/0x680 [ 1092.094036] ? ext4_get_acl+0xcb/0x500 [ 1092.097943] ? selinux_inode_create+0x30/0x30 [ 1092.102454] ? ext4_get_acl+0xd0/0x500 [ 1092.106341] security_inode_init_security+0x15f/0x320 [ 1092.111525] ? ext4_init_acl+0x190/0x190 [ 1092.113224] Cannot find add_set index 0 as target [ 1092.115653] ? security_kernel_post_read_file+0xd0/0xd0 [ 1092.115678] ? insert_inode_locked+0x39e/0x4b0 [ 1092.115694] __ext4_new_inode+0x35ed/0x4e80 [ 1092.115713] ? ext4_free_inode+0x14a0/0x14a0 [ 1092.139137] ? avc_has_perm+0x1a4/0x320 [ 1092.143103] ? __dquot_initialize+0x3f4/0x980 [ 1092.147674] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 1092.152344] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1092.157534] ? security_transition_sid+0xcb/0x120 [ 1092.162390] ? security_transition_sid+0x9d/0x120 [ 1092.167223] ext4_mkdir+0x2e4/0xb60 [ 1092.170849] ? selinux_dentry_init_security+0x220/0x220 [ 1092.174209] Cannot find add_set index 0 as target [ 1092.178725] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1092.178742] ? security_inode_mkdir+0xcc/0x100 [ 1092.178756] vfs_mkdir+0x3af/0x620 [ 1092.178767] SyS_mkdirat+0x1b5/0x220 [ 1092.178779] ? SyS_mknod+0x30/0x30 [ 1092.203561] ? do_syscall_64+0x4c/0x640 [ 1092.207527] ? SyS_mkdirat+0x220/0x220 [ 1092.211399] do_syscall_64+0x1d5/0x640 [ 1092.215286] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1092.220473] RIP: 0033:0x45bee7 [ 1092.223665] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 13:44:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1092.231403] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1092.238758] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1092.239283] Cannot find add_set index 0 as target [ 1092.246016] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1092.246021] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1092.246026] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1092.292578] CPU: 0 PID: 24404 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1092.300474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.309824] Call Trace: [ 1092.312421] dump_stack+0x1b2/0x283 [ 1092.316052] should_fail.cold+0x10a/0x154 [ 1092.320206] should_failslab+0xd6/0x130 [ 1092.324185] kmem_cache_alloc+0x28e/0x3c0 [ 1092.328336] getname_flags+0xc8/0x550 [ 1092.332142] user_path_at_empty+0x2a/0x50 [ 1092.336298] do_mount+0x10b/0x25e0 [ 1092.339935] ? copy_mount_string+0x40/0x40 [ 1092.344173] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1092.349229] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1092.354073] ? copy_mnt_ns+0x8a0/0x8a0 [ 1092.357959] ? copy_mount_options+0x1ec/0x2e0 [ 1092.362454] ? copy_mnt_ns+0x8a0/0x8a0 [ 1092.366342] SyS_mount+0xa8/0x120 [ 1092.369791] ? copy_mnt_ns+0x8a0/0x8a0 [ 1092.373694] do_syscall_64+0x1d5/0x640 [ 1092.377586] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1092.382772] RIP: 0033:0x45f4ba 13:44:33 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:44:33 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)="03a8b751b69c2f0a80f29823813a01073de015dafbe54bd76f8f26fc45f6058c591d75ffb14d73cc26cc7e4f8a7b087db88dc7cd0557126a36cfdf2131d77122935a54500449ae2518ce56fdc74cde72f11f7e2abd934b44b7e66968c277707d02f5d5ae922836923b1af7fc880e6635ac5df437e47b899443829946737b0739e9ef0f", 0x83}], 0x1, 0x6) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1092.385988] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1092.393695] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1092.400963] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1092.408232] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1092.415497] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1092.422762] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1092.463211] hfsplus: gid requires an argument [ 1092.476508] hfsplus: unable to parse mount options 13:44:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:36 executing program 2 (fault-call:4 fault-nth:50): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:36 executing program 3 (fault-call:4 fault-nth:39): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:36 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:36 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="70617274cc957bd88e8ad8fec485280b236517453d30783030"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x28, r4, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r4, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000140)={0x1f, 0x7ff, 0x5, 0x5}) 13:44:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1094.930790] Cannot find add_set index 0 as target [ 1094.946804] FAULT_INJECTION: forcing a failure. [ 1094.946804] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.947882] FAULT_INJECTION: forcing a failure. [ 1094.947882] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.966667] hfsplus: unable to parse mount options [ 1094.995633] CPU: 1 PID: 24453 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1095.003568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.012941] Call Trace: [ 1095.016134] dump_stack+0x1b2/0x283 [ 1095.019760] should_fail.cold+0x10a/0x154 [ 1095.023902] should_failslab+0xd6/0x130 [ 1095.027878] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1095.032581] ? _copy_from_user+0x94/0x100 [ 1095.036729] ? copy_mnt_ns+0x8a0/0x8a0 [ 1095.040619] copy_mount_options+0x59/0x2e0 [ 1095.044869] ? copy_mnt_ns+0x8a0/0x8a0 [ 1095.048754] SyS_mount+0x84/0x120 [ 1095.052200] ? copy_mnt_ns+0x8a0/0x8a0 [ 1095.056081] do_syscall_64+0x1d5/0x640 [ 1095.059956] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1095.065213] RIP: 0033:0x45f4ba [ 1095.068392] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1095.076082] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1095.083350] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1095.090619] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1095.097882] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1095.105134] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1095.112421] CPU: 0 PID: 24458 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1095.120343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.129691] Call Trace: [ 1095.132275] dump_stack+0x1b2/0x283 [ 1095.135905] should_fail.cold+0x10a/0x154 [ 1095.140058] should_failslab+0xd6/0x130 [ 1095.144032] __kmalloc+0x2c1/0x400 [ 1095.147573] ? ext4_find_extent+0x772/0x9f0 [ 1095.151898] ext4_find_extent+0x772/0x9f0 [ 1095.156485] ext4_ext_map_blocks+0x16f/0x4b30 [ 1095.157754] Cannot find add_set index 0 as target [ 1095.160985] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1095.160995] ? ext4_es_lookup_extent+0x321/0xac0 [ 1095.161008] ? lock_acquire+0x170/0x3f0 [ 1095.161018] ? lock_acquire+0x170/0x3f0 [ 1095.161027] ? ext4_map_blocks+0x3c7/0x1600 [ 1095.161043] ext4_map_blocks+0xc8f/0x1600 13:44:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1095.161057] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1095.161067] ? ext4_issue_zeroout+0x150/0x150 [ 1095.161074] ? __ext4_new_inode+0x278/0x4e80 [ 1095.161090] ext4_getblk+0x98/0x3f0 [ 1095.209957] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1095.214285] ? __dquot_initialize+0x3f4/0x980 [ 1095.218798] ext4_bread+0x6c/0x1a0 [ 1095.223474] ? ext4_getblk+0x3f0/0x3f0 [ 1095.227360] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1095.232559] ? security_transition_sid+0xcb/0x120 [ 1095.237404] ? security_transition_sid+0x9d/0x120 [ 1095.242252] ext4_append+0x143/0x350 13:44:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1095.244905] Cannot find add_set index 0 as target [ 1095.245968] ext4_mkdir+0x4c9/0xb60 [ 1095.245986] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1095.246003] ? security_inode_mkdir+0xcc/0x100 [ 1095.263661] vfs_mkdir+0x3af/0x620 [ 1095.267230] SyS_mkdirat+0x1b5/0x220 [ 1095.270942] ? SyS_mknod+0x30/0x30 [ 1095.274480] ? do_syscall_64+0x4c/0x640 [ 1095.278456] ? SyS_mkdirat+0x220/0x220 [ 1095.282345] do_syscall_64+0x1d5/0x640 [ 1095.286241] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1095.291425] RIP: 0033:0x45bee7 [ 1095.294610] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1095.302320] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1095.309586] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1095.316850] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1095.324128] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1095.331392] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:36 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x1) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x3ff) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f0000000040)={0x7fffffff, 0x9, 0x200, 0x2, 0x5, "5c5f432b4816f9eff1eadd931fe666ffea3723", 0x1, 0x8}) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:36 executing program 3 (fault-call:4 fault-nth:40): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1095.343815] gfs2: not a GFS2 filesystem [ 1095.366920] Cannot find add_set index 0 as target 13:44:36 executing program 2 (fault-call:4 fault-nth:51): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1095.446887] FAULT_INJECTION: forcing a failure. [ 1095.446887] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.458363] CPU: 0 PID: 24496 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1095.466248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.470132] FAULT_INJECTION: forcing a failure. [ 1095.470132] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.475729] Call Trace: [ 1095.475750] dump_stack+0x1b2/0x283 [ 1095.493117] should_fail.cold+0x10a/0x154 [ 1095.497276] should_failslab+0xd6/0x130 [ 1095.501251] __kmalloc+0x6d/0x400 [ 1095.504711] ? context_struct_to_string+0x323/0x610 [ 1095.509744] context_struct_to_string+0x323/0x610 [ 1095.514584] ? dump_masked_av_helper+0x90/0x90 [ 1095.519181] ? sidtab_search_core+0x17f/0x2a0 [ 1095.523667] security_sid_to_context_core+0x187/0x200 [ 1095.528854] selinux_inode_init_security+0x45a/0x680 [ 1095.533958] ? ext4_get_acl+0xcb/0x500 [ 1095.537846] ? selinux_inode_create+0x30/0x30 [ 1095.542340] ? ext4_get_acl+0xd0/0x500 [ 1095.546232] security_inode_init_security+0x15f/0x320 [ 1095.551426] ? ext4_init_acl+0x190/0x190 [ 1095.555489] ? security_kernel_post_read_file+0xd0/0xd0 [ 1095.560870] ? insert_inode_locked+0x39e/0x4b0 [ 1095.565456] __ext4_new_inode+0x35ed/0x4e80 [ 1095.569797] ? ext4_free_inode+0x14a0/0x14a0 [ 1095.574197] ? avc_has_perm+0x1a4/0x320 [ 1095.578169] ? __dquot_initialize+0x3f4/0x980 [ 1095.582670] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 1095.587345] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1095.592529] ? security_transition_sid+0xcb/0x120 [ 1095.597360] ? security_transition_sid+0x9d/0x120 [ 1095.602301] ext4_mkdir+0x2e4/0xb60 [ 1095.605933] ? selinux_dentry_init_security+0x220/0x220 [ 1095.611328] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1095.616130] ? security_inode_mkdir+0xcc/0x100 [ 1095.620710] vfs_mkdir+0x3af/0x620 [ 1095.624256] SyS_mkdirat+0x1b5/0x220 [ 1095.627970] ? SyS_mknod+0x30/0x30 [ 1095.631511] ? do_syscall_64+0x4c/0x640 [ 1095.635488] ? SyS_mkdirat+0x220/0x220 [ 1095.639375] do_syscall_64+0x1d5/0x640 [ 1095.643267] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1095.648452] RIP: 0033:0x45bee7 [ 1095.651635] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1095.659337] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1095.666597] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1095.673854] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1095.681107] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1095.688366] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1095.695641] CPU: 1 PID: 24498 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1095.703534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.712919] Call Trace: [ 1095.715510] dump_stack+0x1b2/0x283 [ 1095.719147] should_fail.cold+0x10a/0x154 [ 1095.723447] should_failslab+0xd6/0x130 [ 1095.727523] __kmalloc_track_caller+0x2bc/0x400 [ 1095.732281] ? kstrdup_const+0x35/0x60 [ 1095.736170] ? lock_downgrade+0x6e0/0x6e0 [ 1095.740321] kstrdup+0x36/0x70 [ 1095.743514] kstrdup_const+0x35/0x60 [ 1095.747225] alloc_vfsmnt+0xe0/0x7c0 [ 1095.750949] vfs_kern_mount.part.0+0x27/0x3c0 [ 1095.755525] do_mount+0x3c9/0x25e0 [ 1095.759047] ? copy_mount_string+0x40/0x40 [ 1095.763260] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1095.768169] ? copy_mnt_ns+0x8a0/0x8a0 [ 1095.772037] ? copy_mount_options+0x1ec/0x2e0 [ 1095.776549] ? copy_mnt_ns+0x8a0/0x8a0 [ 1095.780428] SyS_mount+0xa8/0x120 [ 1095.783917] ? copy_mnt_ns+0x8a0/0x8a0 [ 1095.787789] do_syscall_64+0x1d5/0x640 [ 1095.791663] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1095.796831] RIP: 0033:0x45f4ba [ 1095.800002] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1095.807707] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1095.814981] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1095.822259] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1095.829575] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1095.836830] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}}, 0x78) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f00000002c0)={0x1, @sliced={0x0, [0x3, 0x7, 0x8, 0x5, 0xffff, 0x130, 0x7, 0x81, 0x9, 0x7, 0x800, 0x100, 0x0, 0xd1a4, 0x3, 0x8, 0x8, 0x6610, 0x4720, 0x7fff, 0xfffa, 0x1, 0x6, 0x5, 0x3, 0x0, 0x8, 0x7, 0xaee, 0xfe01, 0xbf, 0x20, 0x1, 0x9, 0x2, 0x9, 0x9, 0x1000, 0x2, 0x4ad4, 0x1, 0x400, 0x4, 0x7, 0x1f, 0xffff, 0x7f5, 0x101], 0x8000}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}}, 0x78) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getgroups(0x0, &(0x7f0000000140)) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid'}}]}) 13:44:39 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 13:44:39 executing program 3 (fault-call:4 fault-nth:41): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:39 executing program 2 (fault-call:4 fault-nth:52): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1097.959506] Cannot find add_set index 0 as target [ 1097.979732] hfsplus: unable to find HFS+ superblock [ 1097.989636] FAULT_INJECTION: forcing a failure. [ 1097.989636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1098.001457] CPU: 1 PID: 24521 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1098.002856] FAULT_INJECTION: forcing a failure. [ 1098.002856] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.009348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.009353] Call Trace: [ 1098.009372] dump_stack+0x1b2/0x283 [ 1098.009392] should_fail.cold+0x10a/0x154 [ 1098.041459] ? unwind_next_frame+0xe38/0x1700 [ 1098.045978] __alloc_pages_nodemask+0x22b/0x2730 [ 1098.050728] ? is_bpf_text_address+0xa3/0x120 [ 1098.055211] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1098.060049] ? trace_hardirqs_on+0x10/0x10 [ 1098.064287] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 1098.068773] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1098.073352] ? kmem_cache_alloc_trace+0x14d/0x3f0 [ 1098.078179] ? copy_mount_options+0x59/0x2e0 [ 1098.082570] ? SyS_mount+0x84/0x120 [ 1098.086187] cache_grow_begin+0x91/0x410 [ 1098.090245] cache_alloc_refill+0x28c/0x360 [ 1098.094566] kmem_cache_alloc+0x333/0x3c0 [ 1098.098716] getname_flags+0xc8/0x550 [ 1098.102504] user_path_at_empty+0x2a/0x50 [ 1098.106636] do_mount+0x10b/0x25e0 [ 1098.110170] ? copy_mount_string+0x40/0x40 [ 1098.114399] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1098.120198] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1098.125024] ? copy_mnt_ns+0x8a0/0x8a0 [ 1098.128900] ? copy_mount_options+0x1ec/0x2e0 [ 1098.133376] ? copy_mnt_ns+0x8a0/0x8a0 [ 1098.137270] SyS_mount+0xa8/0x120 [ 1098.140708] ? copy_mnt_ns+0x8a0/0x8a0 [ 1098.144581] do_syscall_64+0x1d5/0x640 [ 1098.148464] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1098.153636] RIP: 0033:0x45f4ba [ 1098.156811] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1098.164600] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1098.171853] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 13:44:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1098.179143] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1098.186399] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1098.193671] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1098.200940] CPU: 0 PID: 24526 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1098.208823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.219388] Call Trace: [ 1098.221986] dump_stack+0x1b2/0x283 [ 1098.222506] Cannot find add_set index 0 as target [ 1098.225657] should_fail.cold+0x10a/0x154 [ 1098.225671] should_failslab+0xd6/0x130 [ 1098.225682] __kmalloc+0x2c1/0x400 [ 1098.242133] ? ext4_find_extent+0x772/0x9f0 [ 1098.246459] ext4_find_extent+0x772/0x9f0 [ 1098.250613] ext4_ext_map_blocks+0x16f/0x4b30 [ 1098.256332] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1098.261384] ? ext4_es_lookup_extent+0x321/0xac0 [ 1098.266143] ? lock_acquire+0x170/0x3f0 [ 1098.268081] ptrace attach of "/root/syz-executor.5"[24539] was attempted by "/root/syz-executor.5"[24540] [ 1098.270117] ? lock_acquire+0x170/0x3f0 [ 1098.270128] ? ext4_map_blocks+0x3c7/0x1600 [ 1098.270142] ext4_map_blocks+0xc8f/0x1600 [ 1098.292248] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1098.297150] gfs2: not a GFS2 filesystem [ 1098.297706] ? ext4_issue_zeroout+0x150/0x150 [ 1098.297716] ? __ext4_new_inode+0x278/0x4e80 [ 1098.297732] ext4_getblk+0x98/0x3f0 [ 1098.314186] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1098.318549] ? __dquot_initialize+0x3f4/0x980 [ 1098.323046] ext4_bread+0x6c/0x1a0 [ 1098.326588] ? ext4_getblk+0x3f0/0x3f0 [ 1098.330476] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1098.335673] ? security_transition_sid+0xcb/0x120 [ 1098.340514] ? security_transition_sid+0x9d/0x120 [ 1098.345363] ext4_append+0x143/0x350 [ 1098.349082] ext4_mkdir+0x4c9/0xb60 [ 1098.352715] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1098.357489] ? security_inode_mkdir+0xcc/0x100 [ 1098.362071] vfs_mkdir+0x3af/0x620 [ 1098.365616] SyS_mkdirat+0x1b5/0x220 [ 1098.369357] ? SyS_mknod+0x30/0x30 [ 1098.372900] ? do_syscall_64+0x4c/0x640 [ 1098.376855] ? SyS_mkdirat+0x220/0x220 [ 1098.380733] do_syscall_64+0x1d5/0x640 [ 1098.384609] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1098.389779] RIP: 0033:0x45bee7 [ 1098.392949] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1098.400636] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1098.407891] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1098.415153] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1098.422413] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 13:44:39 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) getsockname$l2tp6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1098.429736] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:39 executing program 2 (fault-call:4 fault-nth:53): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1098.458511] gfs2: not a GFS2 filesystem 13:44:39 executing program 3 (fault-call:4 fault-nth:42): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000040)={0x0, 0xe02, 0x5, 0x4, &(0x7f0000ffb000/0x4000)=nil, 0xb2}) getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r3, @ANYBLOB=',\b']) [ 1098.519014] FAULT_INJECTION: forcing a failure. [ 1098.519014] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1098.535538] Cannot find add_set index 0 as target [ 1098.538096] CPU: 0 PID: 24554 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1098.548288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.557641] Call Trace: [ 1098.560233] dump_stack+0x1b2/0x283 [ 1098.563867] should_fail.cold+0x10a/0x154 13:44:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1098.568021] __alloc_pages_nodemask+0x22b/0x2730 [ 1098.572784] ? lock_downgrade+0x6e0/0x6e0 [ 1098.576936] ? _find_next_bit+0xdb/0x100 [ 1098.580996] ? pcpu_alloc+0x37d/0xf70 [ 1098.584796] ? __mutex_unlock_slowpath+0x75/0x780 [ 1098.589638] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1098.594497] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1098.599528] ? pcpu_alloc+0xe1/0xf70 [ 1098.603253] alloc_pages_current+0xe7/0x1e0 [ 1098.607660] ? __lockdep_init_map+0x100/0x560 [ 1098.612155] __get_free_pages+0xb/0x40 [ 1098.616040] mount_fs+0x1c7/0x2a0 [ 1098.619495] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1098.621257] Cannot find add_set index 0 as target [ 1098.623992] do_mount+0x3c9/0x25e0 [ 1098.624008] ? copy_mount_string+0x40/0x40 [ 1098.624020] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1098.624029] ? copy_mnt_ns+0x8a0/0x8a0 [ 1098.624038] ? copy_mount_options+0x1ec/0x2e0 [ 1098.624048] ? copy_mnt_ns+0x8a0/0x8a0 [ 1098.653677] SyS_mount+0xa8/0x120 [ 1098.657132] ? copy_mnt_ns+0x8a0/0x8a0 [ 1098.661022] do_syscall_64+0x1d5/0x640 13:44:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1098.664915] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1098.670099] RIP: 0033:0x45f4ba [ 1098.673285] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1098.680987] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1098.688266] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1098.695538] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1098.702805] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1098.710068] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1098.724063] hfsplus: gid requires an argument [ 1098.729138] hfsplus: unable to parse mount options [ 1098.745982] FAULT_INJECTION: forcing a failure. [ 1098.745982] name failslab, interval 1, probability 0, space 0, times 0 13:44:40 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r3, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000040)=0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1098.770283] CPU: 0 PID: 24562 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1098.778181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.787533] Call Trace: [ 1098.790121] dump_stack+0x1b2/0x283 [ 1098.793755] should_fail.cold+0x10a/0x154 [ 1098.797910] should_failslab+0xd6/0x130 [ 1098.801887] __kmalloc+0x2c1/0x400 [ 1098.805427] ? ext4_find_extent+0x772/0x9f0 [ 1098.809756] ext4_find_extent+0x772/0x9f0 [ 1098.813912] ext4_ext_map_blocks+0x16f/0x4b30 [ 1098.818414] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1098.823517] ? ext4_es_lookup_extent+0x321/0xac0 [ 1098.828279] ? lock_acquire+0x170/0x3f0 [ 1098.832257] ? lock_acquire+0x170/0x3f0 [ 1098.832894] Cannot find add_set index 0 as target [ 1098.836228] ? ext4_map_blocks+0x3c7/0x1600 [ 1098.836247] ext4_map_blocks+0xc8f/0x1600 [ 1098.836263] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1098.836274] ? ext4_issue_zeroout+0x150/0x150 [ 1098.836285] ? __ext4_new_inode+0x278/0x4e80 [ 1098.863883] ext4_getblk+0x98/0x3f0 [ 1098.867517] ? ext4_iomap_begin+0x7f0/0x7f0 13:44:40 executing program 2 (fault-call:4 fault-nth:54): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) [ 1098.871929] ? __dquot_initialize+0x3f4/0x980 [ 1098.876428] ext4_bread+0x6c/0x1a0 [ 1098.879967] ? ext4_getblk+0x3f0/0x3f0 [ 1098.883855] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1098.889044] ? security_transition_sid+0xcb/0x120 [ 1098.893887] ? security_transition_sid+0x9d/0x120 [ 1098.898733] ext4_append+0x143/0x350 [ 1098.902449] ext4_mkdir+0x4c9/0xb60 [ 1098.906081] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1098.910756] ? security_inode_mkdir+0xcc/0x100 [ 1098.915339] vfs_mkdir+0x3af/0x620 [ 1098.918881] SyS_mkdirat+0x1b5/0x220 [ 1098.922597] ? SyS_mknod+0x30/0x30 [ 1098.926138] ? do_syscall_64+0x4c/0x640 [ 1098.930111] ? SyS_mkdirat+0x220/0x220 [ 1098.933999] do_syscall_64+0x1d5/0x640 [ 1098.937890] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1098.943162] RIP: 0033:0x45bee7 [ 1098.946349] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1098.956149] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1098.963414] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 13:44:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1098.970679] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1098.978038] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1098.985307] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1099.001007] gfs2: not a GFS2 filesystem 13:44:40 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000100)) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000040)="150d34065a86661a0ce5da50d750685b599c141ec89f4316cf33b68032236402ef6a15621f63ed5ffe2ad6b85678230c16042c9be35e129d1908a7a625efaf66cf8147255fdf50ffef6509eb9a23557f2c9f7b0d349845548a093f74b1dc1b", 0x5f) r3 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r6, 0xc008551c, &(0x7f0000000000)={0x5, 0x24, [0x6, 0x3, 0x2, 0x6, 0x2, 0x6, 0x60, 0x800, 0x5baa3fc1]}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000af9ff0)) 13:44:40 executing program 3 (fault-call:4 fault-nth:43): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1099.063888] hfsplus: gid requires an argument [ 1099.083701] Cannot find add_set index 0 as target [ 1099.095337] hfsplus: unable to parse mount options [ 1099.108416] FAULT_INJECTION: forcing a failure. [ 1099.108416] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1099.120674] CPU: 1 PID: 24605 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1099.128567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.137918] Call Trace: [ 1099.140510] dump_stack+0x1b2/0x283 [ 1099.144143] should_fail.cold+0x10a/0x154 [ 1099.148386] __alloc_pages_nodemask+0x22b/0x2730 [ 1099.153146] ? lock_downgrade+0x6e0/0x6e0 [ 1099.157294] ? _find_next_bit+0xdb/0x100 [ 1099.161355] ? pcpu_alloc+0x37d/0xf70 [ 1099.165154] ? __mutex_unlock_slowpath+0x75/0x780 [ 1099.170003] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1099.174851] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1099.179866] ? pcpu_alloc+0xe1/0xf70 [ 1099.183587] alloc_pages_current+0xe7/0x1e0 [ 1099.187902] ? __lockdep_init_map+0x100/0x560 [ 1099.192401] __get_free_pages+0xb/0x40 [ 1099.196289] mount_fs+0x1c7/0x2a0 [ 1099.199743] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1099.204241] do_mount+0x3c9/0x25e0 [ 1099.205546] FAULT_INJECTION: forcing a failure. [ 1099.205546] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.207778] ? copy_mount_string+0x40/0x40 [ 1099.207789] ? copy_mount_options+0x17d/0x2e0 [ 1099.207796] ? copy_mount_options+0x183/0x2e0 [ 1099.207809] ? copy_mount_options+0x1ec/0x2e0 [ 1099.236631] ? copy_mnt_ns+0x8a0/0x8a0 [ 1099.240503] SyS_mount+0xa8/0x120 [ 1099.243936] ? copy_mnt_ns+0x8a0/0x8a0 [ 1099.247807] do_syscall_64+0x1d5/0x640 [ 1099.251681] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1099.256849] RIP: 0033:0x45f4ba [ 1099.260023] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1099.267712] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1099.274965] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1099.282219] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1099.289642] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1099.296913] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1099.304181] CPU: 0 PID: 24608 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1099.312412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.321761] Call Trace: [ 1099.324351] dump_stack+0x1b2/0x283 [ 1099.328070] should_fail.cold+0x10a/0x154 [ 1099.332222] should_failslab+0xd6/0x130 [ 1099.336195] kmem_cache_alloc+0x28e/0x3c0 [ 1099.340344] ext4_mb_new_blocks+0x51f/0x3a50 [ 1099.344756] ? ext4_ext_search_right+0x2bc/0xaa0 [ 1099.349531] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 1099.355431] ext4_ext_map_blocks+0x24a9/0x4b30 [ 1099.360019] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1099.365033] ? ext4_es_lookup_extent+0x321/0xac0 [ 1099.369792] ? ext4_map_blocks+0x5c6/0x1600 [ 1099.374123] ext4_map_blocks+0x7ea/0x1600 [ 1099.378277] ? ext4_issue_zeroout+0x150/0x150 [ 1099.382769] ? __ext4_new_inode+0x278/0x4e80 [ 1099.387188] ext4_getblk+0x98/0x3f0 [ 1099.390817] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1099.395273] ? __dquot_initialize+0x3f4/0x980 [ 1099.399751] ext4_bread+0x6c/0x1a0 [ 1099.403279] ? ext4_getblk+0x3f0/0x3f0 [ 1099.407151] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1099.412328] ? security_transition_sid+0xcb/0x120 [ 1099.417151] ? security_transition_sid+0x9d/0x120 [ 1099.421973] ext4_append+0x143/0x350 [ 1099.425677] ext4_mkdir+0x4c9/0xb60 [ 1099.429445] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1099.434103] ? security_inode_mkdir+0xcc/0x100 [ 1099.438671] vfs_mkdir+0x3af/0x620 [ 1099.442195] SyS_mkdirat+0x1b5/0x220 [ 1099.446084] ? SyS_mknod+0x30/0x30 [ 1099.449622] ? do_syscall_64+0x4c/0x640 [ 1099.453595] ? SyS_mkdirat+0x220/0x220 [ 1099.457468] do_syscall_64+0x1d5/0x640 [ 1099.461340] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1099.466510] RIP: 0033:0x45bee7 [ 1099.469766] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1099.477458] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1099.484709] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1099.491983] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1099.499239] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1099.506502] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:42 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="41c64817", @ANYRESHEX=r0, @ANYBLOB=',\x00']) 13:44:42 executing program 3 (fault-call:4 fault-nth:44): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:42 executing program 2 (fault-call:4 fault-nth:55): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:42 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000000)={0x10000, 0x10000, 0x4, 0x40, 0x5}) [ 1101.509162] FAULT_INJECTION: forcing a failure. [ 1101.509162] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.511085] Cannot find add_set index 0 as target [ 1101.520427] CPU: 1 PID: 24635 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1101.520434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.520438] Call Trace: [ 1101.520456] dump_stack+0x1b2/0x283 [ 1101.520473] should_fail.cold+0x10a/0x154 [ 1101.520489] should_failslab+0xd6/0x130 [ 1101.520501] kmem_cache_alloc+0x40/0x3c0 [ 1101.520513] __es_insert_extent+0x241/0xe20 [ 1101.520527] ext4_es_insert_extent+0x1b9/0x530 [ 1101.569758] ? lock_downgrade+0x6e0/0x6e0 [ 1101.573909] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1101.579411] FAULT_INJECTION: forcing a failure. [ 1101.579411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1101.579711] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1101.596937] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1101.601953] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 1101.607750] ext4_ext_put_gap_in_cache+0xbb/0xf0 [ 1101.612506] ? ext4_zeroout_es+0x160/0x160 [ 1101.616742] ? ext4_find_extent+0x66a/0x9f0 [ 1101.621070] ext4_ext_map_blocks+0x1bbf/0x4b30 [ 1101.625658] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1101.630665] ? ext4_es_lookup_extent+0x321/0xac0 [ 1101.632143] Cannot find add_set index 0 as target [ 1101.635415] ? lock_acquire+0x170/0x3f0 [ 1101.635427] ? lock_acquire+0x170/0x3f0 [ 1101.635438] ? ext4_map_blocks+0x3c7/0x1600 [ 1101.652560] ext4_map_blocks+0xc8f/0x1600 [ 1101.656700] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1101.662143] ? ext4_issue_zeroout+0x150/0x150 [ 1101.666630] ? __ext4_new_inode+0x278/0x4e80 [ 1101.671037] ext4_getblk+0x98/0x3f0 [ 1101.674659] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1101.678976] ? __dquot_initialize+0x3f4/0x980 [ 1101.683470] ext4_bread+0x6c/0x1a0 [ 1101.687006] ? ext4_getblk+0x3f0/0x3f0 [ 1101.690891] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1101.696083] ? security_transition_sid+0xcb/0x120 [ 1101.700924] ? security_transition_sid+0x9d/0x120 [ 1101.705770] ext4_append+0x143/0x350 [ 1101.709489] ext4_mkdir+0x4c9/0xb60 [ 1101.713116] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1101.717782] ? security_inode_mkdir+0xcc/0x100 [ 1101.722363] vfs_mkdir+0x3af/0x620 [ 1101.725897] SyS_mkdirat+0x1b5/0x220 [ 1101.729607] ? SyS_mknod+0x30/0x30 [ 1101.729965] Cannot find add_set index 0 as target [ 1101.733151] ? do_syscall_64+0x4c/0x640 [ 1101.733161] ? SyS_mkdirat+0x220/0x220 [ 1101.733172] do_syscall_64+0x1d5/0x640 [ 1101.733188] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1101.754882] RIP: 0033:0x45bee7 [ 1101.758063] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1101.765761] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1101.773036] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1101.780298] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1101.787656] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1101.794923] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1101.802200] CPU: 0 PID: 24645 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 13:44:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:43 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_DRAIN(r5, 0x4144, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1101.810089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.819439] Call Trace: [ 1101.822033] dump_stack+0x1b2/0x283 [ 1101.825149] hfsplus: unable to parse mount options [ 1101.825662] should_fail.cold+0x10a/0x154 [ 1101.825679] __alloc_pages_nodemask+0x22b/0x2730 [ 1101.825694] ? lock_downgrade+0x6e0/0x6e0 [ 1101.834494] gfs2: not a GFS2 filesystem [ 1101.834741] ? _find_next_bit+0xdb/0x100 [ 1101.851883] ? pcpu_alloc+0x37d/0xf70 [ 1101.855688] ? __mutex_unlock_slowpath+0x75/0x780 13:44:43 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000000)={0x80000, 0x9, 0x4, 0x0, 0x14, {0x0, 0xea60}, {0x4, 0x8, 0x3f, 0x3f, 0x0, 0x1, "ea06196b"}, 0x2, 0x2, @offset=0xba, 0x3, 0x0, r1}) ioctl$DRM_IOCTL_CONTROL(r6, 0x40086414, &(0x7f0000000080)={0x2, 0x80000000}) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1101.860536] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1101.865473] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1101.870493] ? pcpu_alloc+0xe1/0xf70 [ 1101.874222] alloc_pages_current+0xe7/0x1e0 [ 1101.878543] ? __lockdep_init_map+0x100/0x560 [ 1101.883166] __get_free_pages+0xb/0x40 [ 1101.887056] mount_fs+0x1c7/0x2a0 [ 1101.890515] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1101.895026] do_mount+0x3c9/0x25e0 [ 1101.897018] Cannot find add_set index 0 as target [ 1101.898571] ? copy_mount_string+0x40/0x40 [ 1101.898583] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1101.898592] ? copy_mnt_ns+0x8a0/0x8a0 [ 1101.898604] ? copy_mount_options+0x1ec/0x2e0 [ 1101.898613] ? copy_mnt_ns+0x8a0/0x8a0 [ 1101.898624] SyS_mount+0xa8/0x120 [ 1101.898632] ? copy_mnt_ns+0x8a0/0x8a0 [ 1101.898644] do_syscall_64+0x1d5/0x640 [ 1101.898659] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1101.898666] RIP: 0033:0x45f4ba [ 1101.898671] RSP: 002b:00007f21c56d8a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1101.898681] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba 13:44:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1101.898686] RDX: 00007f21c56d8ae0 RSI: 0000000020000fc0 RDI: 00007f21c56d8b00 [ 1101.898691] RBP: 000000000078bfa0 R08: 00007f21c56d8b40 R09: 00007f21c56d8ae0 [ 1101.898695] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 1101.898700] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56d96d4 [ 1102.073255] Cannot find add_set index 0 as target 13:44:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:45 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x3938700}}, &(0x7f0000af9ff0)) 13:44:45 executing program 3 (fault-call:4 fault-nth:45): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:45 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x800, 0x0, 0x0, 0x0, &(0x7f0000000000)) 13:44:45 executing program 2 (fault-call:4 fault-nth:56): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:46 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_PPC_GET_SMMU_INFO(r4, 0x8250aea6, &(0x7f0000000000)=""/100) r5 = dup(r1) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x128, 0x1403, 0x202, 0x70bd2b, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip_vti0\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'batadv0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'netpci0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'syz_tun\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'batadv_slave_0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_vlan\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond_slave_0\x00'}}]}, 0x128}, 0x1, 0x0, 0x0, 0x4}, 0x20000010) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1104.552385] Cannot find add_set index 0 as target [ 1104.552628] hfsplus: unable to find HFS+ superblock [ 1104.572703] FAULT_INJECTION: forcing a failure. [ 1104.572703] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.581128] FAULT_INJECTION: forcing a failure. [ 1104.581128] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.584281] CPU: 0 PID: 24693 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1104.603995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.613345] Call Trace: [ 1104.615936] dump_stack+0x1b2/0x283 [ 1104.619917] should_fail.cold+0x10a/0x154 [ 1104.624075] should_failslab+0xd6/0x130 [ 1104.628061] kmem_cache_alloc+0x40/0x3c0 [ 1104.632125] __es_insert_extent+0x241/0xe20 [ 1104.636449] ext4_es_insert_extent+0x1b9/0x530 [ 1104.641027] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1104.646835] ext4_map_blocks+0x9f6/0x1600 [ 1104.650992] ? ext4_issue_zeroout+0x150/0x150 [ 1104.655479] ? __ext4_new_inode+0x278/0x4e80 [ 1104.659888] ext4_getblk+0x98/0x3f0 [ 1104.663517] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1104.667840] ? __dquot_initialize+0x3f4/0x980 [ 1104.672337] ext4_bread+0x6c/0x1a0 [ 1104.675869] ? ext4_getblk+0x3f0/0x3f0 [ 1104.679737] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1104.684911] ? security_transition_sid+0xcb/0x120 [ 1104.689735] ? security_transition_sid+0x9d/0x120 [ 1104.694561] ext4_append+0x143/0x350 [ 1104.698257] ext4_mkdir+0x4c9/0xb60 [ 1104.701883] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1104.706534] ? security_inode_mkdir+0xcc/0x100 [ 1104.711231] vfs_mkdir+0x3af/0x620 [ 1104.714765] SyS_mkdirat+0x1b5/0x220 [ 1104.718473] ? SyS_mknod+0x30/0x30 [ 1104.721996] ? do_syscall_64+0x4c/0x640 [ 1104.725980] ? SyS_mkdirat+0x220/0x220 [ 1104.729851] do_syscall_64+0x1d5/0x640 [ 1104.733728] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1104.738900] RIP: 0033:0x45bee7 [ 1104.742072] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1104.749763] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1104.757014] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1104.764265] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1104.771518] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1104.778771] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1104.786038] CPU: 1 PID: 24691 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1104.793919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.803269] Call Trace: [ 1104.805858] dump_stack+0x1b2/0x283 [ 1104.805861] gfs2: not a GFS2 filesystem [ 1104.813441] should_fail.cold+0x10a/0x154 [ 1104.817595] should_failslab+0xd6/0x130 [ 1104.821551] kmem_cache_alloc+0x28e/0x3c0 [ 1104.825696] getname_kernel+0x4e/0x340 [ 1104.829574] kern_path+0x1b/0x40 [ 1104.832920] lookup_bdev.part.0+0x60/0x160 [ 1104.837153] ? blkdev_open+0x250/0x250 [ 1104.841028] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1104.846028] blkdev_get_by_path+0x70/0xf0 [ 1104.850173] gfs2_mount+0x9d/0x4f3 [ 1104.853693] ? fill_super+0x22a0/0x22a0 [ 1104.857664] ? debug_object_activate+0x450/0x450 [ 1104.862403] ? free_hot_cold_page+0x879/0xc90 [ 1104.866880] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1104.871888] ? selinux_sb_copy_data+0x206/0x380 [ 1104.876667] mount_fs+0x92/0x2a0 [ 1104.880039] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1104.884521] do_mount+0x3c9/0x25e0 [ 1104.888053] ? copy_mount_string+0x40/0x40 [ 1104.892273] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1104.897099] ? copy_mnt_ns+0x8a0/0x8a0 [ 1104.900971] ? copy_mount_options+0x1ec/0x2e0 [ 1104.905449] ? copy_mnt_ns+0x8a0/0x8a0 [ 1104.909334] SyS_mount+0xa8/0x120 [ 1104.912770] ? copy_mnt_ns+0x8a0/0x8a0 [ 1104.916640] do_syscall_64+0x1d5/0x640 [ 1104.920516] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1104.925687] RIP: 0033:0x45f4ba [ 1104.928860] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1104.936689] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1104.943947] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 13:44:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1104.951206] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1104.958476] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1104.965742] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:46 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}}, 0x78) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x100000001, 0x20100) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000140)=0x4, 0x4) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="e3257000f8e268a28173735552fec9b5af30a04a87705b5ae96c32e2b5f377b5071e6e7ad5f3be1d08000000e50ff320c14d5636a8d75db4daa220ad2d18ef42cd221a7bed3f57c2113f6e7a659daf422a52f4c23a55ca3fc9d5d304961e4b7eb39b502464a300920a94fd5e07a7a127114e2f908da09ae1af36e24aca33329d28f87edbce024a88fce808066fb2880891f7814feb72149b04ba0b89e0e7536479c74ba67cb8a46f4da98b144b33c8b02f44474a8e775e5da73eb83a7b1e3c75bdad40d8362e9b41845a7a07f09de965258af481cefc84db24e8a2", @ANYRESHEX=r0, @ANYBLOB=',gid=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) 13:44:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1105.002924] Cannot find add_set index 0 as target 13:44:46 executing program 3 (fault-call:4 fault-nth:46): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) [ 1105.063779] hfsplus: unable to parse mount options [ 1105.081289] FAULT_INJECTION: forcing a failure. [ 1105.081289] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.092574] CPU: 1 PID: 24723 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1105.100460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.109810] Call Trace: 13:44:46 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x100000110) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000200)='./file0\x00', r6}, 0x10) r7 = epoll_create(0x2000007) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0xb0000001}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) epoll_wait(r7, &(0x7f0000000100)=[{}], 0x1, 0x2dd) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000180)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x20}, 0x1, 0x800000000000000}, 0x0) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1105.112400] dump_stack+0x1b2/0x283 [ 1105.116036] should_fail.cold+0x10a/0x154 [ 1105.120188] should_failslab+0xd6/0x130 [ 1105.120725] Cannot find add_set index 0 as target [ 1105.124157] kmem_cache_alloc+0x40/0x3c0 [ 1105.124173] __es_insert_extent+0x241/0xe20 [ 1105.124191] ext4_es_insert_extent+0x1b9/0x530 [ 1105.141938] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 1105.147833] ext4_map_blocks+0x9f6/0x1600 [ 1105.151990] ? ext4_issue_zeroout+0x150/0x150 [ 1105.156482] ? __ext4_new_inode+0x278/0x4e80 [ 1105.160992] ext4_getblk+0x98/0x3f0 [ 1105.165343] ? ext4_iomap_begin+0x7f0/0x7f0 [ 1105.169664] ? __dquot_initialize+0x3f4/0x980 [ 1105.174158] ext4_bread+0x6c/0x1a0 [ 1105.177698] ? ext4_getblk+0x3f0/0x3f0 [ 1105.181584] ? inode_get_rsv_space.part.0+0x100/0x100 [ 1105.186777] ? security_transition_sid+0xcb/0x120 [ 1105.191623] ? security_transition_sid+0x9d/0x120 [ 1105.196466] ext4_append+0x143/0x350 [ 1105.200192] ext4_mkdir+0x4c9/0xb60 [ 1105.203822] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 1105.208490] ? security_inode_mkdir+0xcc/0x100 [ 1105.213676] vfs_mkdir+0x3af/0x620 [ 1105.217218] SyS_mkdirat+0x1b5/0x220 [ 1105.220930] ? SyS_mknod+0x30/0x30 [ 1105.224470] ? do_syscall_64+0x4c/0x640 [ 1105.228528] ? SyS_mkdirat+0x220/0x220 [ 1105.232414] do_syscall_64+0x1d5/0x640 [ 1105.236307] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1105.241491] RIP: 0033:0x45bee7 [ 1105.244673] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1105.252380] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045bee7 [ 1105.259648] RDX: 0000000000000008 RSI: 00000000000001ff RDI: 0000000020000040 [ 1105.266918] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 1105.274187] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1105.281459] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1105.322836] gfs2: not a GFS2 filesystem [ 1105.354616] hfsplus: unable to parse mount options 13:44:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:49 executing program 2 (fault-call:4 fault-nth:57): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:49 executing program 3 (fault-call:4 fault-nth:47): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:49 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8301, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f00000002c0)={0x7, {{0xa, 0x4e20, 0x0, @mcast1, 0x4}}}, 0x88) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RWALK(r4, &(0x7f0000000040)={0x16, 0x6f, 0x1, {0x1, [{0x10, 0x4, 0x2}]}}, 0x16) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')GPL'}}]}}) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@uid={'uid', 0x3d, r0}}]}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet_dccp_int(r5, 0x21, 0x6, &(0x7f0000000380)=0x58574120, 0x4) 13:44:49 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x1, 0x4) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=r3) ptrace$getregs(0xc, r3, 0x101, &(0x7f0000000000)=""/85) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1107.576394] FAULT_INJECTION: forcing a failure. [ 1107.576394] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.594711] hfsplus: unable to find HFS+ superblock [ 1107.599490] FAULT_INJECTION: forcing a failure. [ 1107.599490] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.607559] Cannot find add_set index 0 as target [ 1107.618611] CPU: 0 PID: 24758 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 13:44:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1107.626508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.636206] Call Trace: [ 1107.638799] dump_stack+0x1b2/0x283 [ 1107.642440] should_fail.cold+0x10a/0x154 [ 1107.646593] should_failslab+0xd6/0x130 [ 1107.650570] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1107.655241] ? set_gfs2_super+0x110/0x110 [ 1107.659393] selinux_sb_alloc_security+0x41/0x210 [ 1107.664239] security_sb_alloc+0x66/0xa0 [ 1107.668306] sget_userns+0x194/0xc30 [ 1107.672019] ? set_gfs2_super+0x110/0x110 [ 1107.676168] ? gfs2_open+0x170/0x170 [ 1107.679962] ? set_gfs2_super+0x110/0x110 [ 1107.684089] ? gfs2_open+0x170/0x170 [ 1107.687792] sget+0xd1/0x110 [ 1107.690802] gfs2_mount+0x10f/0x4f3 [ 1107.694408] ? fill_super+0x22a0/0x22a0 [ 1107.698970] ? debug_object_activate+0x450/0x450 [ 1107.703714] ? free_hot_cold_page+0x879/0xc90 [ 1107.708195] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1107.713197] ? selinux_sb_copy_data+0x206/0x380 [ 1107.717922] mount_fs+0x92/0x2a0 [ 1107.721328] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1107.725804] do_mount+0x3c9/0x25e0 [ 1107.729358] ? copy_mount_string+0x40/0x40 [ 1107.733580] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1107.738460] ? copy_mnt_ns+0x8a0/0x8a0 [ 1107.742327] ? copy_mount_options+0x1ec/0x2e0 [ 1107.746801] ? copy_mnt_ns+0x8a0/0x8a0 [ 1107.750667] SyS_mount+0xa8/0x120 [ 1107.754272] ? copy_mnt_ns+0x8a0/0x8a0 [ 1107.758141] do_syscall_64+0x1d5/0x640 [ 1107.762014] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1107.767182] RIP: 0033:0x45f4ba [ 1107.770373] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1107.778075] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1107.785340] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1107.792589] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1107.799859] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1107.807109] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1107.816994] CPU: 0 PID: 24759 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 13:44:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1107.824885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.834243] Call Trace: [ 1107.837099] dump_stack+0x1b2/0x283 [ 1107.840745] should_fail.cold+0x10a/0x154 [ 1107.844901] should_failslab+0xd6/0x130 [ 1107.848883] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1107.853554] ? _copy_from_user+0x94/0x100 [ 1107.857708] ? copy_mnt_ns+0x8a0/0x8a0 [ 1107.861605] copy_mount_options+0x59/0x2e0 [ 1107.865838] ? copy_mnt_ns+0x8a0/0x8a0 [ 1107.869746] SyS_mount+0x84/0x120 [ 1107.873210] ? copy_mnt_ns+0x8a0/0x8a0 [ 1107.877447] do_syscall_64+0x1d5/0x640 [ 1107.881345] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1107.886533] RIP: 0033:0x45f4ba [ 1107.889721] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1107.897611] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1107.904969] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1107.912238] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 [ 1107.919505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 13:44:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1107.926770] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1107.946598] Cannot find add_set index 0 as target 13:44:49 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='bond_slave_0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(r4, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000180)={r7}, 0x8) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:44:49 executing program 3 (fault-call:4 fault-nth:48): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:49 executing program 2 (fault-call:4 fault-nth:58): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1108.083498] hfsplus: gid requires an argument [ 1108.102576] hfsplus: unable to parse mount options [ 1108.150077] FAULT_INJECTION: forcing a failure. [ 1108.150077] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.152840] FAULT_INJECTION: forcing a failure. [ 1108.152840] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.185383] CPU: 0 PID: 24816 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1108.193287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.202636] Call Trace: [ 1108.205242] dump_stack+0x1b2/0x283 [ 1108.208869] should_fail.cold+0x10a/0x154 [ 1108.213034] should_failslab+0xd6/0x130 [ 1108.217007] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1108.221675] ? _copy_from_user+0x94/0x100 [ 1108.225844] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.229733] copy_mount_options+0x59/0x2e0 [ 1108.233961] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.237835] SyS_mount+0x84/0x120 [ 1108.241282] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.245163] do_syscall_64+0x1d5/0x640 [ 1108.250535] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1108.255714] RIP: 0033:0x45f4ba [ 1108.258891] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1108.266591] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1108.273846] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1108.281109] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 [ 1108.288376] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1108.295635] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1108.313380] CPU: 1 PID: 24815 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1108.321285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.330633] Call Trace: [ 1108.333221] dump_stack+0x1b2/0x283 [ 1108.336852] should_fail.cold+0x10a/0x154 [ 1108.341172] should_failslab+0xd6/0x130 [ 1108.345128] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1108.349789] ? set_gfs2_super+0x110/0x110 [ 1108.353939] sget_userns+0x102/0xc30 [ 1108.357649] ? set_gfs2_super+0x110/0x110 [ 1108.361797] ? gfs2_open+0x170/0x170 [ 1108.365508] ? set_gfs2_super+0x110/0x110 [ 1108.369824] ? gfs2_open+0x170/0x170 [ 1108.373533] sget+0xd1/0x110 [ 1108.376555] gfs2_mount+0x10f/0x4f3 [ 1108.380180] ? fill_super+0x22a0/0x22a0 [ 1108.384150] ? debug_object_activate+0x450/0x450 [ 1108.388908] ? free_hot_cold_page+0x879/0xc90 [ 1108.393404] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1108.398429] ? selinux_sb_copy_data+0x206/0x380 [ 1108.403107] mount_fs+0x92/0x2a0 [ 1108.406478] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1108.410974] do_mount+0x3c9/0x25e0 [ 1108.414517] ? copy_mount_string+0x40/0x40 [ 1108.418748] ? copy_mount_options+0x140/0x2e0 [ 1108.423242] ? __sanitizer_cov_trace_pc+0x3d/0x50 [ 1108.428088] ? copy_mount_options+0x1ec/0x2e0 [ 1108.432577] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.436466] SyS_mount+0xa8/0x120 [ 1108.439914] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.443802] do_syscall_64+0x1d5/0x640 13:44:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1108.447692] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1108.452878] RIP: 0033:0x45f4ba [ 1108.456062] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1108.463768] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1108.471034] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1108.478299] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1108.485565] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1108.492828] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:50 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x440400, 0x0) getsockname$l2tp(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x10) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r0}}]}) 13:44:50 executing program 3 (fault-call:4 fault-nth:49): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:50 executing program 2 (fault-call:4 fault-nth:59): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r2, 0xc1004110, &(0x7f0000000040)={0xca50, [0x200, 0x7fffffff, 0x8000], [{0x10001, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x3, 0x3, 0x0, 0x1, 0x1}, {0x7, 0x4, 0x0, 0x0, 0x1}, {0xffffffff, 0x9, 0x0, 0x0, 0x1, 0x1}, {0x80, 0x3, 0x0, 0x1, 0x1}, {0x8, 0x31fa, 0x1, 0x1, 0x1}, {0x3, 0x1, 0x0, 0x0, 0x1, 0x1}, {0x7fff, 0x2, 0x1, 0x0, 0x1}, {0x9, 0xfff, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x7}, {0x982, 0x6, 0x0, 0x1, 0x0, 0x1}, {0xe7, 0x3a, 0x0, 0x0, 0x1, 0x1}], 0x9}) r3 = timerfd_create(0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r6}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')GPL'}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x8000000a7c) statx(r9, &(0x7f0000000a00)='./file0\x00', 0x400, 0x4, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x1c2c33, 0xa, &(0x7f0000000900)=[{&(0x7f0000000200)="a793cde457fae7ef4d5e0621a13bcad86219079fe3c5fd76145e03a63396d33eee3f26208ef29d9e1a45954ad39e91fa85ca0c498c7cf0085618982e750ddfd61efbeea314bc53", 0x47, 0x8}, {&(0x7f0000000280)="c98688310fe6109b7f9a2bbdaedec13f301d7c491f7c5026704a74f16ed95953414cf721db552e57aae965525eb3d151c26787a6facddab2b0692a519b2655c75d91fb2fe58e1b795b6941d70dac4589f96af5af6eb20904e93388", 0x5b, 0x1}, {&(0x7f0000000300)="7b5da899ed7383aca8d9507dd414065d67efcadc7dca1de45889a65eb090bd98fb890f2d74bcbe22c03706ce025e05883aa45c164a0524cf5a20fa0c69", 0x3d, 0x162}, {&(0x7f0000000340)="3f6dd6ecd171e1a4e78e221f38aa9202beafa3f1e7e7d3eede5b2a6759f998369950f802afc8b6886f296188f80f25f5a8fdccbd875b2ea26e3f91ec09b063675115b2815a9f3acfc066154792559f4377f4b2c3fdc250a35257f93fa6cab85a817a1ed493f8940f8800fa62a23fbb68ba9ddc9a528c488c072a3a57fe4a4ae48dbbea0eead3deaa8865cb71f7ad64de0d3bf22f66d9ff679eed6be2aebe88426a2683ac2e5d473fa10f31e00ee9bc0c3e41299015e2cc099177bcaf72982d64d6cfac6db32333532b52f6adff56fe22df54999e66eb948ffbe82fbbc2eedb", 0xdf, 0x7}, {&(0x7f0000000440)="b415b7375a50f1860b783c9585a664c26c4f0d4b8b464f887070fe12fd00b350da32e6d8449fb72a7edbc1e9c3090a140cbc6b8ac8b7c4ff60849c438e33ec13c072b99405995e0b192ab8cb3a00984d553f824fb314e2e6cb6c641f0c3f2a2aa27ad09ad29241c0888f869a4463af58258620e9b858e9c94545f88dc6e6464469e47136aef42696181760a31c599e6c5bad1727e4c0601853196b61d0736d917b88b327b92df59d65907ad88e889fe459a9b6d2f24761ff047d763cb1ff0e3df8fb5641012735e0ada53526ebdf76b4e5784e871fcd5fa91479ba1c0368c0335f15280dc8e320bc0d1fd2b029ffaeff1b552e80814e58e9bc", 0xf9}, {&(0x7f0000000540)="733a89c9c2e26c2b192cec01c0aaabe2f5e4fb4552d4ab5bc8e385e9da0ea0cfb81cbec054902f83114d11a347452467a817ad4481de8d2aae2a849a3940de1f1a6a245b55a4348f1d44dc25e9ece47dd1596e42a4320e1bca3beaefd20903f652de7a26acc95fe80b9bc6841a19a842814ce830daa7f76da0c8fc5d8715d490fd0c144208f0037bcb04f59b7fadcd1a33483f9c9e08eebfcdb26758a5cb2255f4cad779afddcf850dfc17381e58cf9c33e9c84513c2dd5804b6a52c59e928d9b41a0fcb19849d01437b7129ffae", 0xce, 0x5}, {&(0x7f0000000640)="a8f2ee3a2f2053fa7ed80ac46e7949eac20c1b11cf1797b655f509c0663f6364c72e6ba09adbbcbe13d38daaa3bafaf179fbbdc7c98c72c28cc560351128f4ab71a1f46e835370aeee07f32197f32d2661bd67680624af7af0f16cd849947b70c7285de7e81dbd10fa6858bbd46aa4f281348b4c8e7e1d38a02c72ae1552541617", 0x81, 0xfdf}, {&(0x7f0000000700)="938890c99295b9199307d16f9636cb70466029056cfb52cf5809adc485ce69837468252dcf92d2764961b1bf669129e14d6997dcfacdf063ff684784cf6bc18e8decdd4536fc1307e9857ea1593d197794761a8a8e92c39bf2721b23774982711604849ad8548266e78a51e98f08424d5fd503c724024de2473b09370f46f32b4352820144a73f0b059ad33cac99eb33b8dc955d094ada6034", 0x99, 0xdc}, {&(0x7f00000007c0)="8df990596493fb1b726a455df82c366075ac425378003a3e063d72d1c9be5b8b532a1ce1514f9aa3aa3e4f24a3ed6c6f1e13fa860bd1e1232227173b24518101575c5e9083367db99847bcbffa83ade955ecf24b6bf1dbcd21a408996e9fad37de15368243ab3cccfa6f691f1cdc7d8fcee39d3e", 0x74, 0x4834b388}, {&(0x7f0000000840)="05207e969c7e631d69acf409aa35129a22aca60b5dbc80a0cdfbea0044b0444b71c4ed812e5d0da8db8e3070b4e993e7fb2e81774417de43d47551aa5c346c550f9dc653ee7acf36b8f7363c208b03bdff345f42d0c2232ee4e7d8ff64993f5a74170cb8277e19e73dd788e5dd61277482ef200932670cbe6df37808ceefdffd8f55453bd9d0e85c4bb54f3f", 0x8c, 0x80000000}], 0x20001, &(0x7f0000000b40)={[{@quota='quota'}, {@loccookie='loccookie'}, {@acl='acl'}, {@barrier='barrier'}, {@acl='acl'}, {@nosuiddir='nosuiddir'}, {@rgrplvb='rgrplvb'}], [{@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role'}}, {@uid_gt={'uid>'}}, {@measure='measure'}, {@measure='measure'}, {@fowner_lt={'fowner<'}}, {@smackfsdef={'smackfsdef'}}, {@fowner_lt={'fowner<', r6}}, {@fowner_eq={'fowner', 0x3d, r10}}]}) timerfd_settime(r3, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) timerfd_gettime(r5, &(0x7f0000000000)) 13:44:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1108.657585] FAULT_INJECTION: forcing a failure. [ 1108.657585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1108.669415] CPU: 1 PID: 24854 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1108.677379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.686730] Call Trace: [ 1108.689326] dump_stack+0x1b2/0x283 [ 1108.692962] should_fail.cold+0x10a/0x154 [ 1108.697115] __alloc_pages_nodemask+0x22b/0x2730 [ 1108.701880] ? __lock_acquire+0x655/0x42a0 [ 1108.706118] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1108.710611] ? __kmalloc_track_caller+0x155/0x400 [ 1108.715458] ? memdup_user+0x22/0xa0 [ 1108.719169] ? strndup_user+0x5b/0xf0 [ 1108.722967] ? SyS_mount+0x68/0x120 [ 1108.726593] ? do_syscall_64+0x1d5/0x640 [ 1108.730657] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1108.736023] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1108.740869] ? trace_hardirqs_on+0x10/0x10 [ 1108.745105] ? list_lru_add+0x227/0x490 [ 1108.749082] ? dput.part.0+0x13d/0x710 [ 1108.752969] ? __might_fault+0x104/0x1b0 [ 1108.757033] cache_grow_begin+0x91/0x410 [ 1108.761097] cache_alloc_refill+0x28c/0x360 [ 1108.765418] kmem_cache_alloc_trace+0x35b/0x3f0 [ 1108.770188] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.774168] copy_mount_options+0x59/0x2e0 [ 1108.778408] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.782295] SyS_mount+0x84/0x120 [ 1108.785747] ? copy_mnt_ns+0x8a0/0x8a0 [ 1108.789637] do_syscall_64+0x1d5/0x640 [ 1108.793557] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1108.798740] RIP: 0033:0x45f4ba 13:44:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1108.801923] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1108.809633] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1108.816901] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1108.824179] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 [ 1108.831448] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1108.838721] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:50 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e24, 0x2, @private0={0xfc, 0x0, [], 0x1}, 0x44}, 0x1c) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:50 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, r1}}]}) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}}}, 0x78) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_UIE_OFF(r7, 0x7004) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x3}], {0x14}}, 0x3c}, 0x1, 0x0, 0x0, 0x404e000}, 0x40) bind(r8, &(0x7f0000000180)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r3, r9, r0) [ 1108.881749] FAULT_INJECTION: forcing a failure. [ 1108.881749] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.925783] CPU: 1 PID: 24862 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1108.933688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.943126] Call Trace: [ 1108.945720] dump_stack+0x1b2/0x283 [ 1108.949357] should_fail.cold+0x10a/0x154 [ 1108.953518] should_failslab+0xd6/0x130 [ 1108.957497] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1108.962171] ? set_gfs2_super+0x110/0x110 [ 1108.966322] selinux_sb_alloc_security+0x41/0x210 [ 1108.971167] security_sb_alloc+0x66/0xa0 [ 1108.975230] sget_userns+0x194/0xc30 [ 1108.978941] ? set_gfs2_super+0x110/0x110 [ 1108.983091] ? gfs2_open+0x170/0x170 [ 1108.986891] ? set_gfs2_super+0x110/0x110 [ 1108.991038] ? gfs2_open+0x170/0x170 [ 1108.994749] sget+0xd1/0x110 [ 1108.997769] gfs2_mount+0x10f/0x4f3 [ 1109.001400] ? fill_super+0x22a0/0x22a0 [ 1109.005382] ? debug_object_activate+0x450/0x450 [ 1109.009346] hfsplus: gid requires an argument [ 1109.010133] ? free_hot_cold_page+0x879/0xc90 [ 1109.010146] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1109.010165] ? selinux_sb_copy_data+0x206/0x380 [ 1109.014888] hfsplus: unable to parse mount options [ 1109.019127] mount_fs+0x92/0x2a0 [ 1109.019142] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1109.019158] do_mount+0x3c9/0x25e0 [ 1109.019171] ? copy_mount_string+0x40/0x40 [ 1109.019182] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1109.019190] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.019201] ? copy_mount_options+0x1ec/0x2e0 [ 1109.019209] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.019220] SyS_mount+0xa8/0x120 [ 1109.019228] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.019239] do_syscall_64+0x1d5/0x640 [ 1109.019256] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1109.070726] gfs2: not a GFS2 filesystem [ 1109.073736] RIP: 0033:0x45f4ba [ 1109.073742] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1109.073753] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1109.073759] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1109.073764] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1109.073772] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 13:44:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 13:44:50 executing program 3 (fault-call:4 fault-nth:50): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x460, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) [ 1109.126816] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:50 executing program 2 (fault-call:4 fault-nth:60): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:50 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0)={0x20, 0x825, 0x6cf, 0x81}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x0, &(0x7f0000000740)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000300)={0x3, &(0x7f00000002c0)=[{0x3, 0x1, 0x9, 0xf7}, {0x0, 0x80, 0x5, 0x8}, {0x0, 0x63, 0x7, 0x80}]}) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="2b6db17fd5e5b1a5ea396532ed31b52d766bba3b065ae366e9383cd5addac679a664a6f06dd69ce6958279f4fbf19bf201b26c487f2279b578041f8981acddbb9aa36a74e2e71a281ee53bc402132767031abc259c808afa222cdc7f52c70bdf01e8500212299db549eda6d44744aed8805ba3", 0x73}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="16629dbc32892e6f6b44fca6ffbd096b0855e1aa57c2437857f61ea85e20544280e867709a3ba3ca19c4fb565075bfba8625e8a68ae299cdf0f4b23a2a7ecd0200187178ccd3210c2f5adeb19588a99d54f2cbd06425f449e580da2b37c6f77b27fbee5ec1c183da7cd83ec616e1613aa4c939520928af94f536164b811f444ea194537001f48c3727274feec494074c7af0a36780a36dc20e076938399ee11f5c80887281160a9dd83b0ac8b5ddce35af4c9e265c9493e4d84d18c8f466529bad440b1ab4b95f82a56b9edc77e02302d6a2371771ea0a6f7ad101e0", 0xdc}, {&(0x7f0000000500)="c37ef4a3642cb13a081566ad084de0f290081303e28d3a47c2cbcc45d98ee3f9ba8ea277fd125cac6d2eb76281165458d719a3ddc631", 0x36}], 0x4, 0x1) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = fcntl$dupfd(r6, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VT_GETMODE(r7, 0x5601, &(0x7f00000000c0)) recvmmsg(r3, &(0x7f0000000100)=[{{&(0x7f0000000040)=@ax25={{0x3, @netrom}, [@rose, @default, @default, @netrom, @bcast, @netrom, @netrom, @bcast]}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000180)=""/228, 0xe4}, 0x6}], 0x1, 0x2041, &(0x7f0000000280)={0x77359400}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE_wg(r7, 0x1, 0x19, &(0x7f0000000680)='wg2\x00', 0x4) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="14000100100001000000000000000000001d000a14000000050a0102000000000000000000000000140000001100012000000000000000000000000a58c02d945e0ae333dd26d92e19853f4b37d46067df38983b7798c53fa3c0064fb47a4e8e50e3f3d4904aa1d647f2ada781f6856e81deac417ac8aebd2e3cf27e0d72d81e49d6be68acae49c5bf6e1b"], 0x3c}}, 0x0) clock_gettime(0x3, &(0x7f00000005c0)={0x0, 0x0}) ppoll(&(0x7f0000000580)=[{r8, 0x8220}], 0x1, &(0x7f0000000600)={r9, r10+10000000}, &(0x7f0000000640)={[0x2]}, 0x8) [ 1109.253215] hfsplus: gid requires an argument [ 1109.259658] FAULT_INJECTION: forcing a failure. [ 1109.259658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1109.261529] hfsplus: unable to parse mount options [ 1109.271463] CPU: 1 PID: 24915 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1109.271470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.271473] Call Trace: [ 1109.271491] dump_stack+0x1b2/0x283 [ 1109.271507] should_fail.cold+0x10a/0x154 [ 1109.271519] ? unwind_next_frame+0xe38/0x1700 [ 1109.271533] __alloc_pages_nodemask+0x22b/0x2730 [ 1109.271557] ? is_bpf_text_address+0xa3/0x120 [ 1109.271569] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1109.271580] ? trace_hardirqs_on+0x10/0x10 [ 1109.271596] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 1109.271607] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1109.271615] ? kmem_cache_alloc_trace+0x14d/0x3f0 [ 1109.271624] ? copy_mount_options+0x59/0x2e0 [ 1109.271632] ? SyS_mount+0x84/0x120 [ 1109.271642] cache_grow_begin+0x91/0x410 [ 1109.271654] cache_alloc_refill+0x28c/0x360 [ 1109.271666] kmem_cache_alloc+0x333/0x3c0 [ 1109.271678] getname_flags+0xc8/0x550 [ 1109.271690] user_path_at_empty+0x2a/0x50 [ 1109.271700] do_mount+0x10b/0x25e0 [ 1109.271714] ? copy_mount_string+0x40/0x40 [ 1109.271727] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1109.384046] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1109.388893] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.392787] ? copy_mount_options+0x1ec/0x2e0 [ 1109.397280] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.401170] SyS_mount+0xa8/0x120 [ 1109.404620] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.408508] do_syscall_64+0x1d5/0x640 [ 1109.412401] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1109.417587] RIP: 0033:0x45f4ba [ 1109.420767] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1109.428472] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1109.435744] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1109.443009] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 13:44:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, 0x0, 0x0) 13:44:51 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000040)={0x9f0000, 0x81, 0x81, r3, 0x0, &(0x7f0000000000)={0xa2090c, 0x4}}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r10, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x84, "357de269d1f191deca38e495046e0cc2fa7d60c1c0502a2a8a3a4e5500547e299e797756aa97e251c3c0eadab25c626f0ec4dab726fb0611a866cbd40d755e6c220fb2d63c1add988aaf8ad5b3ea6bd9314f9220df63cfe631e0dfba0806ecb5387e5a13e9781e9b8bced08c2fbb7a061a22309bff32047412aec707806149b84893dcbd"}, &(0x7f0000000180)=0x8c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000001c0)={r11, @in={{0x2, 0x4e24, @broadcast}}, 0x6, 0x8000, 0x40, 0x800, 0x3f}, &(0x7f0000000280)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1109.450282] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1109.457600] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1109.483337] FAULT_INJECTION: forcing a failure. [ 1109.483337] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.539086] CPU: 1 PID: 24916 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1109.546998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.548723] gfs2: not a GFS2 filesystem [ 1109.556348] Call Trace: [ 1109.556416] dump_stack+0x1b2/0x283 [ 1109.556432] should_fail.cold+0x10a/0x154 [ 1109.556448] should_failslab+0xd6/0x130 [ 1109.556459] __kmalloc+0x2c1/0x400 [ 1109.556468] ? __list_lru_init+0x67/0x650 [ 1109.556479] __list_lru_init+0x67/0x650 [ 1109.556492] sget_userns+0x4e4/0xc30 [ 1109.556501] ? set_gfs2_super+0x110/0x110 [ 1109.556513] ? gfs2_open+0x170/0x170 [ 1109.597936] ? set_gfs2_super+0x110/0x110 [ 1109.602089] ? gfs2_open+0x170/0x170 [ 1109.605807] sget+0xd1/0x110 [ 1109.608866] gfs2_mount+0x10f/0x4f3 [ 1109.612503] ? fill_super+0x22a0/0x22a0 [ 1109.616480] ? debug_object_activate+0x450/0x450 [ 1109.621235] ? free_hot_cold_page+0x879/0xc90 [ 1109.625729] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1109.630752] ? selinux_sb_copy_data+0x206/0x380 [ 1109.635429] mount_fs+0x92/0x2a0 [ 1109.638798] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1109.643299] do_mount+0x3c9/0x25e0 [ 1109.646843] ? copy_mount_string+0x40/0x40 [ 1109.651067] ? copy_mount_options+0x17d/0x2e0 [ 1109.655830] ? copy_mount_options+0x18f/0x2e0 [ 1109.660325] ? copy_mount_options+0x1ec/0x2e0 [ 1109.664814] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.668706] SyS_mount+0xa8/0x120 [ 1109.672154] ? copy_mnt_ns+0x8a0/0x8a0 [ 1109.676044] do_syscall_64+0x1d5/0x640 [ 1109.679957] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1109.685140] RIP: 0033:0x45f4ba 13:44:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, 0x0, 0x0) [ 1109.688323] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1109.696030] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1109.703441] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1109.710708] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1109.717974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1109.725239] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 13:44:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, 0x0, 0x0) 13:44:53 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000340)={@remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, 0x6f2, 0x2, 0x401, 0x400, 0x7, 0x0, r4}) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid', 0x3d, r0}}], [{@audit='audit'}, {@dont_measure='dont_measure'}]}) 13:44:53 executing program 3 (fault-call:4 fault-nth:51): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:53 executing program 2 (fault-call:4 fault-nth:61): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:53 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x4, 0xf39859916d186212, 0x19, 0x1, "f202f6d0f283ea58e236a4773bf8197f9dbf851b15dcf557a93a2bce13f414c91112583100c16b876e1ec613adbae27c84f05e55baedbf637352396f44226f0a", "76dc5ccffeb1db3a04ef4b3895914ee41f4fb7e5445252f208858eefc83d1731", [0x9, 0x4]}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0xd5e0f71b0937c710, 0x0) clock_gettime(0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f00000001c0)) timerfd_settime(r2, 0x3, &(0x7f0000000140)={{}, {0x0, 0x3938700}}, &(0x7f0000af9ff0)) 13:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1111.832636] FAULT_INJECTION: forcing a failure. [ 1111.832636] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.854962] FAULT_INJECTION: forcing a failure. [ 1111.854962] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1111.866789] CPU: 1 PID: 24971 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 13:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1111.874764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.885248] Call Trace: [ 1111.887840] dump_stack+0x1b2/0x283 [ 1111.891469] should_fail.cold+0x10a/0x154 [ 1111.895617] __alloc_pages_nodemask+0x22b/0x2730 [ 1111.900419] ? __lock_acquire+0x655/0x42a0 [ 1111.904648] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 1111.909129] ? __kmalloc_track_caller+0x155/0x400 [ 1111.913980] ? memdup_user+0x22/0xa0 [ 1111.917693] ? strndup_user+0x5b/0xf0 [ 1111.921486] ? SyS_mount+0x68/0x120 [ 1111.925105] ? do_syscall_64+0x1d5/0x640 13:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1111.929165] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1111.934572] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1111.939402] ? trace_hardirqs_on+0x10/0x10 [ 1111.943628] ? list_lru_add+0x227/0x490 [ 1111.947597] ? dput.part.0+0x13d/0x710 [ 1111.951737] ? __might_fault+0x104/0x1b0 [ 1111.955785] cache_grow_begin+0x91/0x410 [ 1111.959836] cache_alloc_refill+0x28c/0x360 [ 1111.964152] kmem_cache_alloc_trace+0x35b/0x3f0 [ 1111.968811] ? copy_mnt_ns+0x8a0/0x8a0 [ 1111.972682] copy_mount_options+0x59/0x2e0 [ 1111.976914] ? copy_mnt_ns+0x8a0/0x8a0 13:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1111.980799] SyS_mount+0x84/0x120 [ 1111.984241] ? copy_mnt_ns+0x8a0/0x8a0 [ 1111.988811] do_syscall_64+0x1d5/0x640 [ 1111.992690] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1111.997867] RIP: 0033:0x45f4ba [ 1112.001043] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1112.008766] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1112.016026] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1112.023287] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 [ 1112.030550] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1112.037812] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1112.045083] CPU: 0 PID: 24965 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1112.052970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.062317] Call Trace: [ 1112.062963] hfsplus: gid requires an argument [ 1112.064900] dump_stack+0x1b2/0x283 [ 1112.064915] should_fail.cold+0x10a/0x154 [ 1112.064930] should_failslab+0xd6/0x130 [ 1112.078136] hfsplus: unable to parse mount options [ 1112.081119] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1112.081133] ? set_gfs2_super+0x110/0x110 [ 1112.081141] sget_userns+0x102/0xc30 [ 1112.081152] ? set_gfs2_super+0x110/0x110 [ 1112.102774] ? gfs2_open+0x170/0x170 [ 1112.106490] ? set_gfs2_super+0x110/0x110 [ 1112.110635] ? gfs2_open+0x170/0x170 [ 1112.114356] sget+0xd1/0x110 [ 1112.117376] gfs2_mount+0x10f/0x4f3 [ 1112.121019] ? fill_super+0x22a0/0x22a0 [ 1112.124991] ? debug_object_activate+0x450/0x450 [ 1112.129753] ? free_hot_cold_page+0x879/0xc90 [ 1112.133029] gfs2: not a GFS2 filesystem [ 1112.134253] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1112.134273] ? selinux_sb_copy_data+0x206/0x380 [ 1112.134290] mount_fs+0x92/0x2a0 [ 1112.151256] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1112.155752] do_mount+0x3c9/0x25e0 [ 1112.159292] ? copy_mount_string+0x40/0x40 [ 1112.163528] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1112.168543] ? copy_mnt_ns+0x8a0/0x8a0 [ 1112.172429] ? copy_mount_options+0x1ec/0x2e0 [ 1112.176924] ? copy_mnt_ns+0x8a0/0x8a0 [ 1112.180809] SyS_mount+0xa8/0x120 [ 1112.184250] ? copy_mnt_ns+0x8a0/0x8a0 [ 1112.188120] do_syscall_64+0x1d5/0x640 [ 1112.191989] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1112.197189] RIP: 0033:0x45f4ba [ 1112.200358] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1112.208154] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1112.215403] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1112.222651] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 13:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:44:53 executing program 4: r0 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0x2, 0x4, {0x38, 0x9, 0x9, 0x3}}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) setsockopt$inet_opts(r5, 0x0, 0xd, &(0x7f0000000000)="67530484e7f67434ac6a07a35f2ffa79979354e2d5bcb90a5f1ee6a2a01d67aba61f128f09f4b16394766891b7d06ff113a84be020450f544fa270bbbec9af9d1d80a4fecbd80304bfb090ab7e97809729d62e89b3e4ab49e7324833a6ffc0a2b59534f2339731198695a96a07eef11d9214d05db7f2", 0x76) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000000c0)=0x7) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001840)=ANY=[@ANYBLOB="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"], 0x3c}}, 0x0) sendmmsg(r6, &(0x7f0000001800)=[{{&(0x7f0000000180)=@in6={0xa, 0x4e22, 0x6, @private1, 0xa2}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000200)="9ddf2cf6eac15b1c16750af4f5f60e967fa2bd92b1a86c226c283571f8b1ca7b41d4c47293c674d68d6ad3466f1921d6df9ff7fe3cbc7e2f5164dae9c048d99e3b18e39578950b7d2f7f0ed69c224ebb098791d6d6a6b8f3f90982defd98a0f2dc6cee92887aaae9484b4c9f0b9749c8b47b474c95c1c4d338def90972e6bcd1361ea8127067a76558eda71aa2c40fd5200511d85f73094eddb0b544f8947c77e0940ef76fd4546d2ea913e94997e3018fe0fd379672c92a219654a98ec348d9f87bc383ec8a556470af0621d2", 0xcd}, {&(0x7f0000000100)="524516dbd6749efabb6e3993f07f2aed5dd92fe0d7f845a5990e5be7fad1172f26e270222db3c94d1330802090bfac2b0e40", 0x32}, {&(0x7f0000000300)="6172f0df2c51c69d211042e036d174e66dbe18362e7872e483ad921458503934", 0x20}, {&(0x7f0000000340)="a828596ae6f5c781e68a34a35087fb87eb20154294d828a0a59fe2d21611d4d0e0bad90c7ad0d17f519317d2cbc4cda2a9bf50d820ccd76c5314dad097bb0f9d0efa45dca0d01a3c3bdde83d3232afbbca96342d89cb0f6d34fe0825f7732e4ec63b1e5c56d5b1a1bb9445f3ac49f36022021e4545baeb53ded83dc17245c89fad65cd06ee137494139c717573268d15583d56945d989276a762281d3f9918fcf1133c7aa1a6d5c1251a", 0xaa}, {&(0x7f0000001980)="c394fbf1f563c24e8e31d09683ea01f46a3012bbbfa7fe9949b2ae82e96c7cb607bbfd573b21bfdb690ef1dcf4cec6241056b6dcbe1aa9d7dddd79fb5667e43dce6ceda175ecb1e85855bba0d6228626045f4d2a64974830ec3406cd46d56b34aa4db62d792fc5bf5accd60df8bc7a3911f3247efe73d7b59127d066edc8cdafe65f1c108ba61aad4f9d6f", 0x8b}, {&(0x7f0000001a40)="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", 0x1009}], 0x6, &(0x7f0000001540)=[{0xf8, 0x10b, 0xd0, "d8258da7c36f410901aab9a87fde1ccef17188fe7e58d55a3961e7c2c80e914ce5c94adb260e5a56fcc0b2b7f173864cdacdb7273721f5c18aa663344eed38dff99d4cf69f434a6506db92176e24288b8b0832e85a1375ace6a1f18b58c6cfad1dee3016834c4e0f5a92d074724a44704208801cdc29ae02701d4a856e96fd9a0067452cceac4e931159aa5d10c696238896ee93867ea2b34052fe3bed80795f8daecc13c9570ea27d0aeaedab5115e5dcd6bfdcecd7f03cdaf0f4f311f47035381823d6df064bb8cae2f31a1c7d8ecda4f005873946975af1fd46559c28b7a81f79ec"}, {0xa0, 0x102, 0x80, "b488317ca5b759a57c8e23d07c2c7cf5c060c566b2fe1f205029458da9b2b59a2de7d617e3360304d48015393604843809d7e0c53e5ccc9ce4ab1b849740f77d20cc8b8a0b96ab82e9b848e5e3b86323496305e73561e12883be6d82253f46d4df1c090adcb56e7a9229d8f543a19082ae2c66bbf49728daf75c5d9d7d909cecb47753aeb411f4e0b8abc1"}, {0x50, 0x86, 0x82, "203be9b3c4d6903627378848f8cedaa6d37f61628d729ac159bda086fdb9923df41afa9ea41b1bd2e6cfed5874e001489ea1369d9f40eede98bcb5ad2dce"}, {0xa8, 0x11, 0x7, "483e730aee7ee4699b9e49b207226181ee186edf68e1afd2b9ec5247f931e5939992d49ee8fbdc052eacd33d2c8871862b46c71dd32940f983775b3ca9046319b31f0d480b56ba40c6b2834eb85cc9fcc8a9f562d096d4b62492f7616380d40bd1b1223f96d6d03c40335612965be05aba7ea7aea28c7a44d73cfc7b0e4b0f1546dce7212ffb52037ce77c532aad05aab1"}], 0x290}}], 0x1, 0xc0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) bind$rxrpc(r7, 0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1112.229905] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1112.237226] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1112.310066] hfsplus: gid requires an argument [ 1112.314823] hfsplus: unable to parse mount options 13:44:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) 13:44:56 executing program 3 (fault-call:4 fault-nth:52): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:56 executing program 2 (fault-call:4 fault-nth:62): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:56 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@session={'session', 0x3d, 0xfff}}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', r3}) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x11c, 0x12, 0x606, 0x70bd27, 0x25dfdbfb, {0x6, 0x8, 0x46, 0x8, {0x4e24, 0x4e22, [0x30b, 0x1ff, 0x20, 0x8], [0x3, 0x0, 0x3], r5, [0xa8db, 0x6]}, 0x6}, [@INET_DIAG_REQ_BYTECODE={0xcd, 0x1, "2b8890290ee14f0661d22ff5e9158e7ca14b0cda32759ae4506e2eb64e126270971b8271b629affff84df1c236271aad9fe1c191db46e178beb691e2b22b9610ff97db3283ef9acefc0d4d4603ebb8ab284f02b8fa9c9b22a555b895bae248ab3eee151804ffcb1c950e3323a24b688c3645fdca1f0b00dc9ae7fef3d28908895648116d97f7b497481a4f81c0bfba7a6bab62d990d1cea5588c9e5552575f9fd27c6afa313bdda077a60004300fb41338b64818589ed4a36c82d11faf73f415bfef122d5939333fc0"}]}, 0x11c}, 0x1, 0x0, 0x0, 0x814}, 0x801) 13:44:56 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x8007) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x201}], {0x14}}, 0x3c}}, 0x0) r6 = accept4(r5, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80, 0x800) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={r8, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r8, @ANYBLOB="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"], &(0x7f00000000c0)=0x103) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) [ 1114.864307] FAULT_INJECTION: forcing a failure. [ 1114.864307] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.891717] FAULT_INJECTION: forcing a failure. [ 1114.891717] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.895155] CPU: 0 PID: 25023 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1114.905097] hfsplus: invalid session number or type of track [ 1114.910804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.910809] Call Trace: [ 1114.910827] dump_stack+0x1b2/0x283 [ 1114.910843] should_fail.cold+0x10a/0x154 [ 1114.910857] should_failslab+0xd6/0x130 [ 1114.910871] __kmalloc_track_caller+0x2bc/0x400 [ 1114.938071] hfsplus: unable to find HFS+ superblock [ 1114.940689] ? kstrdup_const+0x35/0x60 [ 1114.940698] ? lock_downgrade+0x6e0/0x6e0 [ 1114.940710] kstrdup+0x36/0x70 [ 1114.961713] kstrdup_const+0x35/0x60 [ 1114.965430] alloc_vfsmnt+0xe0/0x7c0 [ 1114.970361] vfs_kern_mount.part.0+0x27/0x3c0 [ 1114.974860] do_mount+0x3c9/0x25e0 [ 1114.978386] ? copy_mount_string+0x40/0x40 [ 1114.982607] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1114.987432] ? copy_mnt_ns+0x8a0/0x8a0 [ 1114.991305] ? copy_mount_options+0x1ec/0x2e0 [ 1114.995787] ? copy_mnt_ns+0x8a0/0x8a0 [ 1114.999660] SyS_mount+0xa8/0x120 [ 1115.003094] ? copy_mnt_ns+0x8a0/0x8a0 [ 1115.006978] do_syscall_64+0x1d5/0x640 [ 1115.010865] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1115.016035] RIP: 0033:0x45f4ba [ 1115.019206] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1115.026913] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1115.034185] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1115.041435] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 [ 1115.048702] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1115.055953] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 13:44:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 1115.063221] CPU: 1 PID: 25028 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1115.071103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.080461] Call Trace: [ 1115.083047] dump_stack+0x1b2/0x283 [ 1115.086705] should_fail.cold+0x10a/0x154 [ 1115.090857] should_failslab+0xd6/0x130 [ 1115.095701] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 1115.100373] fill_super+0xb6/0x22a0 [ 1115.104082] ? gfs2_online_uevent+0x1b0/0x1b0 [ 1115.108585] ? snprintf+0xa5/0xd0 [ 1115.112079] ? vsprintf+0x30/0x30 [ 1115.116131] ? set_blocksize+0x24b/0x2e0 [ 1115.120182] gfs2_mount+0x42a/0x4f3 [ 1115.123797] ? fill_super+0x22a0/0x22a0 [ 1115.127774] mount_fs+0x92/0x2a0 [ 1115.131126] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1115.135711] do_mount+0x3c9/0x25e0 [ 1115.139239] ? copy_mount_string+0x40/0x40 [ 1115.143459] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1115.148297] ? copy_mnt_ns+0x8a0/0x8a0 [ 1115.152177] ? copy_mount_options+0x1ec/0x2e0 [ 1115.157607] ? copy_mnt_ns+0x8a0/0x8a0 [ 1115.161474] SyS_mount+0xa8/0x120 [ 1115.164912] ? copy_mnt_ns+0x8a0/0x8a0 [ 1115.168790] do_syscall_64+0x1d5/0x640 [ 1115.172680] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1115.177862] RIP: 0033:0x45f4ba [ 1115.181036] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1115.189174] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1115.196428] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1115.203703] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 13:44:56 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet6(0xa, 0x4, 0xffffffff) r2 = dup(r1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{}, 0x0, 0x0, 0x0, 0x2, 0x7}}}]}, 0x78}}, 0x0) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000040)=0x1ff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TIOCSIG(r7, 0x40045436, 0x0) ioctl$UI_GET_VERSION(r8, 0x8004552d, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x3, &(0x7f0000000140)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 13:44:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 1115.211656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1115.218907] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1115.227502] gfs2: can't alloc struct gfs2_sbd 13:44:56 executing program 3 (fault-call:4 fault-nth:53): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 13:44:56 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f00000003c0)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@cache_loose='cache=loose'}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@dont_measure='dont_measure'}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')G\xf6\xd1\xe2n\xa8\xecE\xd1\xd2PL'}}]}}) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0x2, r2, &(0x7f0000000240)=""/108, 0x6c) keyctl$get_persistent(0x16, r1, r2) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')GPL'}}]}}) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="63726561746f723d7eb571d03d666f776e65727c", @ANYRESDEC=r0, @ANYBLOB=',\x00']) [ 1115.346987] FAULT_INJECTION: forcing a failure. [ 1115.346987] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1115.358845] CPU: 0 PID: 25061 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1115.366722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.376069] Call Trace: [ 1115.378773] dump_stack+0x1b2/0x283 [ 1115.382386] should_fail.cold+0x10a/0x154 [ 1115.386518] __alloc_pages_nodemask+0x22b/0x2730 [ 1115.391430] ? __lock_acquire+0x655/0x42a0 [ 1115.395646] ? lock_downgrade+0x6e0/0x6e0 [ 1115.399775] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1115.404665] ? trace_hardirqs_on+0x10/0x10 [ 1115.409037] ? preempt_count_add+0xaf/0x170 [ 1115.413341] ? get_page_from_freelist+0xcb4/0x24f0 [ 1115.418270] cache_grow_begin+0x91/0x410 [ 1115.422326] cache_alloc_refill+0x28c/0x360 [ 1115.426630] kmem_cache_alloc+0x333/0x3c0 [ 1115.430757] getname_kernel+0x4e/0x340 [ 1115.434650] kern_path+0x1b/0x40 [ 1115.438009] lookup_bdev.part.0+0x60/0x160 [ 1115.442224] ? blkdev_open+0x250/0x250 [ 1115.446094] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1115.451100] blkdev_get_by_path+0x70/0xf0 [ 1115.455248] gfs2_mount+0x9d/0x4f3 [ 1115.458777] ? fill_super+0x22a0/0x22a0 [ 1115.462751] ? debug_object_activate+0x450/0x450 [ 1115.476951] ? free_hot_cold_page+0x879/0xc90 [ 1115.481430] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1115.486451] ? selinux_sb_copy_data+0x206/0x380 [ 1115.491122] mount_fs+0x92/0x2a0 [ 1115.494497] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1115.498993] do_mount+0x3c9/0x25e0 [ 1115.502517] ? copy_mount_string+0x40/0x40 [ 1115.506752] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1115.511574] ? copy_mnt_ns+0x8a0/0x8a0 [ 1115.515441] ? copy_mount_options+0x1ec/0x2e0 [ 1115.519914] ? copy_mnt_ns+0x8a0/0x8a0 [ 1115.523787] SyS_mount+0xa8/0x120 [ 1115.527220] ? copy_mnt_ns+0x8a0/0x8a0 [ 1115.531847] do_syscall_64+0x1d5/0x640 [ 1115.535733] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1115.540901] RIP: 0033:0x45f4ba [ 1115.544069] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1115.551775] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1115.559049] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1115.566299] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 [ 1115.573549] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1115.580833] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1115.618563] gfs2: not a GFS2 filesystem [ 1115.664450] encrypted_key: insufficient parameters specified [ 1115.691785] hfsplus: creator requires a 4 character value [ 1115.697675] hfsplus: unable to parse mount options [ 1115.731690] encrypted_key: insufficient parameters specified [ 1115.739463] hfsplus: creator requires a 4 character value [ 1115.745012] hfsplus: unable to parse mount options 13:44:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead03", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 13:44:59 executing program 4: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8301, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f00000002c0)={0x7, {{0xa, 0x4e20, 0x0, @mcast1, 0x4}}}, 0x88) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RWALK(r4, &(0x7f0000000040)={0x16, 0x6f, 0x1, {0x1, [{0x10, 0x4, 0x2}]}}, 0x16) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2400, &(0x7f0000000180)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x4}}, {@aname={'aname', 0x3d, 'procK'}}, {@fscache='fscache'}, {@access_any='access=any'}, {@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@debug={'debug', 0x3d, 0x37a}}], [{@obj_role={'obj_role'}}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, ')GPL'}}]}}) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@uid={'uid', 0x3d, r0}}]}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet_dccp_int(r5, 0x21, 0x6, &(0x7f0000000380)=0x58574120, 0x4) 13:44:59 executing program 2 (fault-call:4 fault-nth:63): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000f80)='gfs2\x00', &(0x7f0000000fc0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@locktable={'locktable', 0x3d, 'quota=account'}}]}) 13:44:59 executing program 3 (fault-call:4 fault-nth:54): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@quota_on='quota=on'}]}) 13:44:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 13:44:59 executing program 0: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff]) syz_mount_image$hfsplus(&(0x7f0000000200)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000040)={[{@type={'type', 0x3d, "0e1024ec"}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDFONTOP_SET_DEF(r5, 0x4b72, &(0x7f0000000180)={0x2, 0x3, 0xe, 0x5, 0xde, &(0x7f0000000240)="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"}) readlinkat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000640)=""/210, 0xd2) [ 1117.914020] FAULT_INJECTION: forcing a failure. [ 1117.914020] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.928042] hfsplus: unable to find HFS+ superblock [ 1117.933823] FAULT_INJECTION: forcing a failure. [ 1117.933823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1117.934817] hfsplus: unable to find HFS+ superblock [ 1117.963097] CPU: 1 PID: 25098 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1117.971011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.980378] Call Trace: [ 1117.982978] dump_stack+0x1b2/0x283 [ 1117.986644] should_fail.cold+0x10a/0x154 [ 1117.990848] should_failslab+0xd6/0x130 [ 1117.994866] __kmalloc+0x2c1/0x400 [ 1117.998410] ? register_shrinker+0x1ab/0x220 [ 1118.002826] register_shrinker+0x1ab/0x220 [ 1118.007077] sget_userns+0x9c5/0xc30 [ 1118.010786] ? set_gfs2_super+0x110/0x110 [ 1118.014942] ? gfs2_open+0x170/0x170 [ 1118.018693] ? set_gfs2_super+0x110/0x110 [ 1118.022832] ? gfs2_open+0x170/0x170 [ 1118.026548] sget+0xd1/0x110 [ 1118.029575] gfs2_mount+0x10f/0x4f3 [ 1118.033204] ? fill_super+0x22a0/0x22a0 [ 1118.037179] ? debug_object_activate+0x450/0x450 [ 1118.041943] ? free_hot_cold_page+0x879/0xc90 [ 1118.046440] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1118.051470] ? selinux_sb_copy_data+0x206/0x380 [ 1118.056235] mount_fs+0x92/0x2a0 [ 1118.059592] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1118.064069] do_mount+0x3c9/0x25e0 [ 1118.067593] ? copy_mount_string+0x40/0x40 [ 1118.071809] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1118.076631] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.080501] ? copy_mount_options+0x1ec/0x2e0 [ 1118.085412] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.089288] SyS_mount+0xa8/0x120 [ 1118.092720] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.096591] do_syscall_64+0x1d5/0x640 [ 1118.100482] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1118.105655] RIP: 0033:0x45f4ba 13:44:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) [ 1118.108847] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1118.116711] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1118.123961] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1118.131211] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1118.138487] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1118.145740] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1118.153022] CPU: 0 PID: 25105 Comm: syz-executor.3 Not tainted 4.14.183-syzkaller #0 [ 1118.160910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.170267] Call Trace: [ 1118.172856] dump_stack+0x1b2/0x283 [ 1118.176493] should_fail.cold+0x10a/0x154 [ 1118.180687] __alloc_pages_nodemask+0x22b/0x2730 [ 1118.185451] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1118.190910] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1118.195932] ? __alloc_pages_nodemask+0x1a8a/0x2730 [ 1118.200959] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1118.205803] ? lock_downgrade+0x6e0/0x6e0 [ 1118.209954] ? _find_next_bit+0xdb/0x100 [ 1118.214022] ? pcpu_alloc+0x37d/0xf70 [ 1118.217829] ? __mutex_unlock_slowpath+0x75/0x780 [ 1118.222678] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1118.227543] alloc_pages_current+0xe7/0x1e0 [ 1118.231329] ------------[ cut here ]------------ [ 1118.231868] __get_free_pages+0xb/0x40 [ 1118.236634] WARNING: CPU: 1 PID: 25098 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 1118.240543] selinux_sb_copy_data+0x28/0x380 [ 1118.248390] Kernel panic - not syncing: panic_on_warn set ... [ 1118.248390] [ 1118.252805] security_sb_copy_data+0x6e/0xa0 [ 1118.264701] mount_fs+0x1e7/0x2a0 [ 1118.268139] vfs_kern_mount.part.0+0x5b/0x3c0 [ 1118.272620] do_mount+0x3c9/0x25e0 [ 1118.276142] ? copy_mount_string+0x40/0x40 [ 1118.280360] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1118.285197] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.289065] ? copy_mount_options+0x1ec/0x2e0 [ 1118.293545] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.297413] SyS_mount+0xa8/0x120 [ 1118.300856] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.304723] do_syscall_64+0x1d5/0x640 [ 1118.308595] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1118.313763] RIP: 0033:0x45f4ba [ 1118.316979] RSP: 002b:00007fb81a6b4a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1118.324681] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1118.331930] RDX: 00007fb81a6b4ae0 RSI: 0000000020000040 RDI: 00007fb81a6b4b00 [ 1118.339181] RBP: 000000000078bf00 R08: 00007fb81a6b4b40 R09: 00007fb81a6b4ae0 [ 1118.347385] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1118.354634] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007fb81a6b56d4 [ 1118.361909] CPU: 1 PID: 25098 Comm: syz-executor.2 Not tainted 4.14.183-syzkaller #0 [ 1118.369790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.379161] Call Trace: [ 1118.381941] dump_stack+0x1b2/0x283 [ 1118.385577] panic+0x1f9/0x42d [ 1118.388773] ? add_taint.cold+0x16/0x16 [ 1118.392749] ? kill_block_super+0xbe/0xe0 [ 1118.396900] ? __warn.cold+0x14/0x30 [ 1118.400626] ? kill_block_super+0xbe/0xe0 [ 1118.404778] __warn.cold+0x2f/0x30 [ 1118.408324] ? ist_end_non_atomic+0x10/0x10 13:44:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) 13:44:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1118.412654] ? kill_block_super+0xbe/0xe0 [ 1118.416809] report_bug+0x20a/0x248 [ 1118.420476] do_error_trap+0x195/0x2d0 [ 1118.424366] ? math_error+0x2d0/0x2d0 [ 1118.428174] ? retint_kernel+0x2d/0x2d [ 1118.432098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1118.436957] invalid_op+0x1b/0x40 [ 1118.440425] RIP: 0010:kill_block_super+0xbe/0xe0 [ 1118.445174] RSP: 0018:ffff8880386dfa98 EFLAGS: 00010246 [ 1118.450630] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90008543000 [ 1118.457902] RDX: 0000000000040000 RSI: ffffffff818c06be RDI: ffff8880a6f5e528 13:44:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1118.465174] RBP: ffff8880a8fdc040 R08: 0000000000000001 R09: 0000000000000001 [ 1118.472471] R10: ffff88801a32ed18 R11: ffff88801a32e440 R12: ffff8880a6f5e180 [ 1118.479745] R13: ffff8880a8fdc180 R14: dffffc0000000000 R15: ffffffff87b53300 [ 1118.487062] ? kill_block_super+0xbe/0xe0 [ 1118.491224] ? kill_block_super+0xbe/0xe0 [ 1118.495388] gfs2_kill_sb+0x144/0x1a0 [ 1118.499204] deactivate_locked_super+0x6c/0xd0 [ 1118.503795] sget_userns+0x9df/0xc30 [ 1118.507546] ? set_gfs2_super+0x110/0x110 13:45:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1118.511704] ? gfs2_open+0x170/0x170 [ 1118.518207] ? set_gfs2_super+0x110/0x110 [ 1118.522393] ? gfs2_open+0x170/0x170 [ 1118.526460] sget+0xd1/0x110 [ 1118.529492] gfs2_mount+0x10f/0x4f3 [ 1118.533129] ? fill_super+0x22a0/0x22a0 [ 1118.537114] ? debug_object_activate+0x450/0x450 [ 1118.541879] ? free_hot_cold_page+0x879/0xc90 [ 1118.546385] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 1118.551416] ? selinux_sb_copy_data+0x206/0x380 [ 1118.556099] mount_fs+0x92/0x2a0 [ 1118.559564] vfs_kern_mount.part.0+0x5b/0x3c0 13:45:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=@nat={'nat\x00', 0x1b, 0x5, 0x438, 0xf8, 0x0, 0xffffffff, 0x2d0, 0xf8, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x1, 0x5, 0x4, 0x2, 0x1], 0x5, 0x4}, {0x0, [0x0, 0x1, 0x5, 0x4, 0x2, 0x4], 0x2, 0x1}}}}, {{@ip={@loopback, @multicast1, 0x0, 0x0, 'veth1\x00', 'vcan0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @local}}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'vcan0\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @private, @port, @icmp_id}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @common=@ttl={{0x28, 'ttl\x00'}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @private, @private, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) [ 1118.564074] do_mount+0x3c9/0x25e0 [ 1118.567631] ? copy_mount_string+0x40/0x40 [ 1118.571878] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 1118.576731] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.580633] ? copy_mount_options+0x1ec/0x2e0 [ 1118.585171] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.589103] SyS_mount+0xa8/0x120 [ 1118.592559] ? copy_mnt_ns+0x8a0/0x8a0 [ 1118.596453] do_syscall_64+0x1d5/0x640 [ 1118.600792] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1118.605994] RIP: 0033:0x45f4ba [ 1118.609219] RSP: 002b:00007f21c56f9a68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1118.616936] RAX: ffffffffffffffda RBX: 0000000000508980 RCX: 000000000045f4ba [ 1118.624224] RDX: 00007f21c56f9ae0 RSI: 0000000020000fc0 RDI: 00007f21c56f9b00 [ 1118.631500] RBP: 000000000078bf00 R08: 00007f21c56f9b40 R09: 00007f21c56f9ae0 [ 1118.639122] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000007 [ 1118.646395] R13: 0000000000000bec R14: 00000000004ce30e R15: 00007f21c56fa6d4 [ 1118.655451] Kernel Offset: disabled [ 1118.659290] Rebooting in 86400 seconds..