/0xa9 [ 310.169080][T12921] ? mntput_no_expire+0x114/0xbd0 [ 310.174075][T12921] ? stack_trace_save+0x1f0/0x1f0 [ 310.179066][T12921] ? check_preemption_disabled+0x9e/0x330 [ 310.184754][T12921] ? __rcu_read_lock+0x50/0x50 [ 310.189486][T12921] ? __unwind_start+0x72f/0x8e0 [ 310.194308][T12921] ? debug_smp_processor_id+0x20/0x20 [ 310.199650][T12921] ? lo_release+0x1e0/0x1e0 [ 310.204131][T12921] blkdev_ioctl+0x8f7/0x2ce0 [ 310.208696][T12921] ? __kernel_text_address+0x93/0x100 [ 310.214039][T12921] ? unwind_get_return_address+0x48/0x80 [ 310.219637][T12921] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 310.224891][T12921] ? arch_stack_walk+0xf8/0x140 [ 310.229710][T12921] ? __rcu_read_lock+0x50/0x50 [ 310.234442][T12921] ? check_preemption_disabled+0x154/0x330 [ 310.240260][T12921] ? avc_has_extended_perms+0x72a/0x1140 [ 310.245859][T12921] ? avc_has_extended_perms+0xb5e/0x1140 [ 310.251459][T12921] ? avc_ss_reset+0x3a0/0x3a0 [ 310.256104][T12921] ? do_sys_open+0x62e/0x7c0 [ 310.260669][T12921] block_ioctl+0xa8/0xe0 [ 310.264886][T12921] ? blkdev_iopoll+0xf0/0xf0 [ 310.269448][T12921] do_vfs_ioctl+0x76a/0x1720 [ 310.274048][T12921] ? selinux_file_ioctl+0x72f/0x990 [ 310.279221][T12921] ? ioctl_preallocate+0x250/0x250 [ 310.284307][T12921] ? __fget+0x37b/0x3c0 [ 310.288441][T12921] ? fget_many+0x20/0x20 [ 310.292653][T12921] ? debug_smp_processor_id+0x20/0x20 [ 310.297992][T12921] ? __x64_sys_pwrite64+0x1d9/0x240 [ 310.303161][T12921] ? security_file_ioctl+0x9d/0xb0 [ 310.308282][T12921] __x64_sys_ioctl+0xd4/0x110 [ 310.312929][T12921] do_syscall_64+0xcb/0x1e0 [ 310.317403][T12921] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 310.323264][T12921] RIP: 0033:0x7f1d6d50b4c7 [ 310.327652][T12921] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 310.347229][T12921] RSP: 002b:00007f1d6b282f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.355610][T12921] RAX: ffffffffffffffda RBX: 00007f1d6d555cc0 RCX: 00007f1d6d50b4c7 04:54:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x4400, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x5800, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x29000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x4, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x4800, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 310.363554][T12921] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 310.371506][T12921] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 310.379512][T12921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 310.387459][T12921] R13: 0000000000000005 R14: 0000000020000260 R15: 0000000000000004 04:54:19 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6000, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x6, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6400, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x10, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 310.477257][T12921] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 310.510097][T12921] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/543/file0 (deleted) supports timestamps until 2038 (0x7fffffff) 04:54:19 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 23) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) [ 310.666403][T12983] FAULT_INJECTION: forcing a failure. [ 310.666403][T12983] name failslab, interval 1, probability 0, space 0, times 0 [ 310.679167][T12983] CPU: 1 PID: 12983 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 310.690777][T12983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.700814][T12983] Call Trace: [ 310.704085][T12983] dump_stack+0x1d8/0x24e [ 310.708386][T12983] ? devkmsg_release+0x11c/0x11c [ 310.713293][T12983] ? show_regs_print_info+0x12/0x12 [ 310.718462][T12983] ? should_fail+0x3b3/0x860 [ 310.723027][T12983] should_fail+0x6f6/0x860 [ 310.727412][T12983] ? setup_fault_attr+0x3d0/0x3d0 [ 310.732404][T12983] ? __should_failslab+0xac/0x150 [ 310.737395][T12983] ? __should_failslab+0xff/0x150 [ 310.742387][T12983] ? kobject_uevent_env+0x252/0x1000 [ 310.747640][T12983] should_failslab+0x5/0x20 [ 310.752109][T12983] kmem_cache_alloc_trace+0x39/0x2b0 [ 310.757361][T12983] kobject_uevent_env+0x252/0x1000 [ 310.762439][T12983] ? up_read+0x10/0x10 [ 310.766482][T12983] loop_configure+0xea1/0x1380 [ 310.771214][T12983] lo_ioctl+0x820/0x23b0 [ 310.775431][T12983] ? lo_release+0x1e0/0x1e0 [ 310.779901][T12983] ? _raw_spin_lock+0x1b0/0x1b0 [ 310.784722][T12983] ? check_preemption_disabled+0x9e/0x330 [ 310.790406][T12983] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 310.795831][T12983] ? debug_smp_processor_id+0x20/0x20 [ 310.801168][T12983] ? check_preemption_disabled+0x9e/0x330 [ 310.806853][T12983] ? _raw_spin_lock+0x1b0/0x1b0 [ 310.811669][T12983] ? perf_pmu_nop_int+0x5/0x10 [ 310.816399][T12983] ? group_sched_in+0x41e/0x770 [ 310.821217][T12983] ? flexible_sched_in+0x3d0/0x610 [ 310.826296][T12983] ? visit_groups_merge+0x548/0x5a0 [ 310.831460][T12983] ? debug_smp_processor_id+0x20/0x20 [ 310.836799][T12983] ? perf_log_throttle+0x440/0x440 [ 310.841880][T12983] ? ctx_sched_in+0x4f0/0x4f0 [ 310.846523][T12983] ? debug_smp_processor_id+0x20/0x20 [ 310.851863][T12983] ? kvm_sched_clock_read+0x15/0x40 [ 310.857030][T12983] ? sched_clock+0x36/0x40 [ 310.861414][T12983] ? ctx_sched_in+0x421/0x4f0 [ 310.866056][T12983] ? ctx_sched_out+0xdc0/0xdc0 [ 310.870788][T12983] ? check_preemption_disabled+0x9e/0x330 [ 310.876478][T12983] ? _raw_spin_lock+0xa3/0x1b0 [ 310.881206][T12983] ? debug_smp_processor_id+0x20/0x20 [ 310.886561][T12983] ? check_preemption_disabled+0x9e/0x330 [ 310.892247][T12983] ? __perf_event_task_sched_in+0x57c/0x5e0 [ 310.898106][T12983] ? perf_pmu_sched_task+0x430/0x430 [ 310.903364][T12983] ? switch_mm_irqs_off+0x72f/0x9a0 [ 310.908529][T12983] ? memset+0x1f/0x40 [ 310.912478][T12983] ? unwind_next_frame+0x1f0a/0x27b0 [ 310.917729][T12983] ? arch_stack_walk+0xde/0x140 [ 310.922551][T12983] ? retint_kernel+0x1b/0x1b [ 310.927109][T12983] ? __rcu_read_lock+0x50/0x50 [ 310.931854][T12983] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 310.938062][T12983] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 310.944103][T12983] ? mntput_no_expire+0x114/0xbd0 [ 310.949094][T12983] ? stack_trace_save+0x1f0/0x1f0 [ 310.954086][T12983] ? check_preemption_disabled+0x9e/0x330 [ 310.959772][T12983] ? __rcu_read_lock+0x50/0x50 [ 310.964513][T12983] ? __unwind_start+0x72f/0x8e0 [ 310.969331][T12983] ? debug_smp_processor_id+0x20/0x20 [ 310.974673][T12983] ? lo_release+0x1e0/0x1e0 [ 310.979186][T12983] blkdev_ioctl+0x8f7/0x2ce0 [ 310.983745][T12983] ? __kernel_text_address+0x93/0x100 [ 310.989082][T12983] ? unwind_get_return_address+0x48/0x80 [ 310.994680][T12983] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 310.999932][T12983] ? arch_stack_walk+0xf8/0x140 [ 311.004752][T12983] ? __rcu_read_lock+0x50/0x50 [ 311.009500][T12983] ? check_preemption_disabled+0x154/0x330 [ 311.015273][T12983] ? avc_has_extended_perms+0x72a/0x1140 [ 311.020871][T12983] ? avc_has_extended_perms+0xb5e/0x1140 [ 311.026484][T12983] ? avc_ss_reset+0x3a0/0x3a0 [ 311.031134][T12983] ? do_sys_open+0x62e/0x7c0 [ 311.035697][T12983] block_ioctl+0xa8/0xe0 [ 311.039913][T12983] ? blkdev_iopoll+0xf0/0xf0 [ 311.044471][T12983] do_vfs_ioctl+0x76a/0x1720 [ 311.049033][T12983] ? selinux_file_ioctl+0x72f/0x990 [ 311.054199][T12983] ? apic_timer_interrupt+0xa/0x20 [ 311.059283][T12983] ? ioctl_preallocate+0x250/0x250 [ 311.064364][T12983] ? __fget+0x37b/0x3c0 [ 311.068490][T12983] ? debug_smp_processor_id+0x20/0x20 [ 311.073830][T12983] ? fget_many+0x20/0x20 [ 311.078041][T12983] ? debug_smp_processor_id+0x20/0x20 [ 311.083398][T12983] ? __fpregs_load_activate+0x1d7/0x3c0 [ 311.088911][T12983] ? security_file_ioctl+0x9d/0xb0 [ 311.093993][T12983] __x64_sys_ioctl+0xd4/0x110 [ 311.098638][T12983] do_syscall_64+0xcb/0x1e0 [ 311.103111][T12983] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.108969][T12983] RIP: 0033:0x7f1d6d50b4c7 [ 311.113352][T12983] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 311.132926][T12983] RSP: 002b:00007f1d6b282f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.141306][T12983] RAX: ffffffffffffffda RBX: 00007f1d6d555cc0 RCX: 00007f1d6d50b4c7 [ 311.149246][T12983] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 311.157186][T12983] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 311.165126][T12983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 311.173080][T12983] R13: 0000000000000005 R14: 0000000020000260 R15: 0000000000000004 04:54:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x4c00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6800, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x29, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:20 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 24) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x5800, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x2b, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6c00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 311.419638][T13004] FAULT_INJECTION: forcing a failure. [ 311.419638][T13004] name failslab, interval 1, probability 0, space 0, times 0 [ 311.426349][T13016] net_ratelimit: 62 callbacks suppressed [ 311.426358][T13016] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 311.433686][T13004] CPU: 0 PID: 13004 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 311.444144][T13019] sit: non-ECT from 0.0.0.0 with TOS=0x2 04:54:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6000, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 311.455079][T13004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.455084][T13004] Call Trace: [ 311.455101][T13004] dump_stack+0x1d8/0x24e [ 311.455111][T13004] ? devkmsg_release+0x11c/0x11c [ 311.455121][T13004] ? show_regs_print_info+0x12/0x12 [ 311.455131][T13004] should_fail+0x6f6/0x860 [ 311.455146][T13004] ? setup_fault_attr+0x3d0/0x3d0 [ 311.497867][T13004] ? __alloc_skb+0x75/0x4d0 [ 311.502339][T13004] should_failslab+0x5/0x20 [ 311.506818][T13004] kmem_cache_alloc+0x36/0x290 [ 311.511555][T13004] __alloc_skb+0x75/0x4d0 [ 311.515854][T13004] alloc_uevent_skb+0x73/0x220 [ 311.520586][T13004] kobject_uevent_env+0xaee/0x1000 [ 311.525668][T13004] ? up_read+0x10/0x10 [ 311.529709][T13004] loop_configure+0xea1/0x1380 [ 311.534444][T13004] lo_ioctl+0x820/0x23b0 [ 311.538660][T13004] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 311.544089][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.549443][T13004] ? check_preemption_disabled+0x9e/0x330 [ 311.555143][T13004] ? _raw_spin_lock+0x1b0/0x1b0 [ 311.559967][T13004] ? lo_release+0x1e0/0x1e0 [ 311.564443][T13004] ? flexible_sched_in+0x3d0/0x610 [ 311.569567][T13004] ? visit_groups_merge+0x548/0x5a0 [ 311.574738][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.580079][T13004] ? perf_log_throttle+0x440/0x440 [ 311.585164][T13004] ? ctx_sched_in+0x4f0/0x4f0 [ 311.589811][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.595161][T13004] ? kvm_sched_clock_read+0x15/0x40 [ 311.600329][T13004] ? sched_clock+0x36/0x40 [ 311.604724][T13004] ? ctx_sched_in+0x421/0x4f0 [ 311.609385][T13004] ? ctx_sched_out+0xdc0/0xdc0 [ 311.614122][T13004] ? check_preemption_disabled+0x9e/0x330 [ 311.619812][T13004] ? _raw_spin_lock+0xa3/0x1b0 [ 311.624544][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.629886][T13004] ? check_preemption_disabled+0x9e/0x330 [ 311.635580][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.640920][T13004] ? check_preemption_disabled+0x9e/0x330 [ 311.646608][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.651947][T13004] ? check_preemption_disabled+0x9e/0x330 [ 311.657636][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.662995][T13004] ? __rcu_read_lock+0x50/0x50 [ 311.667728][T13004] ? cpuacct_charge+0xe5/0x160 [ 311.672461][T13004] ? enqueue_entity+0xa8c/0xd10 [ 311.677288][T13004] ? check_preemption_disabled+0x9e/0x330 [ 311.682976][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.688321][T13004] ? tracing_record_taskinfo+0xe8/0x280 [ 311.693833][T13004] ? tracing_stop_tgid_record+0x90/0x90 [ 311.699395][T13004] ? ttwu_do_wakeup+0x442/0x470 [ 311.704217][T13004] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 311.710341][T13004] ? memset+0x1f/0x40 [ 311.714292][T13004] ? unwind_next_frame+0x1f0a/0x27b0 [ 311.719547][T13004] ? apic_timer_interrupt+0xa/0x20 [ 311.724639][T13004] ? blkdev_get+0x390/0x390 [ 311.729113][T13004] ? __rcu_read_lock+0x50/0x50 [ 311.733846][T13004] ? _raw_spin_unlock+0x49/0x60 [ 311.738668][T13004] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.744704][T13004] ? mntput_no_expire+0x114/0xbd0 [ 311.749696][T13004] ? stack_trace_save+0x1f0/0x1f0 [ 311.754686][T13004] ? check_preemption_disabled+0x9e/0x330 [ 311.760373][T13004] ? __rcu_read_lock+0x50/0x50 [ 311.765107][T13004] ? __unwind_start+0x72f/0x8e0 [ 311.769927][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.775276][T13004] ? lo_release+0x1e0/0x1e0 [ 311.779748][T13004] blkdev_ioctl+0x8f7/0x2ce0 [ 311.784308][T13004] ? __kernel_text_address+0x93/0x100 [ 311.789650][T13004] ? unwind_get_return_address+0x48/0x80 [ 311.795251][T13004] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 311.800504][T13004] ? arch_stack_walk+0xf8/0x140 [ 311.805338][T13004] ? apic_timer_interrupt+0xa/0x20 [ 311.810419][T13004] ? avc_has_extended_perms+0x41/0x1140 [ 311.815931][T13004] ? __rcu_read_lock+0x50/0x50 [ 311.820668][T13004] ? check_memory_region+0x270/0x2e0 [ 311.825937][T13004] ? avc_has_extended_perms+0x72a/0x1140 [ 311.831541][T13004] ? avc_has_extended_perms+0xb5e/0x1140 [ 311.837141][T13004] ? avc_ss_reset+0x3a0/0x3a0 [ 311.841784][T13004] ? do_sys_open+0x62e/0x7c0 [ 311.846361][T13004] block_ioctl+0xa8/0xe0 [ 311.850576][T13004] ? blkdev_iopoll+0xf0/0xf0 [ 311.855147][T13004] do_vfs_ioctl+0x76a/0x1720 [ 311.859713][T13004] ? selinux_file_ioctl+0x72f/0x990 [ 311.864881][T13004] ? ioctl_preallocate+0x250/0x250 [ 311.869969][T13004] ? __fget+0x37b/0x3c0 [ 311.874095][T13004] ? debug_smp_processor_id+0x20/0x20 [ 311.879437][T13004] ? fget_many+0x20/0x20 [ 311.883651][T13004] ? __fpregs_load_activate+0x1d7/0x3c0 [ 311.889164][T13004] ? security_file_ioctl+0x9d/0xb0 [ 311.894242][T13004] __x64_sys_ioctl+0xd4/0x110 [ 311.898894][T13004] do_syscall_64+0xcb/0x1e0 [ 311.903367][T13004] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 311.909229][T13004] RIP: 0033:0x7f1d6d50b4c7 [ 311.913613][T13004] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 311.933189][T13004] RSP: 002b:00007f1d6b282f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.941566][T13004] RAX: ffffffffffffffda RBX: 00007f1d6d555cc0 RCX: 00007f1d6d50b4c7 [ 311.949506][T13004] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 311.957448][T13004] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 311.965389][T13004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 311.973331][T13004] R13: 0000000000000005 R14: 0000000020000260 R15: 0000000000000004 [ 312.038626][T13027] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 312.049857][T13004] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 312.056980][T13035] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 312.068334][T13036] sit: non-ECT from 0.0.0.0 with TOS=0xaf [ 312.071470][T13004] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/545/file0 supports timestamps until 2038 (0x7fffffff) 04:54:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x2c, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:21 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 25) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) [ 312.083278][T13044] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 312.090452][T13047] sit: non-ECT from 0.0.0.0 with TOS=0xaf [ 312.154901][T13049] tmpfs: Unknown parameter '' [ 312.181434][T13051] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 312.234307][T13052] sit: non-ECT from 0.0.0.0 with TOS=0xb3 [ 312.240784][T13055] sit: non-ECT from 0.0.0.0 with TOS=0xb3 [ 312.298861][T13059] FAULT_INJECTION: forcing a failure. [ 312.298861][T13059] name failslab, interval 1, probability 0, space 0, times 0 [ 312.311595][T13059] CPU: 1 PID: 13059 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 312.323189][T13059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.333213][T13059] Call Trace: [ 312.336476][T13059] dump_stack+0x1d8/0x24e [ 312.340830][T13059] ? devkmsg_release+0x11c/0x11c [ 312.345740][T13059] ? show_regs_print_info+0x12/0x12 [ 312.350907][T13059] should_fail+0x6f6/0x860 [ 312.355293][T13059] ? setup_fault_attr+0x3d0/0x3d0 [ 312.360286][T13059] ? apic_timer_interrupt+0xa/0x20 [ 312.365363][T13059] ? alloc_uevent_skb+0x73/0x220 [ 312.370267][T13059] should_failslab+0x5/0x20 [ 312.374754][T13059] __kmalloc_track_caller+0x5d/0x2e0 [ 312.380006][T13059] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.386037][T13059] ? alloc_uevent_skb+0x73/0x220 [ 312.390950][T13059] ? alloc_uevent_skb+0x73/0x220 [ 312.395863][T13059] __alloc_skb+0xaf/0x4d0 [ 312.400164][T13059] alloc_uevent_skb+0x73/0x220 [ 312.404897][T13059] kobject_uevent_env+0xaee/0x1000 [ 312.409978][T13059] ? up_read+0x10/0x10 [ 312.414020][T13059] loop_configure+0xea1/0x1380 [ 312.418757][T13059] lo_ioctl+0x820/0x23b0 [ 312.422970][T13059] ? check_preemption_disabled+0x9e/0x330 [ 312.428660][T13059] ? __rcu_read_lock+0x50/0x50 [ 312.433394][T13059] ? __unwind_start+0x72f/0x8e0 [ 312.438324][T13059] ? debug_smp_processor_id+0x20/0x20 [ 312.443669][T13059] ? lo_release+0x1e0/0x1e0 [ 312.448234][T13059] ? is_bpf_text_address+0x280/0x2a0 [ 312.453492][T13059] ? apic_timer_interrupt+0xa/0x20 [ 312.458574][T13059] ? unwind_next_frame+0x1845/0x27b0 [ 312.463830][T13059] ? unwind_next_frame+0x1f0a/0x27b0 [ 312.469085][T13059] ? arch_stack_walk+0xde/0x140 [ 312.473907][T13059] ? preempt_count_add+0x66/0x130 [ 312.478901][T13059] ? unwind_next_frame+0x1f0a/0x27b0 [ 312.484167][T13059] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.490204][T13059] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 312.496193][T13059] ? stack_trace_save+0x120/0x1f0 [ 312.501204][T13059] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 312.507157][T13059] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.513191][T13059] ? stack_trace_save+0x1f0/0x1f0 [ 312.518187][T13059] ? check_preemption_disabled+0x9e/0x330 [ 312.523876][T13059] ? __rcu_read_lock+0x50/0x50 [ 312.528625][T13059] ? __unwind_start+0x72f/0x8e0 [ 312.533446][T13059] ? debug_smp_processor_id+0x20/0x20 [ 312.538786][T13059] ? is_bpf_text_address+0x280/0x2a0 [ 312.544039][T13059] ? stack_trace_save+0x1f0/0x1f0 [ 312.549040][T13059] ? __kernel_text_address+0x93/0x100 [ 312.554384][T13059] ? unwind_get_return_address+0x48/0x80 [ 312.559984][T13059] ? __rcu_read_lock+0x50/0x50 [ 312.564719][T13059] ? arch_stack_walk+0xf8/0x140 [ 312.569539][T13059] ? memset+0x1f/0x40 [ 312.573491][T13059] ? unwind_next_frame+0x1f0a/0x27b0 [ 312.578749][T13059] ? arch_stack_walk+0xde/0x140 [ 312.583575][T13059] ? blkdev_get+0x390/0x390 [ 312.588049][T13059] ? __rcu_read_lock+0x50/0x50 [ 312.592794][T13059] ? _raw_spin_unlock+0x49/0x60 [ 312.597615][T13059] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.603655][T13059] ? mntput_no_expire+0x114/0xbd0 [ 312.608649][T13059] ? stack_trace_save+0x1f0/0x1f0 [ 312.613645][T13059] ? check_preemption_disabled+0x9e/0x330 [ 312.619348][T13059] ? __rcu_read_lock+0x50/0x50 [ 312.624087][T13059] ? __unwind_start+0x72f/0x8e0 [ 312.628907][T13059] ? debug_smp_processor_id+0x20/0x20 [ 312.634249][T13059] ? lo_release+0x1e0/0x1e0 [ 312.638720][T13059] blkdev_ioctl+0x8f7/0x2ce0 [ 312.643286][T13059] ? __kernel_text_address+0x93/0x100 [ 312.648628][T13059] ? unwind_get_return_address+0x48/0x80 [ 312.654229][T13059] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 312.659482][T13059] ? arch_stack_walk+0xf8/0x140 [ 312.664304][T13059] ? apic_timer_interrupt+0xa/0x20 [ 312.669383][T13059] ? __rcu_read_lock+0x50/0x50 [ 312.674116][T13059] ? avc_has_extended_perms+0xb5e/0x1140 [ 312.679715][T13059] ? avc_ss_reset+0x3a0/0x3a0 [ 312.684361][T13059] ? do_sys_open+0x62e/0x7c0 [ 312.688924][T13059] block_ioctl+0xa8/0xe0 [ 312.693136][T13059] ? blkdev_iopoll+0xf0/0xf0 [ 312.697699][T13059] do_vfs_ioctl+0x76a/0x1720 [ 312.702278][T13059] ? selinux_file_ioctl+0x72f/0x990 [ 312.707451][T13059] ? ioctl_preallocate+0x250/0x250 [ 312.712590][T13059] ? __fget+0x37b/0x3c0 [ 312.716717][T13059] ? fget_many+0x20/0x20 [ 312.720938][T13059] ? debug_smp_processor_id+0x20/0x20 [ 312.726278][T13059] ? __x64_sys_pwrite64+0x1d9/0x240 [ 312.731445][T13059] ? security_file_ioctl+0x9d/0xb0 [ 312.736664][T13059] __x64_sys_ioctl+0xd4/0x110 [ 312.741312][T13059] do_syscall_64+0xcb/0x1e0 [ 312.745784][T13059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.751701][T13059] RIP: 0033:0x7f1d6d50b4c7 [ 312.756087][T13059] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 312.775660][T13059] RSP: 002b:00007f1d6b282f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.784040][T13059] RAX: ffffffffffffffda RBX: 00007f1d6d555cc0 RCX: 00007f1d6d50b4c7 [ 312.791982][T13059] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 312.799925][T13059] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 312.807867][T13059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 312.815807][T13059] R13: 0000000000000005 R14: 0000000020000260 R15: 0000000000000004 04:54:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x7400, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6400, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x2f, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x7a00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6800, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 312.860952][T13059] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 312.870396][T13059] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/546/file0 (deleted) supports timestamps until 2038 (0x7fffffff) 04:54:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x40000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x3c, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 26) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x44000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x3f, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xe000, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x6c00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 313.110231][T13111] FAULT_INJECTION: forcing a failure. [ 313.110231][T13111] name failslab, interval 1, probability 0, space 0, times 0 [ 313.123587][T13111] CPU: 1 PID: 13111 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 313.135204][T13111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.145244][T13111] Call Trace: [ 313.148521][T13111] dump_stack+0x1d8/0x24e [ 313.152836][T13111] ? devkmsg_release+0x11c/0x11c [ 313.157756][T13111] ? show_regs_print_info+0x12/0x12 [ 313.162938][T13111] should_fail+0x6f6/0x860 [ 313.167333][T13111] ? setup_fault_attr+0x3d0/0x3d0 [ 313.172339][T13111] ? alloc_uevent_skb+0x73/0x220 [ 313.177256][T13111] should_failslab+0x5/0x20 [ 313.181737][T13111] __kmalloc_track_caller+0x5d/0x2e0 [ 313.186998][T13111] ? kmem_cache_alloc+0x115/0x290 [ 313.192001][T13111] ? alloc_uevent_skb+0x73/0x220 [ 313.196920][T13111] __alloc_skb+0xaf/0x4d0 [ 313.201230][T13111] ? mutex_lock+0xa6/0x110 [ 313.205627][T13111] alloc_uevent_skb+0x73/0x220 [ 313.210371][T13111] kobject_uevent_env+0xaee/0x1000 [ 313.215459][T13111] ? up_read+0x10/0x10 [ 313.219507][T13111] loop_configure+0xea1/0x1380 [ 313.224249][T13111] lo_ioctl+0x820/0x23b0 [ 313.228484][T13111] ? check_preemption_disabled+0x9e/0x330 [ 313.234195][T13111] ? __rcu_read_lock+0x50/0x50 [ 313.238947][T13111] ? __unwind_start+0x72f/0x8e0 [ 313.243783][T13111] ? debug_smp_processor_id+0x20/0x20 [ 313.249134][T13111] ? lo_release+0x1e0/0x1e0 [ 313.253605][T13111] ? is_bpf_text_address+0x280/0x2a0 [ 313.258857][T13111] ? stack_trace_save+0x1f0/0x1f0 [ 313.263858][T13111] ? __kernel_text_address+0x93/0x100 [ 313.269201][T13111] ? unwind_get_return_address+0x48/0x80 [ 313.274803][T13111] ? memset+0x1f/0x40 [ 313.278750][T13111] ? unwind_next_frame+0x1f0a/0x27b0 [ 313.284014][T13111] ? apic_timer_interrupt+0xa/0x20 [ 313.289092][T13111] ? kmem_cache_alloc+0x115/0x290 [ 313.294093][T13111] ? preempt_count_add+0x66/0x130 [ 313.299128][T13111] ? unwind_next_frame+0x1f0a/0x27b0 [ 313.304384][T13111] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.310420][T13111] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 313.316369][T13111] ? stack_trace_save+0x120/0x1f0 [ 313.321363][T13111] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 313.327313][T13111] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.333359][T13111] ? apic_timer_interrupt+0xa/0x20 [ 313.338490][T13111] ? stack_trace_save+0x1f0/0x1f0 [ 313.343484][T13111] ? check_preemption_disabled+0x9e/0x330 [ 313.349171][T13111] ? __rcu_read_lock+0x50/0x50 [ 313.353907][T13111] ? __unwind_start+0x72f/0x8e0 [ 313.358731][T13111] ? debug_smp_processor_id+0x20/0x20 [ 313.364077][T13111] ? is_bpf_text_address+0x280/0x2a0 [ 313.369352][T13111] ? stack_trace_save+0x1f0/0x1f0 [ 313.374358][T13111] ? apic_timer_interrupt+0xa/0x20 [ 313.379451][T13111] ? __rcu_read_lock+0x50/0x50 [ 313.384194][T13111] ? memset+0x1f/0x40 [ 313.388148][T13111] ? unwind_next_frame+0x1f0a/0x27b0 [ 313.393413][T13111] ? apic_timer_interrupt+0xa/0x20 [ 313.398501][T13111] ? apic_timer_interrupt+0xa/0x20 [ 313.403588][T13111] ? entry_SYSCALL_64_after_hwframe+0x43/0xa9 [ 313.409638][T13111] ? blkdev_get+0x390/0x390 [ 313.414115][T13111] ? __rcu_read_lock+0x50/0x50 [ 313.418858][T13111] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.424898][T13111] ? mntput_no_expire+0x114/0xbd0 [ 313.429894][T13111] ? stack_trace_save+0x1f0/0x1f0 [ 313.434890][T13111] ? check_preemption_disabled+0x9e/0x330 [ 313.440580][T13111] ? __rcu_read_lock+0x50/0x50 [ 313.445316][T13111] ? __unwind_start+0x72f/0x8e0 [ 313.450134][T13111] ? debug_smp_processor_id+0x20/0x20 [ 313.455486][T13111] ? lo_release+0x1e0/0x1e0 [ 313.459960][T13111] blkdev_ioctl+0x8f7/0x2ce0 [ 313.464525][T13111] ? __kernel_text_address+0x93/0x100 [ 313.469876][T13111] ? unwind_get_return_address+0x48/0x80 [ 313.475480][T13111] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 313.480731][T13111] ? arch_stack_walk+0xf8/0x140 [ 313.485556][T13111] ? __rcu_read_lock+0x50/0x50 [ 313.490300][T13111] ? check_preemption_disabled+0x154/0x330 [ 313.496075][T13111] ? avc_has_extended_perms+0x72a/0x1140 [ 313.501676][T13111] ? avc_has_extended_perms+0xb5e/0x1140 [ 313.507280][T13111] ? avc_ss_reset+0x3a0/0x3a0 [ 313.511938][T13111] ? do_sys_open+0x62e/0x7c0 [ 313.516506][T13111] block_ioctl+0xa8/0xe0 [ 313.520723][T13111] ? blkdev_iopoll+0xf0/0xf0 [ 313.525284][T13111] do_vfs_ioctl+0x76a/0x1720 [ 313.529848][T13111] ? selinux_file_ioctl+0x72f/0x990 [ 313.535025][T13111] ? ioctl_preallocate+0x250/0x250 [ 313.540111][T13111] ? __fget+0x37b/0x3c0 [ 313.544237][T13111] ? fget_many+0x20/0x20 [ 313.548450][T13111] ? debug_smp_processor_id+0x20/0x20 [ 313.553788][T13111] ? __x64_sys_pwrite64+0x1d9/0x240 [ 313.558958][T13111] ? security_file_ioctl+0x9d/0xb0 [ 313.564040][T13111] __x64_sys_ioctl+0xd4/0x110 [ 313.568689][T13111] do_syscall_64+0xcb/0x1e0 [ 313.573166][T13111] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.579029][T13111] RIP: 0033:0x7f1d6d50b4c7 [ 313.583418][T13111] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.603006][T13111] RSP: 002b:00007f1d6b282f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.611393][T13111] RAX: ffffffffffffffda RBX: 00007f1d6d555cc0 RCX: 00007f1d6d50b4c7 [ 313.619340][T13111] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 313.627285][T13111] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 313.635233][T13111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 313.643181][T13111] R13: 0000000000000005 R14: 0000000020000260 R15: 0000000000000004 [ 313.688624][T13114] tmpfs: Unknown parameter '' [ 313.722554][T13111] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 313.733849][T13111] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/547/file0 supports timestamps until 2038 (0x7fffffff) 04:54:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x7400, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x58000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 27) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xe803, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x89ffffff, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xf401, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x7a00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 313.956817][T13148] FAULT_INJECTION: forcing a failure. [ 313.956817][T13148] name failslab, interval 1, probability 0, space 0, times 0 [ 313.970025][T13148] CPU: 0 PID: 13148 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 313.981639][T13148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.991669][T13148] Call Trace: [ 313.994982][T13148] dump_stack+0x1d8/0x24e [ 313.999281][T13148] ? devkmsg_release+0x11c/0x11c [ 314.004187][T13148] ? show_regs_print_info+0x12/0x12 [ 314.009353][T13148] should_fail+0x6f6/0x860 [ 314.013739][T13148] ? setup_fault_attr+0x3d0/0x3d0 [ 314.018731][T13148] ? vsnprintf+0x1cb4/0x1d60 [ 314.023285][T13148] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 314.029405][T13148] ? skb_clone+0x1b2/0x360 [ 314.033792][T13148] should_failslab+0x5/0x20 [ 314.038267][T13148] kmem_cache_alloc+0x36/0x290 [ 314.042999][T13148] ? apic_timer_interrupt+0xa/0x20 [ 314.048077][T13148] skb_clone+0x1b2/0x360 [ 314.052293][T13148] netlink_broadcast_filtered+0x5d1/0x10a0 [ 314.058071][T13148] netlink_broadcast+0x35/0x50 [ 314.062813][T13148] kobject_uevent_env+0xb1f/0x1000 [ 314.067892][T13148] ? up_read+0x10/0x10 [ 314.071932][T13148] loop_configure+0xea1/0x1380 [ 314.076667][T13148] lo_ioctl+0x820/0x23b0 [ 314.080881][T13148] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 314.086304][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.091642][T13148] ? check_preemption_disabled+0x9e/0x330 [ 314.097324][T13148] ? _raw_spin_lock+0x1b0/0x1b0 [ 314.102140][T13148] ? lo_release+0x1e0/0x1e0 [ 314.106610][T13148] ? flexible_sched_in+0x3d0/0x610 [ 314.111691][T13148] ? visit_groups_merge+0x548/0x5a0 [ 314.116853][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.122189][T13148] ? perf_log_throttle+0x440/0x440 [ 314.127263][T13148] ? ctx_sched_in+0x4f0/0x4f0 [ 314.131905][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.137241][T13148] ? kvm_sched_clock_read+0x15/0x40 [ 314.142446][T13148] ? sched_clock+0x36/0x40 [ 314.146830][T13148] ? ctx_sched_in+0x421/0x4f0 [ 314.151475][T13148] ? ctx_sched_out+0xdc0/0xdc0 [ 314.156210][T13148] ? check_preemption_disabled+0x9e/0x330 [ 314.161895][T13148] ? _raw_spin_lock+0xa3/0x1b0 [ 314.166622][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.171962][T13148] ? check_preemption_disabled+0x9e/0x330 [ 314.177649][T13148] ? __rcu_read_lock+0x50/0x50 [ 314.182376][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.187714][T13148] ? check_preemption_disabled+0x9e/0x330 [ 314.193415][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.198755][T13148] ? check_preemption_disabled+0x9e/0x330 [ 314.204446][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.209795][T13148] ? __rcu_read_lock+0x50/0x50 [ 314.214523][T13148] ? cpuacct_charge+0xe5/0x160 [ 314.219254][T13148] ? enqueue_entity+0xa8c/0xd10 [ 314.224072][T13148] ? check_preemption_disabled+0x9e/0x330 [ 314.229755][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.235092][T13148] ? apic_timer_interrupt+0xa/0x20 [ 314.240170][T13148] ? tracing_record_taskinfo+0xbc/0x280 [ 314.245685][T13148] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 314.251804][T13148] ? memset+0x1f/0x40 [ 314.255753][T13148] ? unwind_next_frame+0x1f0a/0x27b0 [ 314.261005][T13148] ? arch_stack_walk+0xde/0x140 [ 314.265828][T13148] ? blkdev_get+0x390/0x390 [ 314.270298][T13148] ? __rcu_read_lock+0x50/0x50 [ 314.275035][T13148] ? _raw_spin_unlock+0x49/0x60 [ 314.279854][T13148] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.285898][T13148] ? mntput_no_expire+0x114/0xbd0 [ 314.290887][T13148] ? apic_timer_interrupt+0xa/0x20 [ 314.295963][T13148] ? apic_timer_interrupt+0xa/0x20 [ 314.301040][T13148] ? blkdev_ioctl+0x102/0x2ce0 [ 314.305769][T13148] ? lo_release+0x1e0/0x1e0 [ 314.310252][T13148] blkdev_ioctl+0x8f7/0x2ce0 [ 314.314823][T13148] ? __kernel_text_address+0x93/0x100 [ 314.320161][T13148] ? unwind_get_return_address+0x48/0x80 [ 314.325760][T13148] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 314.331011][T13148] ? arch_stack_walk+0xf8/0x140 [ 314.335831][T13148] ? apic_timer_interrupt+0xa/0x20 [ 314.340917][T13148] ? __rcu_read_lock+0x50/0x50 [ 314.345653][T13148] ? avc_has_extended_perms+0xb5e/0x1140 [ 314.351257][T13148] ? avc_ss_reset+0x3a0/0x3a0 [ 314.355904][T13148] ? do_sys_open+0x62e/0x7c0 [ 314.360473][T13148] block_ioctl+0xa8/0xe0 [ 314.364690][T13148] ? blkdev_iopoll+0xf0/0xf0 [ 314.369252][T13148] do_vfs_ioctl+0x76a/0x1720 [ 314.373817][T13148] ? selinux_file_ioctl+0x72f/0x990 [ 314.378984][T13148] ? ioctl_preallocate+0x250/0x250 [ 314.384066][T13148] ? __fget+0x37b/0x3c0 [ 314.388188][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.393523][T13148] ? fget_many+0x20/0x20 [ 314.397734][T13148] ? debug_smp_processor_id+0x20/0x20 [ 314.403075][T13148] ? __fpregs_load_activate+0x1d7/0x3c0 [ 314.408588][T13148] ? apic_timer_interrupt+0xa/0x20 [ 314.413666][T13148] ? security_file_ioctl+0x9d/0xb0 [ 314.418747][T13148] __x64_sys_ioctl+0xd4/0x110 [ 314.423390][T13148] do_syscall_64+0xcb/0x1e0 [ 314.427862][T13148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 314.433721][T13148] RIP: 0033:0x7f1d6d50b4c7 [ 314.438101][T13148] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 314.457670][T13148] RSP: 002b:00007f1d6b282f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 314.466046][T13148] RAX: ffffffffffffffda RBX: 00007f1d6d555cc0 RCX: 00007f1d6d50b4c7 [ 314.473985][T13148] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 314.481923][T13148] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff [ 314.489864][T13148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 314.497816][T13148] R13: 0000000000000005 R14: 0000000020000260 R15: 0000000000000004 04:54:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe0000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 314.545429][T13148] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 314.554760][T13148] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/548/file0 supports timestamps until 2038 (0x7fffffff) 04:54:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xffff, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 314.731041][T13202] tmpfs: Unknown parameter '' 04:54:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe8030000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xe000, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 28) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xf4010000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xe803, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x3, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x4, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 315.486319][T13219] FAULT_INJECTION: forcing a failure. [ 315.486319][T13219] name failslab, interval 1, probability 0, space 0, times 0 [ 315.521017][T13219] CPU: 1 PID: 13219 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:54:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xf401, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 315.532648][T13219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.542689][T13219] Call Trace: [ 315.545973][T13219] dump_stack+0x1d8/0x24e [ 315.550292][T13219] ? devkmsg_release+0x11c/0x11c [ 315.555213][T13219] ? show_regs_print_info+0x12/0x12 [ 315.560393][T13219] ? block_ioctl+0xa8/0xe0 [ 315.564801][T13219] should_fail+0x6f6/0x860 [ 315.569204][T13219] ? setup_fault_attr+0x3d0/0x3d0 [ 315.574211][T13219] ? ioctl_preallocate+0x250/0x250 [ 315.579290][T13219] ? getname_flags+0xba/0x640 [ 315.584029][T13219] should_failslab+0x5/0x20 [ 315.588502][T13219] kmem_cache_alloc+0x36/0x290 [ 315.593231][T13219] ? check_preemption_disabled+0x154/0x330 [ 315.599000][T13219] getname_flags+0xba/0x640 [ 315.603468][T13219] do_mkdirat+0x9e/0x330 [ 315.607677][T13219] ? vfs_mkdir+0x5f0/0x5f0 [ 315.612070][T13219] do_syscall_64+0xcb/0x1e0 [ 315.616562][T13219] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.622428][T13219] RIP: 0033:0x7f1d6d50a817 [ 315.626808][T13219] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 315.646378][T13219] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 315.654760][T13219] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 315.662717][T13219] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 315.670652][T13219] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 315.678590][T13219] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 315.686533][T13219] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r3 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r3, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r4, &(0x7f0000000340)='./file0\x00', r2, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r5, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xffffff89, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:25 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 29) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0xffff, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x6, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xffffffff, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x10, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 316.408062][T13290] FAULT_INJECTION: forcing a failure. [ 316.408062][T13290] name failslab, interval 1, probability 0, space 0, times 0 [ 316.420872][T13290] CPU: 1 PID: 13290 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 316.432482][T13290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.442528][T13290] Call Trace: [ 316.445816][T13290] dump_stack+0x1d8/0x24e [ 316.450140][T13290] ? devkmsg_release+0x11c/0x11c [ 316.455073][T13290] ? show_regs_print_info+0x12/0x12 [ 316.460264][T13290] ? block_ioctl+0xa8/0xe0 [ 316.464675][T13290] should_fail+0x6f6/0x860 [ 316.469092][T13290] ? setup_fault_attr+0x3d0/0x3d0 [ 316.474110][T13290] ? ioctl_preallocate+0x250/0x250 [ 316.479214][T13290] ? getname_flags+0xba/0x640 [ 316.483881][T13290] should_failslab+0x5/0x20 [ 316.488373][T13290] kmem_cache_alloc+0x36/0x290 [ 316.493121][T13290] ? check_preemption_disabled+0x154/0x330 [ 316.498908][T13290] getname_flags+0xba/0x640 [ 316.503382][T13290] do_mkdirat+0x9e/0x330 [ 316.507592][T13290] ? vfs_mkdir+0x5f0/0x5f0 [ 316.511978][T13290] do_syscall_64+0xcb/0x1e0 [ 316.516453][T13290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 316.522329][T13290] RIP: 0033:0x7f1d6d50a817 [ 316.526715][T13290] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 316.546288][T13290] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 316.554675][T13290] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 316.562626][T13290] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 316.570568][T13290] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 316.578507][T13290] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 316.586452][T13290] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x5, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 316.607128][T13317] net_ratelimit: 50 callbacks suppressed [ 316.607137][T13317] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 316.607702][T13324] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 316.627854][T13331] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 316.741562][T13350] tmpfs: Unknown parameter '' 04:54:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x29, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 30) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r3 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r3, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r4, &(0x7f0000000340)='./file0\x00', r2, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r5, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2b, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 317.534439][T13363] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 317.540948][T13372] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 317.565000][T13358] FAULT_INJECTION: forcing a failure. [ 317.565000][T13358] name failslab, interval 1, probability 0, space 0, times 0 04:54:27 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x8, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 317.600739][T13358] CPU: 1 PID: 13358 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 317.612359][T13358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.622398][T13358] Call Trace: [ 317.625682][T13358] dump_stack+0x1d8/0x24e [ 317.630001][T13358] ? devkmsg_release+0x11c/0x11c [ 317.634929][T13358] ? show_regs_print_info+0x12/0x12 [ 317.640120][T13358] should_fail+0x6f6/0x860 [ 317.644301][T13390] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:54:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 317.644530][T13358] ? setup_fault_attr+0x3d0/0x3d0 [ 317.644540][T13358] ? ext4_alloc_inode+0x1d/0x620 [ 317.644555][T13358] should_failslab+0x5/0x20 [ 317.652438][T13400] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 317.655156][T13358] kmem_cache_alloc+0x36/0x290 [ 317.655167][T13358] ? set_qf_name+0x310/0x310 [ 317.655174][T13358] ext4_alloc_inode+0x1d/0x620 [ 317.655180][T13358] ? set_qf_name+0x310/0x310 [ 317.655195][T13358] new_inode_pseudo+0x61/0x220 [ 317.693549][T13358] new_inode+0x25/0x1d0 [ 317.697698][T13358] ? memset+0x1f/0x40 [ 317.701661][T13358] ? apic_timer_interrupt+0xa/0x20 [ 317.706752][T13358] __ext4_new_inode+0x303/0x6190 [ 317.711659][T13358] ? avc_has_perm_noaudit+0x30c/0x400 [ 317.717002][T13358] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 317.722691][T13358] ? memset+0x1f/0x40 [ 317.726643][T13358] ? __dquot_initialize+0x25e/0xe20 [ 317.731810][T13358] ? avc_has_perm+0xd2/0x270 [ 317.736368][T13358] ? avc_has_perm+0x173/0x270 [ 317.741017][T13358] ? entry_SYSCALL_compat_after_hwframe+0x18/0x4d [ 317.747400][T13358] ? ext4_mkdir+0x198/0x1580 [ 317.751956][T13358] ext4_mkdir+0x3ff/0x1580 [ 317.756344][T13358] ? ext4_symlink+0xf00/0xf00 [ 317.761010][T13358] ? generic_permission+0x13a/0x490 [ 317.766178][T13358] ? security_inode_mkdir+0xdd/0x120 [ 317.771430][T13358] vfs_mkdir+0x416/0x5f0 [ 317.775640][T13358] do_mkdirat+0x1f0/0x330 [ 317.779937][T13358] ? vfs_mkdir+0x5f0/0x5f0 [ 317.784326][T13358] do_syscall_64+0xcb/0x1e0 [ 317.788797][T13358] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 317.794695][T13358] RIP: 0033:0x7f1d6d50a817 [ 317.799081][T13358] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.818653][T13358] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 317.827031][T13358] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 317.834973][T13358] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 317.842915][T13358] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff 04:54:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2c, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 317.850852][T13358] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 317.858794][T13358] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:27 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 31) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) [ 317.930359][T13410] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 317.958209][T13409] tmpfs: Unknown parameter '' [ 317.965480][T13417] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 318.020703][T13431] FAULT_INJECTION: forcing a failure. [ 318.020703][T13431] name failslab, interval 1, probability 0, space 0, times 0 [ 318.034698][T13431] CPU: 1 PID: 13431 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 318.046321][T13431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.056358][T13431] Call Trace: [ 318.059641][T13431] dump_stack+0x1d8/0x24e [ 318.063962][T13431] ? devkmsg_release+0x11c/0x11c [ 318.068890][T13431] ? show_regs_print_info+0x12/0x12 [ 318.074062][T13431] ? should_fail+0x3b3/0x860 [ 318.078635][T13431] should_fail+0x6f6/0x860 [ 318.083044][T13431] ? setup_fault_attr+0x3d0/0x3d0 [ 318.088063][T13431] ? security_inode_alloc+0x32/0x1d0 [ 318.093339][T13431] should_failslab+0x5/0x20 [ 318.097832][T13431] kmem_cache_alloc+0x36/0x290 [ 318.102584][T13431] ? from_kuid_munged+0x3b0/0x3b0 [ 318.107580][T13431] ? ext4_alloc_inode+0x1d/0x620 [ 318.112488][T13431] security_inode_alloc+0x32/0x1d0 [ 318.117574][T13431] inode_init_always+0x387/0x810 [ 318.122490][T13431] ? set_qf_name+0x310/0x310 [ 318.127058][T13431] new_inode_pseudo+0x90/0x220 [ 318.131790][T13431] new_inode+0x25/0x1d0 [ 318.136093][T13431] ? memset+0x1f/0x40 [ 318.140086][T13431] __ext4_new_inode+0x303/0x6190 [ 318.144994][T13431] ? avc_has_perm_noaudit+0x30c/0x400 [ 318.150335][T13431] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 318.156023][T13431] ? memset+0x1f/0x40 [ 318.159972][T13431] ? __dquot_initialize+0x25e/0xe20 [ 318.165137][T13431] ? avc_has_perm+0xd2/0x270 [ 318.169692][T13431] ? avc_has_perm+0x173/0x270 [ 318.174342][T13431] ? security_transition_sid+0x78/0x90 [ 318.179769][T13431] ext4_mkdir+0x3ff/0x1580 [ 318.184156][T13431] ? ext4_symlink+0xf00/0xf00 [ 318.188802][T13431] ? security_inode_mkdir+0xdd/0x120 [ 318.194053][T13431] vfs_mkdir+0x416/0x5f0 [ 318.198308][T13431] do_mkdirat+0x1f0/0x330 [ 318.202607][T13431] ? vfs_mkdir+0x5f0/0x5f0 [ 318.206989][T13431] do_syscall_64+0xcb/0x1e0 [ 318.211460][T13431] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.217320][T13431] RIP: 0033:0x7f1d6d50a817 [ 318.221716][T13431] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.241287][T13431] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 318.249661][T13431] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 318.257683][T13431] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 318.265627][T13431] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 318.273575][T13431] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 318.281515][T13431] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r3 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r3, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r4, &(0x7f0000000340)='./file0\x00', r2, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r5, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2f, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x6}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x5, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:28 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x9, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:28 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 32) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:28 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xa, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x10}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x3c, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 318.737483][T13454] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 318.759779][T13457] FAULT_INJECTION: forcing a failure. [ 318.759779][T13457] name failslab, interval 1, probability 0, space 0, times 0 [ 318.773077][T13457] CPU: 0 PID: 13457 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:54:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x29}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 318.784693][T13457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.794736][T13457] Call Trace: [ 318.798017][T13457] dump_stack+0x1d8/0x24e [ 318.802345][T13457] ? devkmsg_release+0x11c/0x11c [ 318.807272][T13457] ? show_regs_print_info+0x12/0x12 [ 318.812461][T13457] should_fail+0x6f6/0x860 [ 318.816873][T13457] ? setup_fault_attr+0x3d0/0x3d0 [ 318.821886][T13457] ? security_inode_alloc+0x32/0x1d0 [ 318.827160][T13457] should_failslab+0x5/0x20 [ 318.831654][T13457] kmem_cache_alloc+0x36/0x290 04:54:28 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xb, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 318.836410][T13457] ? from_kuid_munged+0x3b0/0x3b0 [ 318.841427][T13457] security_inode_alloc+0x32/0x1d0 [ 318.846537][T13457] inode_init_always+0x387/0x810 [ 318.851460][T13457] ? set_qf_name+0x310/0x310 [ 318.856037][T13457] new_inode_pseudo+0x90/0x220 [ 318.860785][T13457] new_inode+0x25/0x1d0 [ 318.864932][T13457] ? memset+0x1f/0x40 [ 318.868909][T13457] __ext4_new_inode+0x303/0x6190 [ 318.873838][T13457] ? avc_has_perm_noaudit+0x30c/0x400 [ 318.879200][T13457] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 318.884907][T13457] ? memset+0x1f/0x40 [ 318.888879][T13457] ? __dquot_initialize+0x25e/0xe20 [ 318.894065][T13457] ? avc_has_perm+0xd2/0x270 [ 318.898637][T13457] ? avc_has_perm+0x173/0x270 [ 318.903305][T13457] ? security_transition_sid+0x78/0x90 [ 318.908755][T13457] ext4_mkdir+0x3ff/0x1580 [ 318.913168][T13457] ? ext4_symlink+0xf00/0xf00 [ 318.917837][T13457] ? security_inode_mkdir+0xdd/0x120 [ 318.923108][T13457] vfs_mkdir+0x416/0x5f0 [ 318.927347][T13457] do_mkdirat+0x1f0/0x330 [ 318.931671][T13457] ? vfs_mkdir+0x5f0/0x5f0 [ 318.936071][T13457] ? do_syscall_64+0x80/0x1e0 [ 318.940738][T13457] do_syscall_64+0xcb/0x1e0 [ 318.945231][T13457] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 318.951107][T13457] RIP: 0033:0x7f1d6d50a817 [ 318.955510][T13457] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.975098][T13457] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 318.983534][T13457] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 318.991518][T13457] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 318.999457][T13457] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 319.007396][T13457] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 319.015337][T13457] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 319.088805][T13506] tmpfs: Unknown parameter '' 04:54:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xc, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2b}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x44, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 33) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:29 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x8, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xd, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2c}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x58, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 319.816709][T13524] FAULT_INJECTION: forcing a failure. [ 319.816709][T13524] name failslab, interval 1, probability 0, space 0, times 0 [ 319.829410][T13524] CPU: 0 PID: 13524 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 319.841016][T13524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.851056][T13524] Call Trace: [ 319.854341][T13524] dump_stack+0x1d8/0x24e [ 319.858663][T13524] ? devkmsg_release+0x11c/0x11c [ 319.863592][T13524] ? show_regs_print_info+0x12/0x12 [ 319.868784][T13524] should_fail+0x6f6/0x860 [ 319.873192][T13524] ? setup_fault_attr+0x3d0/0x3d0 [ 319.878206][T13524] ? perf_pmu_nop_int+0x5/0x10 [ 319.882977][T13524] ? ebitmap_cmp+0x1b8/0x220 [ 319.887555][T13524] ? mls_compute_context_len+0x7dd/0x810 [ 319.893178][T13524] ? context_struct_to_string+0x43b/0x8b0 [ 319.898883][T13524] should_failslab+0x5/0x20 [ 319.903374][T13524] __kmalloc+0x5f/0x2f0 [ 319.907522][T13524] context_struct_to_string+0x43b/0x8b0 [ 319.913054][T13524] ? apic_timer_interrupt+0xa/0x20 [ 319.918153][T13524] ? security_bounded_transition+0x560/0x560 [ 319.924119][T13524] ? symhash+0xe0/0xe0 [ 319.928176][T13524] ? hashtab_search+0x1bf/0x200 [ 319.933023][T13524] context_add_hash+0x13f/0x270 [ 319.937868][T13524] ? security_sid_to_context_inval+0x40/0x40 [ 319.943831][T13524] ? mls_context_isvalid+0x98/0x380 [ 319.949018][T13524] ? policydb_context_isvalid+0x1b6/0x400 [ 319.954729][T13524] security_compute_sid+0x1142/0x1d00 [ 319.960094][T13524] ? security_transition_sid+0x90/0x90 04:54:29 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2f}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 319.965542][T13524] ? apic_timer_interrupt+0xa/0x20 [ 319.970637][T13524] ? xas_load+0x372/0x4f0 [ 319.974956][T13524] ? xas_load+0x4a6/0x4f0 [ 319.979278][T13524] ? chksum_update+0x41/0x90 [ 319.983855][T13524] ? crypto_shash_update+0x1ed/0x2b0 [ 319.989126][T13524] security_transition_sid+0x78/0x90 [ 319.994399][T13524] selinux_inode_init_security+0x4b7/0xaf0 [ 320.000195][T13524] ? selinux_inode_free_security+0x1d0/0x1d0 [ 320.006166][T13524] ? posix_acl_create+0x12f/0x400 [ 320.011179][T13524] ? security_inode_init_security+0x98/0x3a0 [ 320.017157][T13524] security_inode_init_security+0x15f/0x3a0 [ 320.023039][T13524] ? posix_acl_create+0x15f/0x400 [ 320.028049][T13524] ? ext4_init_security+0x40/0x40 [ 320.033064][T13524] ? security_dentry_create_files_as+0xd0/0xd0 [ 320.039213][T13524] ? ext4_init_acl+0x31e/0x360 [ 320.043965][T13524] ? prandom_u32+0x21a/0x240 [ 320.048538][T13524] __ext4_new_inode+0x4c66/0x6190 [ 320.053537][T13524] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 320.059225][T13524] ? avc_has_perm+0x173/0x270 [ 320.063871][T13524] ? security_transition_sid+0x78/0x90 [ 320.069334][T13524] ext4_mkdir+0x3ff/0x1580 [ 320.073735][T13524] ? ext4_symlink+0xf00/0xf00 [ 320.078510][T13524] ? filename_create+0x4c7/0x770 [ 320.083416][T13524] ? generic_permission+0x13a/0x490 [ 320.088584][T13524] ? security_inode_mkdir+0xdd/0x120 [ 320.093835][T13524] vfs_mkdir+0x416/0x5f0 [ 320.098048][T13524] do_mkdirat+0x1f0/0x330 [ 320.102348][T13524] ? vfs_mkdir+0x5f0/0x5f0 [ 320.106771][T13524] do_syscall_64+0xcb/0x1e0 [ 320.111244][T13524] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 320.117146][T13524] RIP: 0033:0x7f1d6d50a817 [ 320.121535][T13524] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.141137][T13524] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 320.149515][T13524] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 320.157456][T13524] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 320.165397][T13524] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 320.173334][T13524] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 320.181276][T13524] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 320.254950][T13576] tmpfs: Unknown parameter '' 04:54:30 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:30 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0xe0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x9, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3c}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x10, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 34) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:30 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x44}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xa, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x58}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x11, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x300, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xb, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 320.785826][T13596] FAULT_INJECTION: forcing a failure. [ 320.785826][T13596] name failslab, interval 1, probability 0, space 0, times 0 [ 320.798498][T13596] CPU: 1 PID: 13596 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 320.810105][T13596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.820144][T13596] Call Trace: [ 320.823519][T13596] dump_stack+0x1d8/0x24e [ 320.827832][T13596] ? devkmsg_release+0x11c/0x11c [ 320.832739][T13596] ? show_regs_print_info+0x12/0x12 [ 320.837903][T13596] ? ___preempt_schedule+0x16/0x20 [ 320.842984][T13596] should_fail+0x6f6/0x860 [ 320.847370][T13596] ? setup_fault_attr+0x3d0/0x3d0 [ 320.852359][T13596] ? ebitmap_cmp+0x1b8/0x220 [ 320.856916][T13596] ? mls_compute_context_len+0x7dd/0x810 [ 320.862522][T13596] ? context_struct_to_string+0x43b/0x8b0 [ 320.868227][T13596] should_failslab+0x5/0x20 [ 320.872714][T13596] __kmalloc+0x5f/0x2f0 [ 320.876852][T13596] context_struct_to_string+0x43b/0x8b0 [ 320.882393][T13596] ? security_bounded_transition+0x560/0x560 [ 320.888356][T13596] ? apic_timer_interrupt+0xa/0x20 [ 320.893447][T13596] ? sidtab_search_force+0x27f/0x320 [ 320.898701][T13596] security_sid_to_context_core+0x26e/0x380 [ 320.904565][T13596] selinux_inode_init_security+0x703/0xaf0 [ 320.910343][T13596] ? selinux_inode_free_security+0x1d0/0x1d0 [ 320.916289][T13596] ? get_cached_acl+0x10e/0x130 [ 320.921108][T13596] security_inode_init_security+0x15f/0x3a0 [ 320.926970][T13596] ? posix_acl_create+0x15f/0x400 [ 320.931964][T13596] ? ext4_init_security+0x40/0x40 [ 320.936958][T13596] ? security_dentry_create_files_as+0xd0/0xd0 [ 320.943080][T13596] ? ext4_init_acl+0x31e/0x360 [ 320.947877][T13596] ? prandom_u32+0x21a/0x240 [ 320.952435][T13596] __ext4_new_inode+0x4c66/0x6190 [ 320.957431][T13596] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 320.963116][T13596] ? __dquot_initialize+0x30/0xe20 [ 320.968198][T13596] ? memset_erms+0xb/0x10 [ 320.972495][T13596] ? avc_has_perm+0x173/0x270 [ 320.977141][T13596] ? security_transition_sid+0x78/0x90 [ 320.982564][T13596] ext4_mkdir+0x3ff/0x1580 [ 320.986955][T13596] ? ext4_symlink+0xf00/0xf00 [ 320.991610][T13596] ? filename_create+0x4c7/0x770 [ 320.996513][T13596] ? generic_permission+0x13a/0x490 [ 321.001678][T13596] ? security_inode_mkdir+0xdd/0x120 [ 321.006928][T13596] vfs_mkdir+0x416/0x5f0 [ 321.011141][T13596] do_mkdirat+0x1f0/0x330 [ 321.015441][T13596] ? vfs_mkdir+0x5f0/0x5f0 [ 321.019828][T13596] do_syscall_64+0xcb/0x1e0 [ 321.024301][T13596] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 321.030162][T13596] RIP: 0033:0x7f1d6d50a817 [ 321.034545][T13596] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.054125][T13596] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 321.062517][T13596] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 321.070460][T13596] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 321.078399][T13596] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 321.086342][T13596] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 321.094281][T13596] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 321.177473][T13627] tmpfs: Unknown parameter '' 04:54:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 35) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x600, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe0}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x12, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xc, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xd, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x25, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x1f4}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 321.650413][T13659] net_ratelimit: 11 callbacks suppressed [ 321.650423][T13659] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 321.695352][T13673] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 321.703915][T13658] FAULT_INJECTION: forcing a failure. [ 321.703915][T13658] name failslab, interval 1, probability 0, space 0, times 0 [ 321.717317][T13658] CPU: 1 PID: 13658 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 321.728930][T13658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.738973][T13658] Call Trace: 04:54:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2900, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x29, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x300}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 321.742252][T13658] dump_stack+0x1d8/0x24e [ 321.746575][T13658] ? devkmsg_release+0x11c/0x11c [ 321.751494][T13658] ? memset+0x1f/0x40 [ 321.755451][T13658] ? show_regs_print_info+0x12/0x12 [ 321.760659][T13658] ? __es_remove_extent+0xbba/0x23c0 [ 321.765912][T13658] should_fail+0x6f6/0x860 [ 321.770298][T13658] ? setup_fault_attr+0x3d0/0x3d0 [ 321.775291][T13658] ? __kmalloc+0x174/0x2f0 [ 321.779722][T13658] ? kcalloc+0x2b/0x40 [ 321.783768][T13658] ? ext4_find_extent+0x269/0xd50 [ 321.788760][T13658] ? ext4_ext_map_blocks+0x257/0x45b0 [ 321.794098][T13658] ? ext4_map_blocks+0x3bd/0x2030 [ 321.799107][T13658] ? ext4_bread+0x89/0x3b0 [ 321.803497][T13658] ? apic_timer_interrupt+0xa/0x20 [ 321.808583][T13658] ? __es_insert_extent+0x789/0x1720 [ 321.813838][T13658] should_failslab+0x5/0x20 [ 321.818312][T13658] kmem_cache_alloc+0x36/0x290 [ 321.823045][T13658] __es_insert_extent+0x789/0x1720 [ 321.828128][T13658] ? _raw_write_lock+0xa3/0x170 [ 321.832945][T13658] ? _raw_write_trylock+0x1b0/0x1b0 [ 321.838154][T13658] ext4_es_insert_extent+0x2db/0x2c20 [ 321.843495][T13658] ? apic_timer_interrupt+0xa/0x20 [ 321.848573][T13658] ? ext4_es_scan_clu+0x290/0x290 [ 321.853565][T13658] ? memset+0x1f/0x40 [ 321.857516][T13658] ? _raw_read_unlock+0x21/0x40 [ 321.862335][T13658] ? ext4_es_find_extent_range+0x4f/0x300 [ 321.868027][T13658] ext4_ext_map_blocks+0x13e9/0x45b0 [ 321.873284][T13658] ? apic_timer_interrupt+0xa/0x20 [ 321.878365][T13658] ? ext4_ext_release+0x10/0x10 [ 321.883196][T13658] ? check_preemption_disabled+0x9e/0x330 [ 321.888883][T13658] ? preempt_count_sub+0x2/0x160 [ 321.893787][T13658] ? __down_read+0xf1/0x210 [ 321.898269][T13658] ? _raw_read_unlock+0x21/0x40 [ 321.903106][T13658] ? ext4_es_lookup_extent+0x535/0x980 [ 321.908530][T13658] ext4_map_blocks+0x3bd/0x2030 [ 321.913350][T13658] ? ext4_issue_zeroout+0x160/0x160 [ 321.918518][T13658] ext4_getblk+0x116/0x500 [ 321.922908][T13658] ? ext4_get_block_trans+0x5a0/0x5a0 [ 321.928246][T13658] ext4_bread+0x89/0x3b0 [ 321.932455][T13658] ? ext4_getblk+0x500/0x500 [ 321.937018][T13658] ext4_append+0x153/0x2d0 [ 321.941412][T13658] ext4_mkdir+0x7b6/0x1580 [ 321.945800][T13658] ? ext4_symlink+0xf00/0xf00 [ 321.950446][T13658] ? filename_create+0x4c7/0x770 [ 321.955350][T13658] ? security_inode_mkdir+0xdd/0x120 [ 321.960605][T13658] vfs_mkdir+0x416/0x5f0 [ 321.964816][T13658] do_mkdirat+0x1f0/0x330 [ 321.969117][T13658] ? vfs_mkdir+0x5f0/0x5f0 [ 321.973511][T13658] do_syscall_64+0xcb/0x1e0 [ 321.977986][T13658] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 321.983848][T13658] RIP: 0033:0x7f1d6d50a817 [ 321.988233][T13658] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.007817][T13658] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 322.016200][T13658] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 322.024141][T13658] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 322.032093][T13658] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 322.040034][T13658] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 322.047972][T13658] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 322.091122][T13658] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 322.107891][T13658] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/556/file0 (deleted) supports timestamps until 2038 (0x7fffffff) [ 322.125343][T13695] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 322.134829][T13710] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 322.144303][T13702] tmpfs: Unknown parameter '' 04:54:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3e8}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2b, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2b00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 36) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:31 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x10, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x600}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:31 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2c00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 322.569043][T13732] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 322.576766][T13737] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 322.597184][T13729] FAULT_INJECTION: forcing a failure. [ 322.597184][T13729] name failslab, interval 1, probability 0, space 0, times 0 [ 322.610431][T13729] CPU: 0 PID: 13729 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 322.622054][T13729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.632094][T13729] Call Trace: [ 322.635380][T13729] dump_stack+0x1d8/0x24e [ 322.639701][T13729] ? devkmsg_release+0x11c/0x11c [ 322.644630][T13729] ? show_regs_print_info+0x12/0x12 [ 322.649823][T13729] should_fail+0x6f6/0x860 [ 322.654234][T13729] ? setup_fault_attr+0x3d0/0x3d0 [ 322.659251][T13729] ? kcalloc+0x2b/0x40 [ 322.663309][T13729] should_failslab+0x5/0x20 04:54:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x11, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 322.667804][T13729] __kmalloc+0x5f/0x2f0 [ 322.671952][T13729] kcalloc+0x2b/0x40 [ 322.675837][T13729] ext4_find_extent+0x269/0xd50 [ 322.680679][T13729] ? ext4_map_blocks+0xa1a/0x2030 [ 322.685693][T13729] ext4_ext_map_blocks+0x257/0x45b0 [ 322.690886][T13729] ? ext4_ext_release+0x10/0x10 [ 322.695726][T13729] ? check_preemption_disabled+0x9e/0x330 [ 322.701433][T13729] ? debug_smp_processor_id+0x20/0x20 [ 322.706800][T13729] ? ext4_es_lookup_extent+0x535/0x980 [ 322.712245][T13729] ext4_map_blocks+0xa99/0x2030 04:54:32 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2f, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 322.712579][T13756] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 322.717084][T13729] ? ext4_issue_zeroout+0x160/0x160 [ 322.717096][T13729] ext4_getblk+0x116/0x500 [ 322.717105][T13729] ? ext4_get_block_trans+0x5a0/0x5a0 [ 322.717121][T13729] ext4_bread+0x89/0x3b0 [ 322.741862][T13729] ? ext4_getblk+0x500/0x500 [ 322.746444][T13729] ext4_append+0x153/0x2d0 [ 322.750855][T13729] ext4_mkdir+0x7b6/0x1580 [ 322.755102][T13770] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 322.755259][T13729] ? ext4_symlink+0xf00/0xf00 [ 322.755270][T13729] ? security_inode_mkdir+0xdd/0x120 [ 322.755285][T13729] vfs_mkdir+0x416/0x5f0 [ 322.775014][T13729] do_mkdirat+0x1f0/0x330 [ 322.779338][T13729] ? vfs_mkdir+0x5f0/0x5f0 [ 322.783746][T13729] do_syscall_64+0xcb/0x1e0 [ 322.788245][T13729] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.794124][T13729] RIP: 0033:0x7f1d6d50a817 [ 322.798528][T13729] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.818120][T13729] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 322.826519][T13729] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 322.834477][T13729] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 322.842433][T13729] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 322.850396][T13729] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 322.858350][T13729] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 323.005422][T13780] tmpfs: Unknown parameter '' 04:54:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x12, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2900}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x2f00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:32 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:32 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 37) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x25, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2b00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:32 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x44, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x3c00, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 323.578662][T13792] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 323.585982][T13803] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:54:33 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x48, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x29, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 323.628833][T13796] FAULT_INJECTION: forcing a failure. [ 323.628833][T13796] name failslab, interval 1, probability 0, space 0, times 0 [ 323.668434][T13796] CPU: 0 PID: 13796 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 323.680059][T13796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.690097][T13796] Call Trace: [ 323.693376][T13796] dump_stack+0x1d8/0x24e [ 323.697698][T13796] ? devkmsg_release+0x11c/0x11c [ 323.702629][T13796] ? show_regs_print_info+0x12/0x12 [ 323.707815][T13796] ? ext4_evict_inode+0x1b10/0x1b10 [ 323.713003][T13796] ? __dquot_alloc_space+0x2e6/0xd70 [ 323.718273][T13796] ? ext4_bread+0x89/0x3b0 [ 323.722673][T13796] ? ext4_append+0x153/0x2d0 [ 323.727254][T13796] should_fail+0x6f6/0x860 [ 323.731663][T13796] ? setup_fault_attr+0x3d0/0x3d0 [ 323.736678][T13796] ? inode_io_list_move_locked+0x2bb/0x300 [ 323.742476][T13796] ? ext4_mb_new_blocks+0x304/0x2a10 [ 323.747746][T13796] should_failslab+0x5/0x20 [ 323.752240][T13796] kmem_cache_alloc+0x36/0x290 [ 323.757000][T13796] ext4_mb_new_blocks+0x304/0x2a10 [ 323.762100][T13796] ? apic_timer_interrupt+0xa/0x20 [ 323.767202][T13796] ? __irqentry_text_end+0x1fc3fa/0x1fc3fa [ 323.772998][T13796] ? ext4_find_extent+0x27a/0xd50 [ 323.778010][T13796] ? ext4_mb_pa_callback+0xc0/0xc0 [ 323.783112][T13796] ? ext4_inode_to_goal_block+0x261/0x370 [ 323.788824][T13796] ext4_ext_map_blocks+0x220b/0x45b0 [ 323.788839][T13796] ? apic_timer_interrupt+0xa/0x20 [ 323.796487][T13843] tmpfs: Unknown parameter '' [ 323.799185][T13796] ? ext4_ext_release+0x10/0x10 [ 323.808649][T13796] ? check_preemption_disabled+0x9e/0x330 [ 323.814350][T13796] ? apic_timer_interrupt+0xa/0x20 [ 323.819448][T13796] ? down_write+0xd8/0x150 [ 323.823843][T13796] ? check_memory_region+0x67/0x2e0 [ 323.829011][T13796] ? ext4_es_lookup_extent+0x535/0x980 [ 323.834435][T13796] ext4_map_blocks+0xa99/0x2030 [ 323.839257][T13796] ? ext4_issue_zeroout+0x160/0x160 [ 323.844427][T13796] ext4_getblk+0x116/0x500 [ 323.848811][T13796] ? ext4_get_block_trans+0x5a0/0x5a0 [ 323.854153][T13796] ext4_bread+0x89/0x3b0 [ 323.858363][T13796] ? ext4_getblk+0x500/0x500 [ 323.862926][T13796] ext4_append+0x153/0x2d0 [ 323.867310][T13796] ext4_mkdir+0x7b6/0x1580 [ 323.871697][T13796] ? ext4_symlink+0xf00/0xf00 [ 323.876341][T13796] vfs_mkdir+0x416/0x5f0 [ 323.880554][T13796] do_mkdirat+0x1f0/0x330 [ 323.884852][T13796] ? vfs_mkdir+0x5f0/0x5f0 [ 323.889239][T13796] do_syscall_64+0xcb/0x1e0 [ 323.893712][T13796] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 323.899571][T13796] RIP: 0033:0x7f1d6d50a817 [ 323.903957][T13796] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.923530][T13796] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 323.931906][T13796] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 323.939845][T13796] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 323.947784][T13796] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 323.955724][T13796] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 323.963662][T13796] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2b, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x4000, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2c00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 38) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2f00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x58, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:33 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x4400, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 324.560325][T13861] FAULT_INJECTION: forcing a failure. [ 324.560325][T13861] name failslab, interval 1, probability 0, space 0, times 0 [ 324.573457][T13861] CPU: 1 PID: 13861 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 324.585067][T13861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.595105][T13861] Call Trace: [ 324.598392][T13861] dump_stack+0x1d8/0x24e [ 324.602711][T13861] ? devkmsg_release+0x11c/0x11c [ 324.607634][T13861] ? memset+0x1f/0x40 [ 324.611605][T13861] ? show_regs_print_info+0x12/0x12 [ 324.616790][T13861] ? __es_remove_extent+0xdce/0x23c0 [ 324.622065][T13861] should_fail+0x6f6/0x860 [ 324.626471][T13861] ? setup_fault_attr+0x3d0/0x3d0 [ 324.631486][T13861] ? __es_insert_extent+0x789/0x1720 [ 324.636751][T13861] should_failslab+0x5/0x20 [ 324.641225][T13861] kmem_cache_alloc+0x36/0x290 [ 324.645955][T13861] __es_insert_extent+0x789/0x1720 [ 324.651035][T13861] ? _raw_write_trylock+0x1b0/0x1b0 [ 324.656201][T13861] ext4_es_insert_extent+0x2db/0x2c20 [ 324.661542][T13861] ? ext4_es_scan_clu+0x290/0x290 [ 324.666532][T13861] ? __irqentry_text_end+0x1fc3fa/0x1fc3fa [ 324.672391][T13861] ? ext4_map_blocks+0xb72/0x2030 [ 324.677382][T13861] ? ext4_map_blocks+0xb86/0x2030 [ 324.682377][T13861] ext4_map_blocks+0xf38/0x2030 [ 324.687202][T13861] ? __ext4_new_inode+0x45b1/0x6190 [ 324.692376][T13861] ? ext4_issue_zeroout+0x160/0x160 [ 324.697556][T13861] ext4_getblk+0x116/0x500 [ 324.701941][T13861] ? ext4_get_block_trans+0x5a0/0x5a0 [ 324.707280][T13861] ext4_bread+0x89/0x3b0 [ 324.711492][T13861] ? ext4_getblk+0x500/0x500 [ 324.716052][T13861] ? apic_timer_interrupt+0xa/0x20 [ 324.721130][T13861] ext4_append+0x153/0x2d0 [ 324.725513][T13861] ext4_mkdir+0x7b6/0x1580 [ 324.729903][T13861] ? ext4_symlink+0xf00/0xf00 [ 324.734548][T13861] ? security_inode_mkdir+0xdd/0x120 [ 324.739799][T13861] vfs_mkdir+0x416/0x5f0 [ 324.744012][T13861] do_mkdirat+0x1f0/0x330 [ 324.748307][T13861] ? vfs_mkdir+0x5f0/0x5f0 [ 324.752692][T13861] do_syscall_64+0xcb/0x1e0 [ 324.757161][T13861] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 324.763019][T13861] RIP: 0033:0x7f1d6d50a817 [ 324.767407][T13861] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 324.786980][T13861] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 324.795356][T13861] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 324.803324][T13861] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 324.811265][T13861] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 324.819206][T13861] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 324.827143][T13861] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:34 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x60, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2f, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 324.864915][T13861] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 324.883922][T13861] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/559/file0 (deleted) supports timestamps until 2038 (0x7fffffff) [ 324.954783][T13915] tmpfs: Unknown parameter '' 04:54:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:35 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x5800, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3c00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x64, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 39) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x44, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x68, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0xe000, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 325.761032][T13931] FAULT_INJECTION: forcing a failure. [ 325.761032][T13931] name failslab, interval 1, probability 0, space 0, times 0 [ 325.791003][T13931] CPU: 1 PID: 13931 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:54:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x48, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4400}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 325.802627][T13931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.812774][T13931] Call Trace: [ 325.816063][T13931] dump_stack+0x1d8/0x24e [ 325.820384][T13931] ? devkmsg_release+0x11c/0x11c [ 325.825310][T13931] ? show_regs_print_info+0x12/0x12 [ 325.830511][T13931] ? should_fail+0x3b3/0x860 [ 325.835092][T13931] should_fail+0x6f6/0x860 [ 325.839496][T13931] ? setup_fault_attr+0x3d0/0x3d0 [ 325.844509][T13931] ? mempool_alloc_slab+0x16/0x20 [ 325.849527][T13931] should_failslab+0x5/0x20 [ 325.854023][T13931] kmem_cache_alloc+0x36/0x290 [ 325.858777][T13931] ? debug_smp_processor_id+0x20/0x20 [ 325.864131][T13931] ? mempool_free+0x380/0x380 [ 325.868775][T13931] mempool_alloc_slab+0x16/0x20 [ 325.873591][T13931] mempool_alloc+0x113/0x680 [ 325.878149][T13931] ? xas_load+0x4a6/0x4f0 [ 325.882444][T13931] ? mempool_resize+0x900/0x900 [ 325.887261][T13931] ? find_get_entry+0x5be/0x650 [ 325.892079][T13931] bio_alloc_bioset+0x1db/0x640 [ 325.896901][T13931] ? check_preemption_disabled+0x154/0x330 [ 325.902676][T13931] ? bio_chain_endio+0x110/0x110 [ 325.907579][T13931] ? debug_smp_processor_id+0x20/0x20 [ 325.912916][T13931] submit_bh_wbc+0x1ba/0x790 [ 325.917472][T13931] ? lock_page_memcg+0x6a/0x130 [ 325.922288][T13931] ? mark_buffer_dirty+0x206/0x360 [ 325.927366][T13931] __sync_dirty_buffer+0x1d2/0x2d0 [ 325.932445][T13931] __ext4_handle_dirty_metadata+0x187/0x910 [ 325.938315][T13931] ? __ext4_journal_get_create_access+0x300/0x300 [ 325.944702][T13931] ? ext4_getblk+0x300/0x500 [ 325.949258][T13931] ? ext4_getblk+0x3c5/0x500 [ 325.953812][T13931] ext4_getblk+0x3f5/0x500 [ 325.958196][T13931] ? ext4_get_block_trans+0x5a0/0x5a0 [ 325.963533][T13931] ext4_bread+0x89/0x3b0 [ 325.967743][T13931] ? ext4_getblk+0x500/0x500 [ 325.972299][T13931] ? apic_timer_interrupt+0xa/0x20 [ 325.977377][T13931] ext4_append+0x153/0x2d0 [ 325.981771][T13931] ext4_mkdir+0x7b6/0x1580 [ 325.986167][T13931] ? ext4_symlink+0xf00/0xf00 [ 325.990812][T13931] ? security_inode_mkdir+0xdd/0x120 [ 325.996066][T13931] vfs_mkdir+0x416/0x5f0 [ 326.000278][T13931] do_mkdirat+0x1f0/0x330 [ 326.004583][T13931] ? vfs_mkdir+0x5f0/0x5f0 [ 326.008976][T13931] do_syscall_64+0xcb/0x1e0 [ 326.013450][T13931] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 326.019311][T13931] RIP: 0033:0x7f1d6d50a817 [ 326.023699][T13931] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 326.043268][T13931] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 326.051646][T13931] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 326.059588][T13931] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 326.067530][T13931] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 326.075478][T13931] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 326.083420][T13931] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 326.130289][T13931] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 326.147175][T13931] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/560/file0 (deleted) supports timestamps until 2038 (0x7fffffff) [ 326.183959][T13982] tmpfs: Unknown parameter '' 04:54:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x5800}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:36 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0xffff, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 40) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x58, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x74, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 326.951824][T14000] net_ratelimit: 10 callbacks suppressed [ 326.951834][T14000] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 326.964985][T14008] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 326.988403][T14001] FAULT_INJECTION: forcing a failure. [ 326.988403][T14001] name failslab, interval 1, probability 0, space 0, times 0 04:54:36 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7a, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 327.016841][T14001] CPU: 1 PID: 14001 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 327.028460][T14001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.038497][T14001] Call Trace: [ 327.041786][T14001] dump_stack+0x1d8/0x24e [ 327.046107][T14001] ? devkmsg_release+0x11c/0x11c [ 327.051034][T14001] ? ext4_append+0x153/0x2d0 [ 327.055614][T14001] ? show_regs_print_info+0x12/0x12 [ 327.060798][T14001] ? do_syscall_64+0xcb/0x1e0 [ 327.065465][T14001] should_fail+0x6f6/0x860 [ 327.069875][T14001] ? setup_fault_attr+0x3d0/0x3d0 [ 327.074885][T14001] ? __should_failslab+0x1/0x150 [ 327.079802][T14001] ? mempool_alloc_slab+0x16/0x20 [ 327.084816][T14001] should_failslab+0x5/0x20 [ 327.089297][T14001] kmem_cache_alloc+0x36/0x290 [ 327.094037][T14001] ? debug_smp_processor_id+0x20/0x20 [ 327.099386][T14001] ? mempool_free+0x380/0x380 [ 327.104030][T14001] mempool_alloc_slab+0x16/0x20 [ 327.108854][T14001] mempool_alloc+0x113/0x680 [ 327.113413][T14001] ? mempool_resize+0x900/0x900 [ 327.118239][T14001] ? find_get_entry+0x5be/0x650 [ 327.123066][T14001] bio_alloc_bioset+0x1db/0x640 [ 327.127886][T14001] ? check_preemption_disabled+0x154/0x330 [ 327.133660][T14001] ? bio_chain_endio+0x110/0x110 [ 327.138612][T14001] ? apic_timer_interrupt+0xa/0x20 [ 327.143691][T14001] submit_bh_wbc+0x1ba/0x790 [ 327.148247][T14001] ? lock_page_memcg+0x6a/0x130 [ 327.153066][T14001] ? mark_buffer_dirty+0x206/0x360 [ 327.158145][T14001] __sync_dirty_buffer+0x1d2/0x2d0 [ 327.163221][T14001] __ext4_handle_dirty_metadata+0x187/0x910 [ 327.169086][T14001] ? __ext4_journal_get_create_access+0x300/0x300 [ 327.175469][T14001] ? check_memory_region+0x7d/0x2e0 [ 327.180640][T14001] ext4_getblk+0x3f5/0x500 [ 327.185022][T14001] ? ext4_get_block_trans+0x5a0/0x5a0 [ 327.190360][T14001] ext4_bread+0x89/0x3b0 [ 327.194570][T14001] ? ext4_getblk+0x500/0x500 [ 327.199127][T14001] ? apic_timer_interrupt+0xa/0x20 [ 327.204202][T14001] ext4_append+0x153/0x2d0 [ 327.208588][T14001] ext4_mkdir+0x7b6/0x1580 [ 327.213027][T14001] ? ext4_symlink+0xf00/0xf00 [ 327.217670][T14001] ? filename_create+0x4c7/0x770 [ 327.222574][T14001] ? security_inode_mkdir+0xdd/0x120 [ 327.227824][T14001] vfs_mkdir+0x416/0x5f0 [ 327.232039][T14001] do_mkdirat+0x1f0/0x330 [ 327.236338][T14001] ? vfs_mkdir+0x5f0/0x5f0 [ 327.240721][T14001] do_syscall_64+0xcb/0x1e0 [ 327.245198][T14001] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 327.251057][T14001] RIP: 0033:0x7f1d6d50a817 [ 327.255438][T14001] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 327.275010][T14001] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 327.283388][T14001] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 327.291330][T14001] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 327.299269][T14001] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 327.307213][T14001] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 04:54:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x60, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 327.315155][T14001] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe803}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:36 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 327.344384][T14031] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 327.351977][T14042] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 327.415979][T14055] tmpfs: Unknown parameter '' 04:54:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x64, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 41) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:37 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x3, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xf401}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x1f4, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x1000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x68, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x4, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x300, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 328.226622][T14079] FAULT_INJECTION: forcing a failure. [ 328.226622][T14079] name failslab, interval 1, probability 0, space 0, times 0 [ 328.257598][T14079] CPU: 1 PID: 14079 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:54:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:37 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 328.269228][T14079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.279269][T14079] Call Trace: [ 328.282556][T14079] dump_stack+0x1d8/0x24e [ 328.286878][T14079] ? devkmsg_release+0x11c/0x11c [ 328.291810][T14079] ? show_regs_print_info+0x12/0x12 [ 328.296999][T14079] ? _raw_spin_unlock_irq+0x4a/0x60 [ 328.302190][T14079] ? finish_task_switch+0x130/0x550 [ 328.307379][T14079] should_fail+0x6f6/0x860 [ 328.311789][T14079] ? setup_fault_attr+0x3d0/0x3d0 [ 328.316804][T14079] ? is_mmconf_reserved+0x420/0x420 [ 328.321985][T14079] ? generic_make_request+0xcf5/0xda0 [ 328.327327][T14079] ? mempool_alloc_slab+0x16/0x20 [ 328.332428][T14079] should_failslab+0x5/0x20 [ 328.336902][T14079] kmem_cache_alloc+0x36/0x290 [ 328.341637][T14079] ? mempool_free+0x380/0x380 [ 328.346282][T14079] mempool_alloc_slab+0x16/0x20 [ 328.351109][T14079] mempool_alloc+0x113/0x680 [ 328.355678][T14079] ? mempool_resize+0x900/0x900 [ 328.360496][T14079] ? bit_wait+0xa0/0xa0 [ 328.364618][T14079] ? __wait_on_bit+0x190/0x190 [ 328.369352][T14079] bio_alloc_bioset+0x1db/0x640 [ 328.374172][T14079] ? apic_timer_interrupt+0xa/0x20 [ 328.379251][T14079] ? bio_chain_endio+0x110/0x110 [ 328.384194][T14079] ? submit_bh_wbc+0x161/0x790 [ 328.388932][T14079] ? submit_bh_wbc+0x197/0x790 [ 328.393665][T14079] submit_bh_wbc+0x1ba/0x790 [ 328.398229][T14079] ? lock_page_memcg+0x6a/0x130 [ 328.403047][T14079] ? mark_buffer_dirty+0x206/0x360 [ 328.408133][T14079] __sync_dirty_buffer+0x1d2/0x2d0 [ 328.413225][T14079] __ext4_handle_dirty_metadata+0x187/0x910 [ 328.419094][T14079] ? ext4_get_block_trans+0x5a0/0x5a0 [ 328.424438][T14079] ? __ext4_journal_get_create_access+0x300/0x300 [ 328.430886][T14079] ext4_handle_dirty_dirblock+0x35e/0x6e0 [ 328.436587][T14079] ? ext4_dirblock_csum_verify+0x700/0x700 [ 328.442370][T14079] ? ext4_append+0x21c/0x2d0 [ 328.446937][T14079] ext4_mkdir+0xbee/0x1580 [ 328.451330][T14079] ? ext4_symlink+0xf00/0xf00 [ 328.455977][T14079] ? filename_create+0x4c7/0x770 [ 328.460883][T14079] ? security_inode_mkdir+0xdd/0x120 [ 328.466138][T14079] vfs_mkdir+0x416/0x5f0 [ 328.470349][T14079] do_mkdirat+0x1f0/0x330 [ 328.474647][T14079] ? vfs_mkdir+0x5f0/0x5f0 [ 328.479036][T14079] do_syscall_64+0xcb/0x1e0 [ 328.483511][T14079] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 328.489378][T14079] RIP: 0033:0x7f1d6d50a817 [ 328.493765][T14079] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 328.513338][T14079] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 328.521719][T14079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 328.529663][T14079] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 328.537603][T14079] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 328.545546][T14079] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 328.553516][T14079] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 328.594345][T14079] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 328.608231][T14079] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/562/file0 (deleted) supports timestamps until 2038 (0x7fffffff) [ 328.654881][T14132] tmpfs: Unknown parameter '' 04:54:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:38 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x6, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3e8, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x74, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 42) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:38 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x500, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x10, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7a, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 329.454017][T14143] FAULT_INJECTION: forcing a failure. [ 329.454017][T14143] name failslab, interval 1, probability 0, space 0, times 0 04:54:38 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x600, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 329.493015][T14143] CPU: 0 PID: 14143 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 329.504656][T14143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.514698][T14143] Call Trace: [ 329.518007][T14143] dump_stack+0x1d8/0x24e [ 329.522336][T14143] ? show_regs_print_info+0x12/0x12 [ 329.527613][T14143] ? printk+0x100/0x114 [ 329.531885][T14143] should_fail+0x6f6/0x860 [ 329.536298][T14143] ? setup_fault_attr+0x3d0/0x3d0 [ 329.541313][T14143] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 329.546590][T14143] ? preempt_count_add+0x66/0x130 [ 329.551608][T14143] ? generic_make_request+0xcf5/0xda0 [ 329.556970][T14143] ? apic_timer_interrupt+0xa/0x20 [ 329.562077][T14143] ? mempool_alloc_slab+0x16/0x20 [ 329.567093][T14143] should_failslab+0x5/0x20 [ 329.571585][T14143] kmem_cache_alloc+0x36/0x290 [ 329.576340][T14143] ? mempool_resize+0x8a0/0x900 [ 329.581183][T14143] ? mempool_free+0x380/0x380 [ 329.585965][T14143] mempool_alloc_slab+0x16/0x20 [ 329.590804][T14143] mempool_alloc+0x113/0x680 [ 329.595389][T14143] ? __bio_add_page+0x270/0x430 [ 329.600231][T14143] ? mempool_resize+0x900/0x900 [ 329.605078][T14143] ? submit_bio+0x146/0x5d0 [ 329.609576][T14143] ? direct_make_request+0x440/0x440 [ 329.614850][T14143] bio_alloc_bioset+0x1db/0x640 [ 329.619707][T14143] ? apic_timer_interrupt+0xa/0x20 [ 329.624805][T14143] ? bio_chain_endio+0x110/0x110 [ 329.629730][T14143] ? submit_bh_wbc+0x18a/0x790 [ 329.634488][T14143] submit_bh_wbc+0x1ba/0x790 [ 329.639084][T14143] ? lock_page_memcg+0x6a/0x130 [ 329.643927][T14143] ? mark_buffer_dirty+0x206/0x360 [ 329.649022][T14143] __sync_dirty_buffer+0x1d2/0x2d0 [ 329.654155][T14143] __ext4_handle_dirty_metadata+0x187/0x910 [ 329.660306][T14143] ? ext4_get_block_trans+0x5a0/0x5a0 [ 329.665679][T14143] ? __ext4_journal_get_create_access+0x300/0x300 [ 329.672065][T14143] ext4_handle_dirty_dirblock+0x35e/0x6e0 [ 329.677754][T14143] ? ext4_dirblock_csum_verify+0x700/0x700 [ 329.683532][T14143] ? ext4_append+0x21c/0x2d0 [ 329.688094][T14143] ext4_mkdir+0xbee/0x1580 [ 329.692574][T14143] ? ext4_symlink+0xf00/0xf00 [ 329.697228][T14143] vfs_mkdir+0x416/0x5f0 [ 329.701447][T14143] do_mkdirat+0x1f0/0x330 [ 329.705760][T14143] ? vfs_mkdir+0x5f0/0x5f0 [ 329.710146][T14143] do_syscall_64+0xcb/0x1e0 [ 329.714624][T14143] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.720486][T14143] RIP: 0033:0x7f1d6d50a817 [ 329.725134][T14143] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 329.744711][T14143] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 329.753107][T14143] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50a817 [ 329.761050][T14143] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 329.769011][T14143] RBP: 00007f1d6b283040 R08: 0000000000000000 R09: ffffffffffffffff [ 329.776959][T14143] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 329.784909][T14143] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 329.865336][T14174] tmpfs: Unknown parameter '' 04:54:39 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x29, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x6000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:39 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x700, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x1f4, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 43) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:39 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2b, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x900, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x10000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x300, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 330.384596][T14225] FAULT_INJECTION: forcing a failure. [ 330.384596][T14225] name failslab, interval 1, probability 0, space 0, times 0 [ 330.398283][T14225] CPU: 1 PID: 14225 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 330.409908][T14225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.419954][T14225] Call Trace: [ 330.423241][T14225] dump_stack+0x1d8/0x24e [ 330.427576][T14225] ? devkmsg_release+0x11c/0x11c [ 330.432509][T14225] ? show_regs_print_info+0x12/0x12 [ 330.437695][T14225] should_fail+0x6f6/0x860 [ 330.442090][T14225] ? setup_fault_attr+0x3d0/0x3d0 [ 330.447083][T14225] ? check_preemption_disabled+0x154/0x330 [ 330.452857][T14225] ? debug_smp_processor_id+0x20/0x20 [ 330.458197][T14225] ? ksys_mount+0x30/0xf0 [ 330.462506][T14225] should_failslab+0x5/0x20 [ 330.466988][T14225] __kmalloc_track_caller+0x5d/0x2e0 [ 330.472250][T14225] ? strnlen_user+0x186/0x210 [ 330.476898][T14225] strndup_user+0x73/0x150 [ 330.481286][T14225] ksys_mount+0x30/0xf0 [ 330.485409][T14225] __x64_sys_mount+0xb1/0xc0 [ 330.489970][T14225] do_syscall_64+0xcb/0x1e0 [ 330.494446][T14225] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 330.500310][T14225] RIP: 0033:0x7f1d6d50cc2a [ 330.504697][T14225] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 330.524269][T14225] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:54:39 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xa00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3e8, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:39 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x29000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 330.532648][T14225] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 330.540590][T14225] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 330.548533][T14225] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 330.556476][T14225] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 330.564424][T14225] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 330.701333][T14251] tmpfs: Unknown parameter '' 04:54:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:40 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:40 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 44) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:40 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xb00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2b000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x500, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:40 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xc00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x600, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2c000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:40 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2f, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 331.467517][T14301] FAULT_INJECTION: forcing a failure. [ 331.467517][T14301] name failslab, interval 1, probability 0, space 0, times 0 [ 331.496361][T14301] CPU: 0 PID: 14301 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:54:40 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xd00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 331.507989][T14301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.518034][T14301] Call Trace: [ 331.521330][T14301] dump_stack+0x1d8/0x24e [ 331.525651][T14301] ? devkmsg_release+0x11c/0x11c [ 331.530590][T14301] ? show_regs_print_info+0x12/0x12 [ 331.535784][T14301] should_fail+0x6f6/0x860 [ 331.540194][T14301] ? setup_fault_attr+0x3d0/0x3d0 [ 331.545213][T14301] ? ksys_mount+0x62/0xf0 [ 331.549534][T14301] should_failslab+0x5/0x20 [ 331.554201][T14301] __kmalloc_track_caller+0x5d/0x2e0 [ 331.559475][T14301] ? strnlen_user+0x186/0x210 04:54:40 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 331.564144][T14301] strndup_user+0x73/0x150 [ 331.568550][T14301] ksys_mount+0x62/0xf0 [ 331.572733][T14301] __x64_sys_mount+0xb1/0xc0 [ 331.577320][T14301] do_syscall_64+0xcb/0x1e0 [ 331.581823][T14301] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 331.587707][T14301] RIP: 0033:0x7f1d6d50cc2a [ 331.592110][T14301] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 331.611698][T14301] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 331.620099][T14301] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 331.628058][T14301] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 331.636018][T14301] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 331.643978][T14301] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 331.651941][T14301] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 331.782775][T14314] tmpfs: Unknown parameter '' 04:54:41 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x1100, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2f000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x700, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x3c, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:41 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 45) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:41 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x1200, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x44, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x900, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3c000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x58, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 332.408148][T14363] FAULT_INJECTION: forcing a failure. [ 332.408148][T14363] name failslab, interval 1, probability 0, space 0, times 0 [ 332.440367][T14363] CPU: 1 PID: 14363 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:54:41 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:41 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xa00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 332.451992][T14363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.462030][T14363] Call Trace: [ 332.465314][T14363] dump_stack+0x1d8/0x24e [ 332.469636][T14363] ? devkmsg_release+0x11c/0x11c [ 332.474569][T14363] ? show_regs_print_info+0x12/0x12 [ 332.479760][T14363] should_fail+0x6f6/0x860 [ 332.484167][T14363] ? setup_fault_attr+0x3d0/0x3d0 [ 332.489184][T14363] ? copy_mount_options+0x59/0x300 [ 332.494289][T14363] should_failslab+0x5/0x20 [ 332.498782][T14363] kmem_cache_alloc_trace+0x39/0x2b0 [ 332.504050][T14363] ? __virt_addr_valid+0x1fd/0x290 [ 332.509134][T14363] copy_mount_options+0x59/0x300 [ 332.514046][T14363] ? ksys_mount+0x8f/0xf0 [ 332.518343][T14363] ksys_mount+0x97/0xf0 [ 332.522508][T14363] __x64_sys_mount+0xb1/0xc0 [ 332.527069][T14363] do_syscall_64+0xcb/0x1e0 [ 332.531568][T14363] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.537430][T14363] RIP: 0033:0x7f1d6d50cc2a [ 332.541819][T14363] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 332.561396][T14363] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 332.569781][T14363] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 332.577724][T14363] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 332.585716][T14363] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 332.593669][T14363] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 04:54:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x40000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 46) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) [ 332.601619][T14363] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 332.960933][T14430] FAULT_INJECTION: forcing a failure. [ 332.960933][T14430] name failslab, interval 1, probability 0, space 0, times 0 [ 332.978025][T14430] CPU: 0 PID: 14430 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 332.989653][T14430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.999698][T14430] Call Trace: [ 333.002991][T14430] dump_stack+0x1d8/0x24e [ 333.007292][T14430] ? devkmsg_release+0x11c/0x11c [ 333.012201][T14430] ? show_regs_print_info+0x12/0x12 [ 333.017367][T14430] should_fail+0x6f6/0x860 [ 333.021753][T14430] ? setup_fault_attr+0x3d0/0x3d0 [ 333.026750][T14430] ? __schedule+0x9b8/0x1170 [ 333.031321][T14430] ? getname_flags+0xba/0x640 [ 333.035971][T14430] should_failslab+0x5/0x20 [ 333.040444][T14430] kmem_cache_alloc+0x36/0x290 [ 333.045175][T14430] getname_flags+0xba/0x640 [ 333.049647][T14430] user_path_at_empty+0x28/0x50 [ 333.054468][T14430] do_mount+0x15c/0x2670 [ 333.058683][T14430] ? copy_mount_string+0x30/0x30 [ 333.063590][T14430] ? copy_mount_options+0x1d8/0x300 [ 333.068755][T14430] ? copy_mount_options+0x210/0x300 [ 333.073924][T14430] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 333.080045][T14430] ? copy_mount_options+0x273/0x300 [ 333.085210][T14430] ksys_mount+0xc2/0xf0 [ 333.089333][T14430] __x64_sys_mount+0xb1/0xc0 [ 333.093892][T14430] do_syscall_64+0xcb/0x1e0 [ 333.098366][T14430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 333.104231][T14430] RIP: 0033:0x7f1d6d50cc2a [ 333.108709][T14430] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 333.128286][T14430] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.136667][T14430] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 333.144607][T14430] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 333.152546][T14430] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 333.160486][T14430] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 333.168426][T14430] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:42 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2500, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xb00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x44000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0xe0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 47) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:42 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xc00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x58000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x300, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2900, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:42 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xd00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 333.434084][T14443] FAULT_INJECTION: forcing a failure. [ 333.434084][T14443] name failslab, interval 1, probability 0, space 0, times 0 [ 333.460978][T14443] CPU: 1 PID: 14443 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 333.472614][T14443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.482665][T14443] Call Trace: [ 333.485953][T14443] dump_stack+0x1d8/0x24e [ 333.490276][T14443] ? devkmsg_release+0x11c/0x11c [ 333.495206][T14443] ? show_regs_print_info+0x12/0x12 [ 333.500393][T14443] should_fail+0x6f6/0x860 [ 333.504785][T14443] ? setup_fault_attr+0x3d0/0x3d0 [ 333.509784][T14443] ? alloc_fs_context+0x60/0x610 [ 333.514692][T14443] should_failslab+0x5/0x20 [ 333.519165][T14443] kmem_cache_alloc_trace+0x39/0x2b0 [ 333.524419][T14443] ? __module_get+0x130/0x130 [ 333.529065][T14443] alloc_fs_context+0x60/0x610 [ 333.533802][T14443] ? _raw_read_unlock+0x21/0x40 [ 333.538622][T14443] do_mount+0x141d/0x2670 [ 333.543022][T14443] ? copy_mount_string+0x30/0x30 [ 333.547931][T14443] ? apic_timer_interrupt+0xa/0x20 [ 333.553013][T14443] ? copy_mount_options+0x1c6/0x300 [ 333.558178][T14443] ? copy_mount_options+0x273/0x300 [ 333.563344][T14443] ksys_mount+0xc2/0xf0 [ 333.567469][T14443] __x64_sys_mount+0xb1/0xc0 [ 333.572028][T14443] do_syscall_64+0xcb/0x1e0 [ 333.576502][T14443] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 333.582368][T14443] RIP: 0033:0x7f1d6d50cc2a [ 333.586757][T14443] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 333.606340][T14443] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.614718][T14443] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 333.622659][T14443] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 04:54:43 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x600, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 333.630598][T14443] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 333.638628][T14443] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 333.646566][T14443] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x89ffffff}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:43 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2b00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:43 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 48) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:43 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:43 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2900, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:43 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe0000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:43 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x1100, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:43 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2b00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 334.595474][T14519] FAULT_INJECTION: forcing a failure. [ 334.595474][T14519] name failslab, interval 1, probability 0, space 0, times 0 [ 334.616956][T14519] CPU: 0 PID: 14519 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 334.628586][T14519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.638631][T14519] Call Trace: 04:54:44 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe8030000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 334.641917][T14519] dump_stack+0x1d8/0x24e [ 334.646240][T14519] ? devkmsg_release+0x11c/0x11c [ 334.651169][T14519] ? show_regs_print_info+0x12/0x12 [ 334.656368][T14519] should_fail+0x6f6/0x860 [ 334.660780][T14519] ? setup_fault_attr+0x3d0/0x3d0 [ 334.665795][T14519] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 334.671938][T14519] ? legacy_init_fs_context+0x4d/0xb0 [ 334.677304][T14519] should_failslab+0x5/0x20 [ 334.681803][T14519] kmem_cache_alloc_trace+0x39/0x2b0 [ 334.687078][T14519] legacy_init_fs_context+0x4d/0xb0 [ 334.692267][T14519] alloc_fs_context+0x51e/0x610 [ 334.697110][T14519] do_mount+0x141d/0x2670 [ 334.701441][T14519] ? copy_mount_string+0x30/0x30 [ 334.706373][T14519] ? copy_mount_options+0x1d8/0x300 [ 334.711561][T14519] ? copy_mount_options+0x210/0x300 [ 334.716756][T14519] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 334.722896][T14519] ? copy_mount_options+0x273/0x300 [ 334.728086][T14519] ksys_mount+0xc2/0xf0 [ 334.732230][T14519] __x64_sys_mount+0xb1/0xc0 [ 334.736809][T14519] do_syscall_64+0xcb/0x1e0 [ 334.741304][T14519] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 334.747185][T14519] RIP: 0033:0x7f1d6d50cc2a [ 334.751591][T14519] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 334.771180][T14519] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 334.779576][T14519] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 334.787532][T14519] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 334.795488][T14519] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 334.803442][T14519] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 334.811395][T14519] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), 0x0, 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:44 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x2f00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xf4010000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2f00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x1200, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 49) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:44 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xffffff89}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:44 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x3c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x4000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 335.636808][T14595] FAULT_INJECTION: forcing a failure. [ 335.636808][T14595] name failslab, interval 1, probability 0, space 0, times 0 [ 335.688310][T14595] CPU: 1 PID: 14595 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 335.700028][T14595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.710058][T14595] Call Trace: [ 335.713327][T14595] dump_stack+0x1d8/0x24e [ 335.717627][T14595] ? devkmsg_release+0x11c/0x11c [ 335.722539][T14595] ? show_regs_print_info+0x12/0x12 [ 335.727711][T14595] should_fail+0x6f6/0x860 [ 335.732097][T14595] ? setup_fault_attr+0x3d0/0x3d0 [ 335.737091][T14595] ? vfs_parse_fs_string+0x180/0x290 [ 335.742345][T14595] should_failslab+0x5/0x20 [ 335.746822][T14595] __kmalloc_track_caller+0x5d/0x2e0 [ 335.752080][T14595] kmemdup_nul+0x27/0xa0 [ 335.756293][T14595] vfs_parse_fs_string+0x180/0x290 [ 335.761373][T14595] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 335.766885][T14595] ? logfc+0x6c0/0x6c0 [ 335.770922][T14595] ? __irqentry_text_end+0x1fc3fa/0x1fc3fa [ 335.776695][T14595] ? do_mount+0x15d7/0x2670 [ 335.781177][T14595] do_mount+0x1678/0x2670 [ 335.785483][T14595] ? copy_mount_string+0x30/0x30 [ 335.790405][T14595] ? copy_mount_options+0x1d8/0x300 [ 335.795581][T14595] ? copy_mount_options+0x210/0x300 [ 335.800857][T14595] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 335.807112][T14595] ? copy_mount_options+0x273/0x300 [ 335.812280][T14595] ksys_mount+0xc2/0xf0 [ 335.816418][T14595] __x64_sys_mount+0xb1/0xc0 [ 335.820983][T14595] do_syscall_64+0xcb/0x1e0 [ 335.825466][T14595] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 335.831330][T14595] RIP: 0033:0x7f1d6d50cc2a [ 335.835755][T14595] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 335.855329][T14595] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.863708][T14595] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 335.871650][T14595] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 335.879594][T14595] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 335.887534][T14595] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 335.895489][T14595] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 336.137424][T14630] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 336.152299][T14636] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 336.156987][T14637] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 336.169535][T14640] sit: non-ECT from 0.0.0.0 with TOS=0x2 04:54:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), 0x0, 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:45 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2500, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xffffffff}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 50) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x4400, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4400, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x5800, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2900, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4800, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 336.576592][T14655] FAULT_INJECTION: forcing a failure. [ 336.576592][T14655] name failslab, interval 1, probability 0, space 0, times 0 [ 336.724542][T14655] CPU: 1 PID: 14655 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 336.736174][T14655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.746216][T14655] Call Trace: [ 336.749494][T14655] dump_stack+0x1d8/0x24e [ 336.753809][T14655] ? devkmsg_release+0x11c/0x11c [ 336.758725][T14655] ? show_regs_print_info+0x12/0x12 [ 336.763905][T14655] should_fail+0x6f6/0x860 [ 336.768303][T14655] ? setup_fault_attr+0x3d0/0x3d0 04:54:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0xe000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2b00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 336.773314][T14655] ? vfs_parse_fs_string+0x180/0x290 [ 336.778578][T14655] should_failslab+0x5/0x20 [ 336.783059][T14655] __kmalloc_track_caller+0x5d/0x2e0 [ 336.788332][T14655] kmemdup_nul+0x27/0xa0 [ 336.792563][T14655] vfs_parse_fs_string+0x180/0x290 [ 336.797664][T14655] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 336.803198][T14655] ? logfc+0x6c0/0x6c0 [ 336.807243][T14655] ? __module_put_and_exit+0x20/0x20 [ 336.812496][T14655] ? alloc_fs_context+0x532/0x610 [ 336.817487][T14655] do_mount+0x1678/0x2670 [ 336.821844][T14655] ? copy_mount_string+0x30/0x30 [ 336.826748][T14655] ? apic_timer_interrupt+0xa/0x20 [ 336.831825][T14655] ? copy_mount_options+0x1c6/0x300 [ 336.836989][T14655] ? copy_mount_options+0x273/0x300 [ 336.842154][T14655] ksys_mount+0xc2/0xf0 [ 336.846278][T14655] __x64_sys_mount+0xb1/0xc0 [ 336.850836][T14655] do_syscall_64+0xcb/0x1e0 [ 336.855305][T14655] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 336.861163][T14655] RIP: 0033:0x7f1d6d50cc2a [ 336.865544][T14655] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 336.885114][T14655] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 336.893491][T14655] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 336.901431][T14655] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 336.909371][T14655] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 336.917310][T14655] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 336.925247][T14655] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:46 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0xffff, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), 0x0, 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:46 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 51) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:46 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x5800, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x2f00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:46 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 337.445046][T14732] FAULT_INJECTION: forcing a failure. [ 337.445046][T14732] name failslab, interval 1, probability 0, space 0, times 0 [ 337.522766][T14732] CPU: 1 PID: 14732 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 337.534394][T14732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.544432][T14732] Call Trace: [ 337.547712][T14732] dump_stack+0x1d8/0x24e [ 337.552028][T14732] ? devkmsg_release+0x11c/0x11c [ 337.556952][T14732] ? show_regs_print_info+0x12/0x12 [ 337.562135][T14732] should_fail+0x6f6/0x860 [ 337.566537][T14732] ? setup_fault_attr+0x3d0/0x3d0 [ 337.571552][T14732] ? vfs_parse_fs_string+0x180/0x290 [ 337.576820][T14732] should_failslab+0x5/0x20 [ 337.581314][T14732] __kmalloc_track_caller+0x5d/0x2e0 [ 337.586583][T14732] kmemdup_nul+0x27/0xa0 [ 337.590805][T14732] vfs_parse_fs_string+0x180/0x290 [ 337.595906][T14732] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 337.601438][T14732] ? logfc+0x6c0/0x6c0 [ 337.605494][T14732] ? __module_put_and_exit+0x20/0x20 [ 337.610761][T14732] ? alloc_fs_context+0x532/0x610 [ 337.615768][T14732] do_mount+0x1678/0x2670 04:54:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 337.620085][T14732] ? copy_mount_string+0x30/0x30 [ 337.625014][T14732] ? apic_timer_interrupt+0xa/0x20 [ 337.630126][T14732] ? copy_mount_options+0x1c6/0x300 [ 337.635741][T14732] ? copy_mount_options+0x273/0x300 [ 337.640928][T14732] ksys_mount+0xc2/0xf0 [ 337.645075][T14732] __x64_sys_mount+0xb1/0xc0 [ 337.649660][T14732] do_syscall_64+0xcb/0x1e0 [ 337.654136][T14732] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 337.660006][T14732] RIP: 0033:0x7f1d6d50cc2a [ 337.664391][T14732] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 337.683961][T14732] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 337.692338][T14732] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 337.700289][T14732] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 337.708236][T14732] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 04:54:47 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x3c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 52) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) [ 337.716185][T14732] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 337.724133][T14732] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 337.747226][T14763] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 337.760542][T14766] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 337.863933][T14786] FAULT_INJECTION: forcing a failure. [ 337.863933][T14786] name failslab, interval 1, probability 0, space 0, times 0 [ 337.877257][T14786] CPU: 1 PID: 14786 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 337.888931][T14786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.898959][T14786] Call Trace: [ 337.902227][T14786] dump_stack+0x1d8/0x24e [ 337.906527][T14786] ? devkmsg_release+0x11c/0x11c [ 337.911432][T14786] ? ksys_mount+0xc2/0xf0 [ 337.915727][T14786] ? show_regs_print_info+0x12/0x12 [ 337.920895][T14786] should_fail+0x6f6/0x860 [ 337.925280][T14786] ? setup_fault_attr+0x3d0/0x3d0 [ 337.930273][T14786] ? avc_has_perm_noaudit+0x30c/0x400 [ 337.935611][T14786] ? getname_kernel+0x55/0x2d0 [ 337.940342][T14786] should_failslab+0x5/0x20 [ 337.944811][T14786] kmem_cache_alloc+0x36/0x290 [ 337.949547][T14786] getname_kernel+0x55/0x2d0 [ 337.954116][T14786] kern_path+0x19/0x40 [ 337.958176][T14786] blkdev_get_by_path+0xc7/0x2e0 [ 337.963105][T14786] ? apic_timer_interrupt+0xa/0x20 [ 337.968197][T14786] ? __blkdev_get+0x1bb0/0x1bb0 [ 337.973017][T14786] ? ext4_mount+0x40/0x40 [ 337.977313][T14786] mount_bdev+0x49/0x340 [ 337.981526][T14786] legacy_get_tree+0xde/0x170 [ 337.986172][T14786] ? ext4_lazyinit_thread+0xd40/0xd40 [ 337.991510][T14786] vfs_get_tree+0x83/0x260 [ 337.995892][T14786] do_mount+0x19d0/0x2670 [ 338.000192][T14786] ? copy_mount_string+0x30/0x30 [ 338.005097][T14786] ? copy_mount_options+0x1d8/0x300 [ 338.010268][T14786] ? copy_mount_options+0x210/0x300 [ 338.015437][T14786] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 338.020950][T14786] ? copy_mount_options+0x273/0x300 [ 338.026124][T14786] ksys_mount+0xc2/0xf0 [ 338.030252][T14786] __x64_sys_mount+0xb1/0xc0 [ 338.034812][T14786] do_syscall_64+0xcb/0x1e0 [ 338.039285][T14786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 338.045145][T14786] RIP: 0033:0x7f1d6d50cc2a [ 338.049527][T14786] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 338.069103][T14786] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 338.077526][T14786] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 338.085472][T14786] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 338.093413][T14786] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 338.101355][T14786] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 338.109312][T14786] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:47 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x2, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6400, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 53) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:47 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6800, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4400, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 338.277595][T14799] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 338.286254][T14815] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 338.302620][T14804] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 338.311200][T14807] FAULT_INJECTION: forcing a failure. [ 338.311200][T14807] name failslab, interval 1, probability 0, space 0, times 0 [ 338.326720][T14819] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 338.332873][T14807] CPU: 0 PID: 14807 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 338.344493][T14807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.354533][T14807] Call Trace: [ 338.357815][T14807] dump_stack+0x1d8/0x24e [ 338.362138][T14807] ? devkmsg_release+0x11c/0x11c [ 338.367070][T14807] ? show_regs_print_info+0x12/0x12 [ 338.372264][T14807] should_fail+0x6f6/0x860 [ 338.376673][T14807] ? setup_fault_attr+0x3d0/0x3d0 [ 338.381687][T14807] ? apic_timer_interrupt+0xa/0x20 [ 338.386787][T14807] ? selinux_sb_alloc_security+0x4f/0x200 [ 338.392494][T14807] should_failslab+0x5/0x20 [ 338.396984][T14807] kmem_cache_alloc_trace+0x39/0x2b0 [ 338.402257][T14807] ? selinux_sb_alloc_security+0x11/0x200 [ 338.407969][T14807] selinux_sb_alloc_security+0x4f/0x200 [ 338.413504][T14807] security_sb_alloc+0x50/0xb0 [ 338.418256][T14807] alloc_super+0x133/0x750 [ 338.422665][T14807] ? mount_bdev+0x340/0x340 [ 338.427160][T14807] sget+0x20e/0x4e0 [ 338.430960][T14807] ? test_bdev_super+0x40/0x40 [ 338.435714][T14807] mount_bdev+0xe3/0x340 [ 338.439948][T14807] ? ext4_mount+0x40/0x40 [ 338.444266][T14807] legacy_get_tree+0xde/0x170 [ 338.448939][T14807] ? ext4_lazyinit_thread+0xd40/0xd40 [ 338.454311][T14807] vfs_get_tree+0x83/0x260 [ 338.458716][T14807] do_mount+0x19d0/0x2670 [ 338.463035][T14807] ? copy_mount_string+0x30/0x30 [ 338.467963][T14807] ? copy_mount_options+0x1d8/0x300 [ 338.473150][T14807] ? copy_mount_options+0x210/0x300 04:54:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4800, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x4c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 338.478511][T14807] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 338.484045][T14807] ? copy_mount_options+0x273/0x300 [ 338.489329][T14807] ksys_mount+0xc2/0xf0 [ 338.493472][T14807] __x64_sys_mount+0xb1/0xc0 [ 338.498052][T14807] do_syscall_64+0xcb/0x1e0 [ 338.502542][T14807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 338.508428][T14807] RIP: 0033:0x7f1d6d50cc2a [ 338.512835][T14807] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 338.532432][T14807] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 338.540831][T14807] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 338.548785][T14807] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 338.556728][T14807] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 338.564669][T14807] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 338.572608][T14807] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:48 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x5800, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:48 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x3, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 54) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:48 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7400, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x4, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x6, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:48 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7a00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 339.531308][T14875] FAULT_INJECTION: forcing a failure. [ 339.531308][T14875] name failslab, interval 1, probability 0, space 0, times 0 [ 339.561501][T14875] CPU: 1 PID: 14875 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 339.573129][T14875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.583173][T14875] Call Trace: [ 339.586457][T14875] dump_stack+0x1d8/0x24e [ 339.590780][T14875] ? devkmsg_release+0x11c/0x11c [ 339.595711][T14875] ? show_regs_print_info+0x12/0x12 [ 339.600905][T14875] should_fail+0x6f6/0x860 [ 339.605312][T14875] ? setup_fault_attr+0x3d0/0x3d0 [ 339.610327][T14875] ? apic_timer_interrupt+0xa/0x20 [ 339.615427][T14875] ? inotify_handle_event+0x252/0x5c0 [ 339.620785][T14875] should_failslab+0x5/0x20 [ 339.625280][T14875] __kmalloc+0x5f/0x2f0 [ 339.629424][T14875] inotify_handle_event+0x252/0x5c0 [ 339.634604][T14875] fsnotify+0xdd7/0x13f0 [ 339.638831][T14875] ? do_lock_file_wait+0x370/0x370 [ 339.643927][T14875] ? __fsnotify_parent+0x310/0x310 [ 339.649023][T14875] __fput+0x196/0x6c0 [ 339.652990][T14875] task_work_run+0x186/0x1b0 [ 339.657581][T14875] prepare_exit_to_usermode+0x2b0/0x310 [ 339.663110][T14875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 339.668993][T14875] RIP: 0033:0x7f1d6d4be51b [ 339.673389][T14875] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 339.692971][T14875] RSP: 002b:00007f1d6b282f90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 339.701363][T14875] RAX: 0000000000000000 RBX: 0000000020000200 RCX: 00007f1d6d4be51b [ 339.709407][T14875] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 339.717365][T14875] RBP: 00007f1d6b2836bc R08: 0000000000000000 R09: 0000000020000000 04:54:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6400, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 339.725322][T14875] R10: 0000000000000000 R11: 0000000000000293 R12: ffffffffffffffff [ 339.733275][T14875] R13: 0000000000000002 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x10, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:49 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:49 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 55) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6800, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:49 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x29, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x6c00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:49 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe803, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 340.080601][T14955] FAULT_INJECTION: forcing a failure. [ 340.080601][T14955] name failslab, interval 1, probability 0, space 0, times 0 [ 340.099608][T14955] CPU: 0 PID: 14955 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 340.111322][T14955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.121363][T14955] Call Trace: [ 340.124652][T14955] dump_stack+0x1d8/0x24e 04:54:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x2, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 340.128979][T14955] ? devkmsg_release+0x11c/0x11c [ 340.133912][T14955] ? show_regs_print_info+0x12/0x12 [ 340.139103][T14955] ? idr_get_free+0x740/0x900 [ 340.143774][T14955] should_fail+0x6f6/0x860 [ 340.148185][T14955] ? setup_fault_attr+0x3d0/0x3d0 [ 340.153197][T14955] ? __down_read+0xf1/0x210 [ 340.157693][T14955] ? __list_lru_init+0xa7/0x550 [ 340.162540][T14955] should_failslab+0x5/0x20 [ 340.162556][T14955] kmem_cache_alloc_trace+0x39/0x2b0 [ 340.172309][T14955] ? apic_timer_interrupt+0xa/0x20 04:54:49 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7400, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 340.177410][T14955] __list_lru_init+0xa7/0x550 [ 340.182083][T14955] ? up_write+0xa6/0x270 [ 340.186319][T14955] alloc_super+0x611/0x750 [ 340.190724][T14955] ? mount_bdev+0x340/0x340 [ 340.195222][T14955] sget+0x20e/0x4e0 [ 340.199023][T14955] ? test_bdev_super+0x40/0x40 [ 340.203777][T14955] mount_bdev+0xe3/0x340 [ 340.208010][T14955] ? ext4_mount+0x40/0x40 [ 340.212332][T14955] legacy_get_tree+0xde/0x170 [ 340.217002][T14955] ? ext4_lazyinit_thread+0xd40/0xd40 [ 340.222451][T14955] vfs_get_tree+0x83/0x260 [ 340.226862][T14955] do_mount+0x19d0/0x2670 [ 340.231184][T14955] ? copy_mount_string+0x30/0x30 [ 340.236118][T14955] ? apic_timer_interrupt+0xa/0x20 [ 340.241228][T14955] ? copy_mount_options+0x1cc/0x300 [ 340.246415][T14955] ? copy_mount_options+0x273/0x300 [ 340.251603][T14955] ksys_mount+0xc2/0xf0 [ 340.255751][T14955] __x64_sys_mount+0xb1/0xc0 [ 340.260332][T14955] do_syscall_64+0xcb/0x1e0 [ 340.264829][T14955] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 340.270711][T14955] RIP: 0033:0x7f1d6d50cc2a [ 340.275117][T14955] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 340.294709][T14955] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 340.303108][T14955] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 340.311067][T14955] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 340.319026][T14955] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 340.327016][T14955] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 340.334968][T14955] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:50 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xf401, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x7a00, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x2b, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x3, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 56) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe000, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x4, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xffff, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x2c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 340.966913][T15029] FAULT_INJECTION: forcing a failure. [ 340.966913][T15029] name failslab, interval 1, probability 0, space 0, times 0 [ 341.022657][T15029] CPU: 1 PID: 15029 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 341.034282][T15029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.044318][T15029] Call Trace: [ 341.047594][T15029] dump_stack+0x1d8/0x24e [ 341.051912][T15029] ? devkmsg_release+0x11c/0x11c [ 341.056834][T15029] ? show_regs_print_info+0x12/0x12 [ 341.062014][T15029] ? idr_get_free+0x4db/0x900 [ 341.066676][T15029] ? idr_get_free+0x740/0x900 [ 341.071337][T15029] should_fail+0x6f6/0x860 [ 341.075739][T15029] ? setup_fault_attr+0x3d0/0x3d0 [ 341.080747][T15029] ? __down_read+0xf1/0x210 [ 341.085236][T15029] ? __list_lru_init+0xa7/0x550 [ 341.090069][T15029] should_failslab+0x5/0x20 [ 341.094554][T15029] kmem_cache_alloc_trace+0x39/0x2b0 [ 341.099818][T15029] ? up_read+0x10/0x10 [ 341.103870][T15029] __list_lru_init+0xa7/0x550 [ 341.108529][T15029] ? prealloc_shrinker+0x1c0/0x210 [ 341.113625][T15029] alloc_super+0x611/0x750 [ 341.118024][T15029] ? mount_bdev+0x340/0x340 04:54:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x6, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:50 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xe803, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 341.122505][T15029] sget+0x20e/0x4e0 [ 341.126303][T15029] ? test_bdev_super+0x40/0x40 [ 341.131058][T15029] mount_bdev+0xe3/0x340 [ 341.135289][T15029] ? ext4_mount+0x40/0x40 [ 341.139602][T15029] legacy_get_tree+0xde/0x170 [ 341.144271][T15029] ? ext4_lazyinit_thread+0xd40/0xd40 [ 341.149612][T15029] vfs_get_tree+0x83/0x260 [ 341.154034][T15029] do_mount+0x19d0/0x2670 [ 341.158336][T15029] ? copy_mount_string+0x30/0x30 [ 341.163243][T15029] ? copy_mount_options+0x1d8/0x300 [ 341.168409][T15029] ? copy_mount_options+0x210/0x300 [ 341.173576][T15029] ? __sanitizer_cov_trace_pc+0x28/0x50 [ 341.179098][T15029] ? copy_mount_options+0x273/0x300 [ 341.184278][T15029] ksys_mount+0xc2/0xf0 [ 341.188409][T15029] __x64_sys_mount+0xb1/0xc0 [ 341.192969][T15029] do_syscall_64+0xcb/0x1e0 [ 341.197445][T15029] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 341.203306][T15029] RIP: 0033:0x7f1d6d50cc2a [ 341.207692][T15029] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 341.227266][T15029] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 341.235647][T15029] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 341.243590][T15029] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 341.251528][T15029] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 341.259467][T15029] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 341.267410][T15029] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 341.283217][T15048] FAT-fs (loop3): bogus number of reserved sectors [ 341.289797][T15048] FAT-fs (loop3): Can't find a valid FAT filesystem [ 341.307633][T15055] net_ratelimit: 11 callbacks suppressed [ 341.307639][T15055] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 341.322529][T15063] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:54:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:51 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:51 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x2f, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:51 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 57) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0xf, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xf401, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0xffff, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 341.800675][T15082] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 341.810219][T15080] FAULT_INJECTION: forcing a failure. [ 341.810219][T15080] name failslab, interval 1, probability 0, space 0, times 0 [ 341.828056][T15100] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 341.833845][T15080] CPU: 0 PID: 15080 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 341.845457][T15080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.855495][T15080] Call Trace: [ 341.858776][T15080] dump_stack+0x1d8/0x24e [ 341.863120][T15080] ? devkmsg_release+0x11c/0x11c [ 341.868048][T15080] ? show_regs_print_info+0x12/0x12 [ 341.873239][T15080] should_fail+0x6f6/0x860 [ 341.877648][T15080] ? setup_fault_attr+0x3d0/0x3d0 [ 341.882669][T15080] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 341.888207][T15080] ? kvmalloc_node+0x7e/0xf0 [ 341.892787][T15080] should_failslab+0x5/0x20 04:54:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x2, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:51 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 341.895252][T15107] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 341.897300][T15080] __kmalloc+0x5f/0x2f0 [ 341.897309][T15080] ? __list_lru_init+0xa7/0x550 [ 341.897324][T15080] kvmalloc_node+0x7e/0xf0 [ 341.916291][T15080] __list_lru_init+0x1c6/0x550 [ 341.921050][T15080] ? prealloc_shrinker+0x1c0/0x210 [ 341.926153][T15080] alloc_super+0x611/0x750 [ 341.930559][T15080] ? mount_bdev+0x340/0x340 [ 341.935053][T15080] sget+0x20e/0x4e0 [ 341.938847][T15080] ? test_bdev_super+0x40/0x40 [ 341.943597][T15080] mount_bdev+0xe3/0x340 04:54:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x3, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:51 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x3c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 341.944575][T15113] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 341.947828][T15080] ? ext4_mount+0x40/0x40 [ 341.947839][T15080] legacy_get_tree+0xde/0x170 [ 341.947854][T15080] ? ext4_lazyinit_thread+0xd40/0xd40 [ 341.961703][T15120] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 341.962411][T15080] vfs_get_tree+0x83/0x260 [ 341.962421][T15080] do_mount+0x19d0/0x2670 [ 341.962435][T15080] ? copy_mount_string+0x30/0x30 [ 341.987005][T15080] ? copy_mount_options+0x1d8/0x300 [ 341.992191][T15080] ? copy_mount_options+0x210/0x300 [ 341.997379][T15080] ? __sanitizer_cov_trace_pc+0x1d/0x50 [ 342.002912][T15080] ? copy_mount_options+0x273/0x300 [ 342.008104][T15080] ksys_mount+0xc2/0xf0 [ 342.012249][T15080] __x64_sys_mount+0xb1/0xc0 [ 342.016834][T15080] do_syscall_64+0xcb/0x1e0 [ 342.021328][T15080] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 342.027215][T15080] RIP: 0033:0x7f1d6d50cc2a [ 342.031632][T15080] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 342.038535][T15127] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 342.051244][T15080] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 342.051253][T15080] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 342.051258][T15080] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 342.051263][T15080] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 342.051268][T15080] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 342.051272][T15080] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 342.061458][T15129] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 342.074711][T15138] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 342.390257][T15139] FAT-fs (loop3): bogus number of reserved sectors [ 342.396779][T15139] FAT-fs (loop3): Can't find a valid FAT filesystem 04:54:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:52 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x3, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x5, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x44, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 58) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:52 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x4, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x58, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6514}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x3, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 342.707412][T15163] FAULT_INJECTION: forcing a failure. [ 342.707412][T15163] name failslab, interval 1, probability 0, space 0, times 0 [ 342.723319][T15163] CPU: 1 PID: 15163 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 342.734932][T15163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.744958][T15163] Call Trace: [ 342.748223][T15163] dump_stack+0x1d8/0x24e [ 342.752523][T15163] ? devkmsg_release+0x11c/0x11c [ 342.757430][T15163] ? show_regs_print_info+0x12/0x12 [ 342.762647][T15163] should_fail+0x6f6/0x860 [ 342.767033][T15163] ? setup_fault_attr+0x3d0/0x3d0 [ 342.772022][T15163] ? __down_read+0xf1/0x210 [ 342.776502][T15163] ? mutex_lock+0xa6/0x110 [ 342.780907][T15163] ? __list_lru_init+0xa7/0x550 [ 342.785748][T15163] should_failslab+0x5/0x20 [ 342.790236][T15163] kmem_cache_alloc_trace+0x39/0x2b0 [ 342.795553][T15163] __list_lru_init+0xa7/0x550 [ 342.800200][T15163] ? prealloc_shrinker+0x1c0/0x210 [ 342.805277][T15163] alloc_super+0x640/0x750 [ 342.809662][T15163] ? mount_bdev+0x340/0x340 [ 342.814130][T15163] sget+0x20e/0x4e0 [ 342.817907][T15163] ? test_bdev_super+0x40/0x40 [ 342.822638][T15163] mount_bdev+0xe3/0x340 [ 342.826848][T15163] ? ext4_mount+0x40/0x40 [ 342.831145][T15163] legacy_get_tree+0xde/0x170 [ 342.835791][T15163] ? ext4_lazyinit_thread+0xd40/0xd40 [ 342.841132][T15163] vfs_get_tree+0x83/0x260 [ 342.845523][T15163] do_mount+0x19d0/0x2670 [ 342.849825][T15163] ? copy_mount_string+0x30/0x30 [ 342.854731][T15163] ? apic_timer_interrupt+0xa/0x20 [ 342.859812][T15163] ? copy_mount_options+0x1cc/0x300 [ 342.864976][T15163] ? copy_mount_options+0x273/0x300 [ 342.870139][T15163] ksys_mount+0xc2/0xf0 [ 342.874261][T15163] __x64_sys_mount+0xb1/0xc0 [ 342.878837][T15163] do_syscall_64+0xcb/0x1e0 [ 342.878847][T15163] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 342.878860][T15163] RIP: 0033:0x7f1d6d50cc2a [ 342.893584][T15163] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 342.913162][T15163] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 342.921544][T15163] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 342.929486][T15163] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 342.937427][T15163] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 342.945372][T15163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 04:54:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x654c}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x5, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 342.953315][T15163] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 342.964084][T15176] FAT-fs (loop3): bogus number of reserved sectors [ 342.970613][T15176] FAT-fs (loop3): Can't find a valid FAT filesystem 04:54:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:52 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0xe0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x6, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 59) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x4, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0xff, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x5, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 343.570229][T15227] FAULT_INJECTION: forcing a failure. [ 343.570229][T15227] name failslab, interval 1, probability 0, space 0, times 0 [ 343.593732][T15227] CPU: 0 PID: 15227 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 343.605444][T15227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.615489][T15227] Call Trace: 04:54:53 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x7, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:53 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x8, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 343.618777][T15227] dump_stack+0x1d8/0x24e [ 343.623100][T15227] ? devkmsg_release+0x11c/0x11c [ 343.628032][T15227] ? show_regs_print_info+0x12/0x12 [ 343.633219][T15227] ? stack_trace_save+0x120/0x1f0 [ 343.638235][T15227] ? stack_trace_snprint+0x150/0x150 [ 343.643506][T15227] ? stack_trace_save+0x120/0x1f0 [ 343.648519][T15227] ? apic_timer_interrupt+0xa/0x20 [ 343.653620][T15227] should_fail+0x6f6/0x860 [ 343.658031][T15227] ? setup_fault_attr+0x3d0/0x3d0 [ 343.663044][T15227] ? __kasan_kmalloc+0x1a3/0x1e0 04:54:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x6, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 343.667970][T15227] ? ext4_fill_super+0xd4/0xeb30 [ 343.672895][T15227] should_failslab+0x5/0x20 [ 343.677389][T15227] __kmalloc_track_caller+0x5d/0x2e0 [ 343.682672][T15227] ? string+0x280/0x2c0 [ 343.686817][T15227] kstrdup+0x31/0x70 [ 343.690706][T15227] ext4_fill_super+0xd4/0xeb30 [ 343.695458][T15227] ? pointer+0x222/0xb10 [ 343.699690][T15227] ? string+0x2c0/0x2c0 [ 343.703833][T15227] ? vsnprintf+0x1d60/0x1d60 [ 343.708414][T15227] ? register_shrinker_prepared+0xd1/0x150 [ 343.714210][T15227] ? vsnprintf+0x1cb4/0x1d60 [ 343.718789][T15227] ? delete_node+0x733/0x790 [ 343.723368][T15227] ? ext4_mount+0x40/0x40 [ 343.727691][T15227] ? idr_replace+0x1c4/0x230 [ 343.732268][T15227] ? snprintf+0xd6/0x120 [ 343.736499][T15227] ? vscnprintf+0x80/0x80 [ 343.740815][T15227] ? set_blocksize+0x1a5/0x3a0 [ 343.745567][T15227] mount_bdev+0x22d/0x340 [ 343.749886][T15227] ? ext4_mount+0x40/0x40 [ 343.754207][T15227] legacy_get_tree+0xde/0x170 [ 343.758875][T15227] ? ext4_lazyinit_thread+0xd40/0xd40 [ 343.764231][T15227] vfs_get_tree+0x83/0x260 [ 343.768637][T15227] do_mount+0x19d0/0x2670 [ 343.773044][T15227] ? copy_mount_string+0x30/0x30 [ 343.777969][T15227] ? apic_timer_interrupt+0xa/0x20 [ 343.783070][T15227] ? copy_mount_options+0x1cc/0x300 [ 343.788256][T15227] ? copy_mount_options+0x273/0x300 [ 343.793438][T15227] ksys_mount+0xc2/0xf0 [ 343.798623][T15227] __x64_sys_mount+0xb1/0xc0 [ 343.803216][T15227] do_syscall_64+0xcb/0x1e0 [ 343.807706][T15227] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 343.813577][T15227] RIP: 0033:0x7f1d6d50cc2a [ 343.817961][T15227] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 343.838021][T15227] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 343.846402][T15227] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 343.854341][T15227] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 343.862279][T15227] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 343.870218][T15227] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 343.878154][T15227] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 344.126702][T15282] FAT-fs (loop3): bogus number of reserved sectors [ 344.133291][T15282] FAT-fs (loop3): Can't find a valid FAT filesystem 04:54:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:53 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:53 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x9, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x7, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:53 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:53 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 60) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x8, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:53 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xa, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:53 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 344.456521][T15302] FAULT_INJECTION: forcing a failure. [ 344.456521][T15302] name failslab, interval 1, probability 0, space 0, times 0 [ 344.472549][T15302] CPU: 1 PID: 15302 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 344.484162][T15302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.494191][T15302] Call Trace: [ 344.497466][T15302] dump_stack+0x1d8/0x24e [ 344.501768][T15302] ? devkmsg_release+0x11c/0x11c [ 344.506678][T15302] ? show_regs_print_info+0x12/0x12 [ 344.511857][T15302] should_fail+0x6f6/0x860 [ 344.516249][T15302] ? setup_fault_attr+0x3d0/0x3d0 [ 344.521242][T15302] ? ext4_fill_super+0x113/0xeb30 [ 344.526244][T15302] should_failslab+0x5/0x20 [ 344.530724][T15302] kmem_cache_alloc_trace+0x39/0x2b0 [ 344.535982][T15302] ? memcpy+0x38/0x50 [ 344.539945][T15302] ext4_fill_super+0x113/0xeb30 [ 344.544772][T15302] ? pointer+0x222/0xb10 [ 344.548992][T15302] ? string+0x2c0/0x2c0 [ 344.553116][T15302] ? vsnprintf+0x1d60/0x1d60 [ 344.557687][T15302] ? vsnprintf+0x1cb4/0x1d60 [ 344.562244][T15302] ? delete_node+0x733/0x790 [ 344.566806][T15302] ? ext4_mount+0x40/0x40 [ 344.571115][T15302] ? idr_replace+0x1c4/0x230 [ 344.575680][T15302] ? snprintf+0xd6/0x120 [ 344.579949][T15302] ? vscnprintf+0x80/0x80 [ 344.584251][T15302] ? set_blocksize+0x1a5/0x3a0 [ 344.588989][T15302] mount_bdev+0x22d/0x340 [ 344.593290][T15302] ? ext4_mount+0x40/0x40 [ 344.597587][T15302] legacy_get_tree+0xde/0x170 [ 344.602234][T15302] ? ext4_lazyinit_thread+0xd40/0xd40 [ 344.607580][T15302] vfs_get_tree+0x83/0x260 [ 344.611972][T15302] do_mount+0x19d0/0x2670 [ 344.616272][T15302] ? copy_mount_string+0x30/0x30 [ 344.621179][T15302] ? copy_mount_options+0x1d8/0x300 [ 344.626342][T15302] ? copy_mount_options+0x210/0x300 [ 344.631519][T15302] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 344.637643][T15302] ? copy_mount_options+0x273/0x300 [ 344.642809][T15302] ksys_mount+0xc2/0xf0 [ 344.646941][T15302] __x64_sys_mount+0xb1/0xc0 [ 344.651501][T15302] do_syscall_64+0xcb/0x1e0 [ 344.655975][T15302] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 344.661837][T15302] RIP: 0033:0x7f1d6d50cc2a [ 344.666222][T15302] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 344.685796][T15302] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 344.694174][T15302] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a 04:54:54 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 344.702381][T15302] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 344.710326][T15302] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 344.718306][T15302] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 344.726250][T15302] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:54 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 61) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x9, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 345.012540][T15321] FAT-fs (loop3): bogus number of reserved sectors [ 345.019141][T15321] FAT-fs (loop3): Can't find a valid FAT filesystem [ 345.117642][T15348] FAULT_INJECTION: forcing a failure. [ 345.117642][T15348] name failslab, interval 1, probability 0, space 0, times 0 [ 345.130346][T15348] CPU: 0 PID: 15348 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 345.141962][T15348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.152018][T15348] Call Trace: [ 345.155285][T15348] dump_stack+0x1d8/0x24e [ 345.159593][T15348] ? devkmsg_release+0x11c/0x11c [ 345.164511][T15348] ? show_regs_print_info+0x12/0x12 [ 345.169684][T15348] should_fail+0x6f6/0x860 [ 345.174073][T15348] ? setup_fault_attr+0x3d0/0x3d0 [ 345.179069][T15348] ? ext4_fill_super+0x113/0xeb30 [ 345.184076][T15348] should_failslab+0x5/0x20 [ 345.188563][T15348] kmem_cache_alloc_trace+0x39/0x2b0 [ 345.193816][T15348] ? memcpy+0x38/0x50 [ 345.197772][T15348] ext4_fill_super+0x113/0xeb30 [ 345.202622][T15348] ? pointer+0x222/0xb10 [ 345.206846][T15348] ? string+0x2c0/0x2c0 [ 345.210971][T15348] ? vsnprintf+0x1d60/0x1d60 [ 345.215534][T15348] ? vsnprintf+0x1cb4/0x1d60 [ 345.220094][T15348] ? delete_node+0x733/0x790 [ 345.224658][T15348] ? ext4_mount+0x40/0x40 [ 345.228955][T15348] ? idr_replace+0x1c4/0x230 [ 345.233512][T15348] ? snprintf+0xd6/0x120 [ 345.237728][T15348] ? down_write+0xd8/0x150 [ 345.242113][T15348] ? vscnprintf+0x80/0x80 [ 345.246415][T15348] ? set_blocksize+0x1a5/0x3a0 [ 345.251157][T15348] mount_bdev+0x22d/0x340 [ 345.255473][T15348] ? ext4_mount+0x40/0x40 [ 345.259785][T15348] legacy_get_tree+0xde/0x170 [ 345.264443][T15348] ? ext4_lazyinit_thread+0xd40/0xd40 [ 345.269786][T15348] vfs_get_tree+0x83/0x260 [ 345.274172][T15348] do_mount+0x19d0/0x2670 [ 345.278482][T15348] ? copy_mount_string+0x30/0x30 [ 345.283394][T15348] ? apic_timer_interrupt+0xa/0x20 [ 345.288476][T15348] ? copy_mount_options+0x1cc/0x300 [ 345.293642][T15348] ? copy_mount_options+0x273/0x300 [ 345.298805][T15348] ksys_mount+0xc2/0xf0 [ 345.302929][T15348] __x64_sys_mount+0xb1/0xc0 [ 345.307492][T15348] do_syscall_64+0xcb/0x1e0 [ 345.311965][T15348] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 345.317841][T15348] RIP: 0033:0x7f1d6d50cc2a [ 345.322226][T15348] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 345.341796][T15348] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 345.350192][T15348] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 345.358136][T15348] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 04:54:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:54 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xb, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2b, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xa, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 345.366079][T15348] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 345.374019][T15348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 345.381968][T15348] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:54 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xc, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x10}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2c, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xb, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 62) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xc, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:54 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xd, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 345.684522][T15409] FAT-fs (loop3): bogus number of reserved sectors [ 345.691090][T15409] FAT-fs (loop3): Can't find a valid FAT filesystem [ 345.919463][T15396] FAULT_INJECTION: forcing a failure. [ 345.919463][T15396] name failslab, interval 1, probability 0, space 0, times 0 [ 345.937624][T15396] CPU: 1 PID: 15396 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 345.949295][T15396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.959326][T15396] Call Trace: [ 345.962594][T15396] dump_stack+0x1d8/0x24e [ 345.966896][T15396] ? devkmsg_release+0x11c/0x11c [ 345.971802][T15396] ? show_regs_print_info+0x12/0x12 [ 345.977090][T15396] ? should_fail+0x673/0x860 [ 345.981651][T15396] ? check_memory_region+0x4/0x2e0 [ 345.986739][T15396] should_fail+0x6f6/0x860 [ 345.991128][T15396] ? setup_fault_attr+0x3d0/0x3d0 [ 345.996122][T15396] ? xas_load+0x493/0x4f0 [ 346.000518][T15396] ? alloc_page_buffers+0x109/0x3f0 [ 346.005732][T15396] ? mempool_alloc_slab+0x16/0x20 [ 346.010736][T15396] should_failslab+0x5/0x20 [ 346.015217][T15396] kmem_cache_alloc+0x36/0x290 [ 346.019950][T15396] ? check_preemption_disabled+0x9e/0x330 [ 346.025636][T15396] ? mempool_free+0x380/0x380 [ 346.030282][T15396] mempool_alloc_slab+0x16/0x20 [ 346.035107][T15396] mempool_alloc+0x113/0x680 [ 346.039671][T15396] ? apic_timer_interrupt+0xa/0x20 [ 346.044750][T15396] ? mempool_resize+0x900/0x900 [ 346.049573][T15396] ? check_memory_region+0x17/0x2e0 [ 346.054744][T15396] ? __find_get_block+0xed7/0x10c0 [ 346.059823][T15396] bio_alloc_bioset+0x1db/0x640 [ 346.064675][T15396] ? write_boundary_block+0x150/0x150 [ 346.070015][T15396] ? _raw_spin_lock+0xa3/0x1b0 [ 346.074749][T15396] ? bio_chain_endio+0x110/0x110 [ 346.079658][T15396] ? init_page_buffers+0x367/0x390 [ 346.084737][T15396] submit_bh_wbc+0x1ba/0x790 [ 346.089296][T15396] __bread_gfp+0x181/0x310 [ 346.093684][T15396] ext4_fill_super+0x866/0xeb30 [ 346.098513][T15396] ? string+0x2c0/0x2c0 [ 346.102636][T15396] ? vsnprintf+0x1d60/0x1d60 [ 346.107193][T15396] ? __radix_tree_lookup+0x61/0x280 [ 346.112362][T15396] ? vsnprintf+0x1cb4/0x1d60 [ 346.116925][T15396] ? delete_node+0x733/0x790 [ 346.121503][T15396] ? ext4_mount+0x40/0x40 [ 346.125798][T15396] ? idr_replace+0x1c4/0x230 [ 346.130356][T15396] ? apic_timer_interrupt+0xa/0x20 [ 346.135436][T15396] ? pointer+0xae/0xb10 [ 346.139561][T15396] ? set_blocksize+0x99/0x3a0 [ 346.144205][T15396] ? set_blocksize+0x120/0x3a0 [ 346.148942][T15396] ? set_blocksize+0x1a5/0x3a0 [ 346.153683][T15396] mount_bdev+0x22d/0x340 [ 346.157983][T15396] ? ext4_mount+0x40/0x40 [ 346.162367][T15396] legacy_get_tree+0xde/0x170 [ 346.167015][T15396] ? ext4_lazyinit_thread+0xd40/0xd40 [ 346.172362][T15396] vfs_get_tree+0x83/0x260 [ 346.176752][T15396] do_mount+0x19d0/0x2670 [ 346.181049][T15396] ? copy_mount_string+0x30/0x30 [ 346.185959][T15396] ? retint_kernel+0x1b/0x1b [ 346.190519][T15396] ? copy_mount_options+0x1cc/0x300 [ 346.195682][T15396] ? copy_mount_options+0x273/0x300 [ 346.200864][T15396] ksys_mount+0xc2/0xf0 [ 346.204989][T15396] __x64_sys_mount+0xb1/0xc0 [ 346.209548][T15396] do_syscall_64+0xcb/0x1e0 [ 346.214023][T15396] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 346.219890][T15396] RIP: 0033:0x7f1d6d50cc2a [ 346.224274][T15396] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 346.243846][T15396] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 346.252228][T15396] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 346.260167][T15396] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 346.268106][T15396] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 346.276047][T15396] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 346.283987][T15396] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 346.316546][T15396] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 346.326391][T15396] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/583/file0 (deleted) supports timestamps until 2038 (0x7fffffff) 04:54:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:55 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:55 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x29}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xd, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:55 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xe, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:55 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 63) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:55 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2b}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:55 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x3c, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 346.430297][T15435] net_ratelimit: 53 callbacks suppressed [ 346.430309][T15435] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 346.446062][T15447] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 346.448575][T15446] sit: non-ECT from 0.0.0.0 with TOS=0x2 04:54:55 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 346.547422][T15457] FAT-fs (loop3): bogus number of reserved sectors [ 346.554010][T15457] FAT-fs (loop3): Can't find a valid FAT filesystem 04:54:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xe, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x10, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 346.667381][T15466] sit: non-ECT from 0.0.0.0 with TOS=0x2 04:54:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2c}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 346.789518][T15444] FAULT_INJECTION: forcing a failure. [ 346.789518][T15444] name failslab, interval 1, probability 0, space 0, times 0 [ 346.805997][T15444] CPU: 1 PID: 15444 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 346.817617][T15444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.827652][T15444] Call Trace: [ 346.830938][T15444] dump_stack+0x1d8/0x24e [ 346.835241][T15444] ? devkmsg_release+0x11c/0x11c [ 346.840150][T15444] ? prepare_to_wait+0x223/0x280 [ 346.845065][T15444] ? show_regs_print_info+0x12/0x12 [ 346.850243][T15444] should_fail+0x6f6/0x860 [ 346.854629][T15444] ? setup_fault_attr+0x3d0/0x3d0 [ 346.859621][T15444] ? kzalloc+0x16/0x20 [ 346.863669][T15444] should_failslab+0x5/0x20 [ 346.868153][T15444] __kmalloc+0x5f/0x2f0 [ 346.872279][T15444] ? crypto_alg_mod_lookup+0x492/0x7c0 [ 346.877702][T15444] kzalloc+0x16/0x20 [ 346.881576][T15444] crypto_create_tfm+0x6c/0x2e0 [ 346.886414][T15444] ? crypto_alg_mod_lookup+0x49c/0x7c0 [ 346.891860][T15444] crypto_alloc_tfm+0x16b/0x2e0 [ 346.896701][T15444] ext4_fill_super+0xb84/0xeb30 [ 346.901540][T15444] ? string+0x2c0/0x2c0 [ 346.905690][T15444] ? vsnprintf+0x1cb4/0x1d60 [ 346.910264][T15444] ? delete_node+0x733/0x790 [ 346.914836][T15444] ? ext4_mount+0x40/0x40 [ 346.919132][T15444] ? idr_replace+0x1c4/0x230 [ 346.923691][T15444] ? snprintf+0xd6/0x120 [ 346.927901][T15444] ? vscnprintf+0x80/0x80 [ 346.932205][T15444] ? set_blocksize+0x1a5/0x3a0 [ 346.936948][T15444] mount_bdev+0x22d/0x340 [ 346.941248][T15444] ? ext4_mount+0x40/0x40 [ 346.945548][T15444] legacy_get_tree+0xde/0x170 [ 346.950194][T15444] ? ext4_lazyinit_thread+0xd40/0xd40 [ 346.955593][T15444] vfs_get_tree+0x83/0x260 [ 346.959978][T15444] do_mount+0x19d0/0x2670 [ 346.964279][T15444] ? copy_mount_string+0x30/0x30 [ 346.969187][T15444] ? copy_mount_options+0x1d8/0x300 [ 346.974357][T15444] ? __sanitizer_cov_trace_const_cmp4+0x1d/0x90 [ 346.980563][T15444] ? copy_mount_options+0x273/0x300 [ 346.985727][T15444] ksys_mount+0xc2/0xf0 [ 346.989894][T15444] __x64_sys_mount+0xb1/0xc0 [ 346.994461][T15444] do_syscall_64+0xcb/0x1e0 [ 346.998936][T15444] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 347.004803][T15444] RIP: 0033:0x7f1d6d50cc2a [ 347.009185][T15444] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 347.028757][T15444] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 347.037141][T15444] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 347.045084][T15444] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 347.053038][T15444] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 347.060980][T15444] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 347.068950][T15444] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 347.077196][T15444] EXT4-fs (loop0): Cannot load crc32c driver. [ 347.090846][T15480] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 347.100272][T15486] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 347.106397][T15478] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 347.113217][T15483] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 347.119978][T15492] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 347.121083][T15493] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:54:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2f}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x10, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x11, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 64) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:56 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x11, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x12, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x3c}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 347.335457][T15517] FAULT_INJECTION: forcing a failure. [ 347.335457][T15517] name failslab, interval 1, probability 0, space 0, times 0 [ 347.588734][T15535] FAT-fs (loop3): bogus number of reserved sectors [ 347.595332][T15535] FAT-fs (loop3): Can't find a valid FAT filesystem 04:54:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x12, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x25, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 347.654089][T15517] CPU: 0 PID: 15517 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 347.665713][T15517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.675760][T15517] Call Trace: [ 347.679045][T15517] dump_stack+0x1d8/0x24e [ 347.683359][T15517] ? devkmsg_release+0x11c/0x11c [ 347.688268][T15517] ? show_regs_print_info+0x12/0x12 [ 347.693434][T15517] should_fail+0x6f6/0x860 [ 347.697819][T15517] ? setup_fault_attr+0x3d0/0x3d0 [ 347.702809][T15517] ? __up_read+0x6f/0x1b0 [ 347.707121][T15517] ? __crypto_alg_lookup+0xb1/0x420 [ 347.712306][T15517] ? __down_read+0x210/0x210 [ 347.716864][T15517] ? __crypto_alg_lookup+0x7b/0x420 [ 347.722031][T15517] ? kzalloc+0x16/0x20 [ 347.726068][T15517] should_failslab+0x5/0x20 [ 347.730542][T15517] __kmalloc+0x5f/0x2f0 [ 347.734664][T15517] kzalloc+0x16/0x20 [ 347.738529][T15517] crypto_create_tfm+0x6c/0x2e0 [ 347.743356][T15517] ? crypto_alg_mod_lookup+0x49c/0x7c0 [ 347.748782][T15517] crypto_alloc_tfm+0x16b/0x2e0 [ 347.753607][T15517] ext4_fill_super+0xb84/0xeb30 [ 347.758433][T15517] ? string+0x2c0/0x2c0 [ 347.762569][T15517] ? vsnprintf+0x1cb4/0x1d60 [ 347.767139][T15517] ? ext4_mount+0x40/0x40 [ 347.771718][T15517] ? snprintf+0xd6/0x120 [ 347.775931][T15517] ? apic_timer_interrupt+0xa/0x20 [ 347.781008][T15517] ? pointer+0xae/0xb10 [ 347.785147][T15517] ? sb_set_blocksize+0x97/0xe0 [ 347.789964][T15517] ? sb_set_blocksize+0x90/0xe0 [ 347.794782][T15517] mount_bdev+0x22d/0x340 [ 347.799082][T15517] ? ext4_mount+0x40/0x40 [ 347.803382][T15517] legacy_get_tree+0xde/0x170 [ 347.808037][T15517] ? ext4_lazyinit_thread+0xd40/0xd40 [ 347.813376][T15517] vfs_get_tree+0x83/0x260 [ 347.817760][T15517] do_mount+0x19d0/0x2670 [ 347.822059][T15517] ? copy_mount_string+0x30/0x30 [ 347.826978][T15517] ? copy_mount_options+0x1d8/0x300 [ 347.832157][T15517] ? copy_mount_options+0x210/0x300 [ 347.837328][T15517] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 347.842842][T15517] ? copy_mount_options+0x273/0x300 [ 347.848005][T15517] ksys_mount+0xc2/0xf0 [ 347.852129][T15517] __x64_sys_mount+0xb1/0xc0 [ 347.856692][T15517] do_syscall_64+0xcb/0x1e0 [ 347.861176][T15517] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 347.867047][T15517] RIP: 0033:0x7f1d6d50cc2a [ 347.871431][T15517] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 347.891002][T15517] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 347.899379][T15517] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 347.907319][T15517] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 347.915261][T15517] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 347.923215][T15517] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 347.931165][T15517] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 347.940246][T15517] EXT4-fs (loop0): Cannot load crc32c driver. 04:54:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x44}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:57 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 65) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x29, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x25, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x58}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2b, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 348.191387][T15584] FAULT_INJECTION: forcing a failure. [ 348.191387][T15584] name failslab, interval 1, probability 0, space 0, times 0 [ 348.206531][T15584] CPU: 1 PID: 15584 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 348.218148][T15584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.228185][T15584] Call Trace: [ 348.231451][T15584] dump_stack+0x1d8/0x24e [ 348.235752][T15584] ? devkmsg_release+0x11c/0x11c [ 348.240667][T15584] ? show_regs_print_info+0x12/0x12 [ 348.245833][T15584] should_fail+0x6f6/0x860 [ 348.250231][T15584] ? setup_fault_attr+0x3d0/0x3d0 [ 348.255226][T15584] ? __up_read+0x6f/0x1b0 [ 348.259524][T15584] ? __crypto_alg_lookup+0xb1/0x420 [ 348.264690][T15584] ? kzalloc+0x16/0x20 [ 348.268738][T15584] should_failslab+0x5/0x20 [ 348.273225][T15584] __kmalloc+0x5f/0x2f0 [ 348.277370][T15584] kzalloc+0x16/0x20 [ 348.281274][T15584] crypto_create_tfm+0x6c/0x2e0 [ 348.286108][T15584] ? crypto_alg_mod_lookup+0x49c/0x7c0 [ 348.291555][T15584] crypto_alloc_tfm+0x16b/0x2e0 [ 348.296391][T15584] ext4_fill_super+0xb84/0xeb30 [ 348.301210][T15584] ? apic_timer_interrupt+0xa/0x20 [ 348.306293][T15584] ? pointer+0xae/0xb10 [ 348.310414][T15584] ? bdev_name+0xe0/0x3b0 [ 348.314709][T15584] ? vsnprintf+0x133e/0x1d60 [ 348.319265][T15584] ? vsnprintf+0x1cb4/0x1d60 [ 348.323822][T15584] ? delete_node+0x733/0x790 [ 348.328391][T15584] ? ext4_mount+0x40/0x40 [ 348.332696][T15584] ? idr_replace+0x1c4/0x230 [ 348.337262][T15584] ? snprintf+0xd6/0x120 [ 348.341493][T15584] ? vscnprintf+0x80/0x80 [ 348.345852][T15584] ? set_blocksize+0x1a5/0x3a0 [ 348.350605][T15584] mount_bdev+0x22d/0x340 [ 348.354909][T15584] ? ext4_mount+0x40/0x40 [ 348.359209][T15584] legacy_get_tree+0xde/0x170 [ 348.363948][T15584] ? ext4_lazyinit_thread+0xd40/0xd40 [ 348.369311][T15584] vfs_get_tree+0x83/0x260 [ 348.369326][T15584] do_mount+0x19d0/0x2670 [ 348.378014][T15584] ? copy_mount_string+0x30/0x30 [ 348.382921][T15584] ? copy_mount_options+0x1d8/0x300 [ 348.388086][T15584] ? copy_mount_options+0x210/0x300 [ 348.393257][T15584] ? __sanitizer_cov_trace_pc+0x23/0x50 [ 348.398776][T15584] ? copy_mount_options+0x273/0x300 [ 348.403958][T15584] ksys_mount+0xc2/0xf0 [ 348.408092][T15584] __x64_sys_mount+0xb1/0xc0 [ 348.412651][T15584] do_syscall_64+0xcb/0x1e0 [ 348.417123][T15584] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 348.422984][T15584] RIP: 0033:0x7f1d6d50cc2a [ 348.427376][T15584] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 348.446949][T15584] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 348.455328][T15584] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 348.463306][T15584] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 348.471245][T15584] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 348.479187][T15584] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 04:54:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x29, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0xe0}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2b, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:57 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x10, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 348.487156][T15584] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 348.500457][T15598] FAT-fs (loop3): bogus number of reserved sectors [ 348.507366][T15598] FAT-fs (loop3): Can't find a valid FAT filesystem [ 348.524608][T15584] EXT4-fs (loop0): Cannot load crc32c driver. 04:54:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{0x0}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:58 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 66) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x1f4}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2f, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x29, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x300}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x2f, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x3c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 349.080188][T15663] FAULT_INJECTION: forcing a failure. [ 349.080188][T15663] name failslab, interval 1, probability 0, space 0, times 0 [ 349.118606][T15663] CPU: 0 PID: 15663 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 349.130229][T15663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.140268][T15663] Call Trace: [ 349.143604][T15663] dump_stack+0x1d8/0x24e [ 349.147916][T15663] ? devkmsg_release+0x11c/0x11c [ 349.152845][T15663] ? show_regs_print_info+0x12/0x12 [ 349.158028][T15663] should_fail+0x6f6/0x860 [ 349.162428][T15663] ? setup_fault_attr+0x3d0/0x3d0 [ 349.167437][T15663] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 349.172874][T15663] ? prealloc_shrinker+0x50/0x210 [ 349.177882][T15663] should_failslab+0x5/0x20 [ 349.182368][T15663] kmem_cache_alloc_trace+0x39/0x2b0 [ 349.187632][T15663] ? apic_timer_interrupt+0xa/0x20 [ 349.192723][T15663] prealloc_shrinker+0x50/0x210 [ 349.197554][T15663] register_shrinker+0x1a/0x170 [ 349.202385][T15663] ext4_es_register_shrinker+0x204/0x2a0 [ 349.208038][T15663] ext4_fill_super+0x7b6c/0xeb30 [ 349.212967][T15663] ? ext4_mount+0x40/0x40 [ 349.217275][T15663] ? idr_replace+0x1c4/0x230 [ 349.221845][T15663] ? snprintf+0xd6/0x120 [ 349.226067][T15663] ? vscnprintf+0x80/0x80 [ 349.230384][T15663] ? set_blocksize+0x1a5/0x3a0 [ 349.235136][T15663] mount_bdev+0x22d/0x340 [ 349.239456][T15663] ? ext4_mount+0x40/0x40 [ 349.243772][T15663] legacy_get_tree+0xde/0x170 [ 349.248440][T15663] ? ext4_lazyinit_thread+0xd40/0xd40 [ 349.249327][T15690] FAT-fs (loop3): bogus number of reserved sectors [ 349.253796][T15663] vfs_get_tree+0x83/0x260 [ 349.253806][T15663] do_mount+0x19d0/0x2670 [ 349.253816][T15663] ? copy_mount_string+0x30/0x30 [ 349.253824][T15663] ? copy_mount_options+0x1d8/0x300 04:54:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x3e8}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x3c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 349.253837][T15663] ? copy_mount_options+0x210/0x300 [ 349.260312][T15690] FAT-fs (loop3): Can't find a valid FAT filesystem [ 349.264702][T15663] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 349.264711][T15663] ? copy_mount_options+0x273/0x300 [ 349.264719][T15663] ksys_mount+0xc2/0xf0 [ 349.264727][T15663] __x64_sys_mount+0xb1/0xc0 [ 349.264736][T15663] do_syscall_64+0xcb/0x1e0 [ 349.264752][T15663] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 349.321372][T15663] RIP: 0033:0x7f1d6d50cc2a [ 349.325767][T15663] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 349.345447][T15663] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 349.345456][T15663] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 349.345468][T15663] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 349.369775][T15663] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 349.377732][T15663] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 349.385687][T15663] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:54:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x44, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x44, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{0x0}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:54:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x600}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 67) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:54:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x48, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2900}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 349.964283][T15732] FAULT_INJECTION: forcing a failure. [ 349.964283][T15732] name failslab, interval 1, probability 0, space 0, times 0 [ 350.057029][T15732] CPU: 0 PID: 15732 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 350.068661][T15732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.078705][T15732] Call Trace: [ 350.081990][T15732] dump_stack+0x1d8/0x24e [ 350.086309][T15732] ? devkmsg_release+0x11c/0x11c [ 350.091234][T15732] ? show_regs_print_info+0x12/0x12 [ 350.096416][T15732] should_fail+0x6f6/0x860 [ 350.100812][T15732] ? setup_fault_attr+0x3d0/0x3d0 [ 350.105816][T15732] ? up_write+0xa6/0x270 [ 350.110038][T15732] ? down_write+0xd8/0x150 [ 350.114434][T15732] ? up_read+0x10/0x10 [ 350.118481][T15732] ? mb_cache_create+0x5e/0x500 [ 350.123313][T15732] should_failslab+0x5/0x20 [ 350.127797][T15732] kmem_cache_alloc_trace+0x39/0x2b0 [ 350.133061][T15732] ? apic_timer_interrupt+0xa/0x20 [ 350.138156][T15732] mb_cache_create+0x5e/0x500 [ 350.142814][T15732] ext4_fill_super+0x94f2/0xeb30 [ 350.147748][T15732] ? ext4_mount+0x40/0x40 [ 350.152065][T15732] ? idr_replace+0x1c4/0x230 04:54:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x48, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 350.156646][T15732] ? apic_timer_interrupt+0xa/0x20 [ 350.161747][T15732] ? pointer+0xae/0xb10 [ 350.165886][T15732] ? __sanitizer_cov_trace_pc+0x23/0x50 [ 350.171412][T15732] ? set_blocksize+0x1a5/0x3a0 [ 350.176206][T15732] mount_bdev+0x22d/0x340 [ 350.180505][T15732] ? ext4_mount+0x40/0x40 [ 350.184801][T15732] legacy_get_tree+0xde/0x170 [ 350.189444][T15732] ? ext4_lazyinit_thread+0xd40/0xd40 [ 350.194781][T15732] vfs_get_tree+0x83/0x260 [ 350.199165][T15732] do_mount+0x19d0/0x2670 [ 350.203461][T15732] ? copy_mount_string+0x30/0x30 [ 350.208365][T15732] ? copy_mount_options+0x1d8/0x300 [ 350.213532][T15732] ? copy_mount_options+0x210/0x300 [ 350.218702][T15732] ? __sanitizer_cov_trace_pc+0x36/0x50 [ 350.224213][T15732] ? copy_mount_options+0x273/0x300 [ 350.229416][T15732] ksys_mount+0xc2/0xf0 [ 350.233541][T15732] __x64_sys_mount+0xb1/0xc0 [ 350.238098][T15732] do_syscall_64+0xcb/0x1e0 [ 350.242571][T15732] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 350.248433][T15732] RIP: 0033:0x7f1d6d50cc2a [ 350.252818][T15732] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 350.272392][T15732] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 350.280770][T15732] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 350.288708][T15732] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 350.296646][T15732] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 04:54:59 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x4c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:54:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2b00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 350.304584][T15732] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 350.312528][T15732] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 350.328302][T15751] FAT-fs (loop3): bogus number of reserved sectors [ 350.334852][T15751] FAT-fs (loop3): Can't find a valid FAT filesystem [ 350.350929][T15732] EXT4-fs (loop0): Failed to create ea_block_cache 04:54:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x44, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{0x0}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:00 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x4c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2c00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x58, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x58, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 68) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:00 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x60, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x2f00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x58, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x3c00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:00 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x300, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 350.989025][T15822] FAT-fs (loop3): bogus number of reserved sectors [ 350.995620][T15822] FAT-fs (loop3): Can't find a valid FAT filesystem [ 351.035290][T15810] FAULT_INJECTION: forcing a failure. [ 351.035290][T15810] name failslab, interval 1, probability 0, space 0, times 0 [ 351.087627][T15810] CPU: 0 PID: 15810 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 351.099255][T15810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.109297][T15810] Call Trace: [ 351.112579][T15810] dump_stack+0x1d8/0x24e [ 351.116903][T15810] ? devkmsg_release+0x11c/0x11c [ 351.121835][T15810] ? show_regs_print_info+0x12/0x12 [ 351.127020][T15810] should_fail+0x6f6/0x860 [ 351.131407][T15810] ? setup_fault_attr+0x3d0/0x3d0 [ 351.136397][T15810] ? __should_failslab+0xff/0x150 [ 351.141419][T15810] ? mb_cache_create+0x11e/0x500 [ 351.146322][T15810] should_failslab+0x5/0x20 [ 351.150795][T15810] __kmalloc+0x5f/0x2f0 [ 351.154921][T15810] ? mb_cache_create+0x5e/0x500 [ 351.159736][T15810] mb_cache_create+0x11e/0x500 [ 351.164469][T15810] ext4_fill_super+0x94f2/0xeb30 [ 351.169373][T15810] ? _raw_spin_unlock_irq+0x4a/0x60 [ 351.174539][T15810] ? ext4_mount+0x40/0x40 [ 351.178835][T15810] ? idr_replace+0x1c4/0x230 [ 351.183392][T15810] ? retint_kernel+0x1b/0x1b [ 351.187952][T15810] ? set_blocksize+0x19b/0x3a0 [ 351.192682][T15810] ? set_blocksize+0x1a5/0x3a0 [ 351.197414][T15810] ? set_blocksize+0x313/0x3a0 [ 351.202147][T15810] mount_bdev+0x22d/0x340 [ 351.206445][T15810] ? ext4_mount+0x40/0x40 [ 351.210744][T15810] legacy_get_tree+0xde/0x170 [ 351.215387][T15810] ? ext4_lazyinit_thread+0xd40/0xd40 [ 351.220721][T15810] vfs_get_tree+0x83/0x260 [ 351.225101][T15810] do_mount+0x19d0/0x2670 [ 351.229397][T15810] ? copy_mount_string+0x30/0x30 [ 351.234305][T15810] ? retint_kernel+0x1b/0x1b [ 351.238864][T15810] ? copy_mount_options+0x269/0x300 [ 351.244028][T15810] ksys_mount+0xc2/0xf0 [ 351.248150][T15810] __x64_sys_mount+0xb1/0xc0 [ 351.252707][T15810] do_syscall_64+0xcb/0x1e0 [ 351.257180][T15810] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 351.263040][T15810] RIP: 0033:0x7f1d6d50cc2a [ 351.267423][T15810] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 351.287005][T15810] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 351.295383][T15810] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 351.303343][T15810] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 351.311293][T15810] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 351.319233][T15810] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 351.327174][T15810] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 351.338338][T15810] EXT4-fs (loop0): Failed to create ea_block_cache 04:55:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:01 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x64, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 69) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x4000}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x60, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x600, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x68, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x64, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2900, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x4400}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 351.672099][T15862] net_ratelimit: 50 callbacks suppressed [ 351.672108][T15862] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 351.677748][T15864] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 351.679448][T15871] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 351.685746][T15873] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 351.732874][T15867] FAULT_INJECTION: forcing a failure. [ 351.732874][T15867] name failslab, interval 1, probability 0, space 0, times 0 [ 351.833194][T15889] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 351.847124][T15890] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 351.870624][T15896] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 351.876689][T15897] sit: non-ECT from 0.0.0.0 with TOS=0x2 04:55:01 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x6c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x68, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 352.017262][T15867] CPU: 0 PID: 15867 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 352.024203][T15888] FAT-fs (loop3): bogus number of reserved sectors [ 352.028885][T15867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.028890][T15867] Call Trace: [ 352.028908][T15867] dump_stack+0x1d8/0x24e [ 352.028924][T15867] ? devkmsg_release+0x11c/0x11c [ 352.035414][T15888] FAT-fs (loop3): Can't find a valid FAT filesystem [ 352.045438][T15867] ? show_regs_print_info+0x12/0x12 [ 352.045450][T15867] should_fail+0x6f6/0x860 [ 352.045466][T15867] ? setup_fault_attr+0x3d0/0x3d0 [ 352.079063][T15867] ? prealloc_shrinker+0x50/0x210 [ 352.084078][T15867] should_failslab+0x5/0x20 [ 352.088563][T15867] kmem_cache_alloc_trace+0x39/0x2b0 [ 352.093881][T15867] ? apic_timer_interrupt+0xa/0x20 [ 352.099010][T15867] prealloc_shrinker+0x50/0x210 [ 352.103860][T15867] register_shrinker+0x1a/0x170 [ 352.108678][T15867] mb_cache_create+0x39d/0x500 [ 352.113409][T15867] ext4_fill_super+0x94f2/0xeb30 [ 352.118317][T15867] ? ext4_mount+0x40/0x40 [ 352.122617][T15867] ? idr_replace+0x1c4/0x230 [ 352.127177][T15867] ? snprintf+0xd6/0x120 [ 352.131395][T15867] ? vscnprintf+0x80/0x80 [ 352.135698][T15867] ? set_blocksize+0x1a5/0x3a0 [ 352.140432][T15867] mount_bdev+0x22d/0x340 [ 352.144772][T15867] ? ext4_mount+0x40/0x40 [ 352.149069][T15867] legacy_get_tree+0xde/0x170 [ 352.153712][T15867] ? ext4_lazyinit_thread+0xd40/0xd40 [ 352.159049][T15867] vfs_get_tree+0x83/0x260 [ 352.163472][T15867] do_mount+0x19d0/0x2670 [ 352.167769][T15867] ? copy_mount_string+0x30/0x30 [ 352.172683][T15867] ? copy_mount_options+0x1d8/0x300 [ 352.177854][T15867] ? asan.module_dtor+0x20/0x20 [ 352.182671][T15867] ? copy_mount_options+0x273/0x300 [ 352.187834][T15867] ksys_mount+0xc2/0xf0 [ 352.191955][T15867] __x64_sys_mount+0xb1/0xc0 [ 352.196525][T15867] do_syscall_64+0xcb/0x1e0 [ 352.201006][T15867] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 352.206873][T15867] RIP: 0033:0x7f1d6d50cc2a [ 352.211255][T15867] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 352.230825][T15867] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 352.239211][T15867] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 352.247152][T15867] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 352.255095][T15867] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 352.263035][T15867] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 352.270992][T15867] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 352.281986][T15867] EXT4-fs (loop0): Failed to create ea_block_cache [ 352.313786][T15914] sit: non-ECT from 0.0.0.0 with TOS=0x2 [ 352.318913][T15916] sit: non-ECT from 0.0.0.0 with TOS=0x2 04:55:01 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:01 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x74, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x6c, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 70) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x5800}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x74, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0xe000}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:01 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x7a, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 352.593215][T15932] FAULT_INJECTION: forcing a failure. [ 352.593215][T15932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 352.688936][T15956] FAT-fs (loop3): bogus number of reserved sectors [ 352.695511][T15956] FAT-fs (loop3): Can't find a valid FAT filesystem 04:55:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x7a, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xe0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 352.873065][T15932] CPU: 1 PID: 15932 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 352.884696][T15932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.894738][T15932] Call Trace: [ 352.898037][T15932] dump_stack+0x1d8/0x24e [ 352.902355][T15932] ? devkmsg_release+0x11c/0x11c [ 352.907260][T15932] ? show_regs_print_info+0x12/0x12 [ 352.912427][T15932] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 352.917939][T15932] ? register_shrinker+0x1a/0x170 [ 352.922933][T15932] ? mb_cache_create+0x39d/0x500 [ 352.927838][T15932] ? ext4_fill_super+0x94f2/0xeb30 [ 352.932915][T15932] ? legacy_get_tree+0xde/0x170 [ 352.937782][T15932] ? vfs_get_tree+0x83/0x260 [ 352.942340][T15932] ? do_mount+0x19d0/0x2670 [ 352.946811][T15932] ? ksys_mount+0xc2/0xf0 [ 352.951113][T15932] should_fail+0x6f6/0x860 [ 352.955498][T15932] ? setup_fault_attr+0x3d0/0x3d0 [ 352.960488][T15932] __alloc_pages_nodemask+0x1c4/0x880 [ 352.965830][T15932] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 352.971348][T15932] ? ext4_calculate_overhead+0x23/0x1000 [ 352.976947][T15932] get_zeroed_page+0x15/0x40 [ 352.981505][T15932] ext4_calculate_overhead+0xc1/0x1000 [ 352.986932][T15932] ? register_shrinker+0x136/0x170 [ 352.992012][T15932] ext4_fill_super+0xab3a/0xeb30 [ 352.996919][T15932] ? ext4_mount+0x40/0x40 [ 353.001211][T15932] ? idr_replace+0x1c4/0x230 [ 353.005776][T15932] ? snprintf+0xd6/0x120 [ 353.009984][T15932] ? vscnprintf+0x80/0x80 [ 353.014289][T15932] ? set_blocksize+0x1a5/0x3a0 [ 353.019023][T15932] mount_bdev+0x22d/0x340 [ 353.023324][T15932] ? ext4_mount+0x40/0x40 [ 353.027619][T15932] legacy_get_tree+0xde/0x170 [ 353.032263][T15932] ? ext4_lazyinit_thread+0xd40/0xd40 [ 353.037607][T15932] vfs_get_tree+0x83/0x260 [ 353.042009][T15932] do_mount+0x19d0/0x2670 [ 353.046304][T15932] ? copy_mount_string+0x30/0x30 [ 353.051209][T15932] ? apic_timer_interrupt+0xa/0x20 [ 353.056287][T15932] ? apic_timer_interrupt+0xa/0x20 [ 353.061370][T15932] ? ksys_mount+0xae/0xf0 [ 353.065667][T15932] ksys_mount+0xc2/0xf0 [ 353.069814][T15932] __x64_sys_mount+0xb1/0xc0 [ 353.074549][T15932] do_syscall_64+0xcb/0x1e0 [ 353.079032][T15932] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 353.084892][T15932] RIP: 0033:0x7f1d6d50cc2a [ 353.089273][T15932] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 353.108841][T15932] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:55:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0xe803}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 353.117219][T15932] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 353.125159][T15932] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 353.133098][T15932] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 353.141479][T15932] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 353.149436][T15932] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:55:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:02 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 71) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xe0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xff, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0xf401}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0xff, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0xffff}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:02 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 353.491916][T16006] FAULT_INJECTION: forcing a failure. [ 353.491916][T16006] name failslab, interval 1, probability 0, space 0, times 0 04:55:03 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 353.716308][T16044] FAT-fs (loop3): bogus number of reserved sectors [ 353.722887][T16044] FAT-fs (loop3): Can't find a valid FAT filesystem [ 353.788690][T16006] CPU: 0 PID: 16006 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 353.800323][T16006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.810367][T16006] Call Trace: [ 353.813653][T16006] dump_stack+0x1d8/0x24e [ 353.818063][T16006] ? devkmsg_release+0x11c/0x11c [ 353.823089][T16006] ? __reset_page_owner+0x1f/0x120 [ 353.828181][T16006] ? show_regs_print_info+0x12/0x12 [ 353.833367][T16006] ? save_stack+0x155/0x1e0 [ 353.837935][T16006] ? prep_new_page+0x122/0x380 [ 353.842679][T16006] ? __reset_page_owner+0x120/0x120 [ 353.847860][T16006] ? free_pcp_prepare+0x1a9/0x270 [ 353.852857][T16006] should_fail+0x6f6/0x860 [ 353.857248][T16006] ? setup_fault_attr+0x3d0/0x3d0 [ 353.862267][T16006] ? alloc_workqueue+0x156/0x11d0 [ 353.867268][T16006] should_failslab+0x5/0x20 [ 353.871751][T16006] __kmalloc+0x5f/0x2f0 [ 353.875881][T16006] alloc_workqueue+0x156/0x11d0 [ 353.880700][T16006] ? __free_pages_core+0x190/0x190 [ 353.885782][T16006] ? ext4_bg_has_super+0xbb/0x390 [ 353.890787][T16006] ? ext4_fill_super+0xab45/0xeb30 [ 353.895878][T16006] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 353.901921][T16006] ext4_fill_super+0xaa33/0xeb30 [ 353.906833][T16006] ? ext4_mount+0x40/0x40 [ 353.911132][T16006] ? idr_replace+0x1c4/0x230 [ 353.915693][T16006] ? apic_timer_interrupt+0xa/0x20 [ 353.920778][T16006] ? set_blocksize+0x99/0x3a0 [ 353.925421][T16006] ? set_blocksize+0x12a/0x3a0 [ 353.930152][T16006] ? set_blocksize+0x1a5/0x3a0 [ 353.934892][T16006] mount_bdev+0x22d/0x340 [ 353.939199][T16006] ? ext4_mount+0x40/0x40 [ 353.943500][T16006] legacy_get_tree+0xde/0x170 [ 353.948149][T16006] ? ext4_lazyinit_thread+0xd40/0xd40 [ 353.953506][T16006] vfs_get_tree+0x83/0x260 [ 353.957892][T16006] do_mount+0x19d0/0x2670 [ 353.962206][T16006] ? copy_mount_string+0x30/0x30 [ 353.967124][T16006] ? copy_mount_options+0x1d8/0x300 [ 353.977583][T16006] ? copy_mount_options+0x210/0x300 [ 353.982751][T16006] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 353.988877][T16006] ? copy_mount_options+0x273/0x300 [ 353.994092][T16006] ksys_mount+0xc2/0xf0 [ 353.998219][T16006] __x64_sys_mount+0xb1/0xc0 [ 354.002777][T16006] do_syscall_64+0xcb/0x1e0 [ 354.007256][T16006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 354.013116][T16006] RIP: 0033:0x7f1d6d50cc2a [ 354.017498][T16006] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 354.037071][T16006] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 354.045448][T16006] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 354.053386][T16006] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 354.061322][T16006] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 354.069285][T16006] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 354.077241][T16006] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 354.089070][T16006] EXT4-fs: failed to create workqueue [ 354.100148][T16006] EXT4-fs (loop0): mount failed 04:55:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:03 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:03 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4400, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:03 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:03 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 72) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:03 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2b, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:03 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 354.387940][T16075] FAULT_INJECTION: forcing a failure. [ 354.387940][T16075] name failslab, interval 1, probability 0, space 0, times 0 [ 354.497234][T16109] FAT-fs (loop3): bogus number of reserved sectors [ 354.503820][T16109] FAT-fs (loop3): Can't find a valid FAT filesystem [ 354.540468][T16075] CPU: 0 PID: 16075 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 354.552097][T16075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.562140][T16075] Call Trace: [ 354.565421][T16075] dump_stack+0x1d8/0x24e [ 354.569734][T16075] ? devkmsg_release+0x11c/0x11c [ 354.574655][T16075] ? show_regs_print_info+0x12/0x12 [ 354.579836][T16075] should_fail+0x6f6/0x860 [ 354.584238][T16075] ? setup_fault_attr+0x3d0/0x3d0 04:55:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2c, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 354.589246][T16075] ? alloc_workqueue+0x1cb/0x11d0 [ 354.594257][T16075] should_failslab+0x5/0x20 [ 354.598742][T16075] kmem_cache_alloc_trace+0x39/0x2b0 [ 354.604029][T16075] alloc_workqueue+0x1cb/0x11d0 [ 354.608865][T16075] ? __free_pages_core+0x190/0x190 [ 354.614063][T16075] ? ext4_bg_has_super+0xbb/0x390 [ 354.619254][T16075] ? ext4_fill_super+0xab45/0xeb30 [ 354.624358][T16075] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 354.630408][T16075] ext4_fill_super+0xaa33/0xeb30 [ 354.635321][T16075] ? ext4_mount+0x40/0x40 [ 354.639618][T16075] ? idr_replace+0x1c4/0x230 [ 354.644176][T16075] ? snprintf+0xd6/0x120 [ 354.648389][T16075] ? vscnprintf+0x80/0x80 [ 354.652685][T16075] ? set_blocksize+0x1a5/0x3a0 [ 354.657423][T16075] mount_bdev+0x22d/0x340 [ 354.661723][T16075] ? ext4_mount+0x40/0x40 [ 354.666021][T16075] legacy_get_tree+0xde/0x170 [ 354.670665][T16075] ? ext4_lazyinit_thread+0xd40/0xd40 [ 354.676005][T16075] vfs_get_tree+0x83/0x260 [ 354.680391][T16075] do_mount+0x19d0/0x2670 [ 354.684815][T16075] ? copy_mount_string+0x30/0x30 [ 354.689728][T16075] ? copy_mount_options+0x1d8/0x300 [ 354.694897][T16075] ? copy_mount_options+0x210/0x300 [ 354.700067][T16075] ? __sanitizer_cov_trace_pc+0x28/0x50 [ 354.705584][T16075] ? copy_mount_options+0x273/0x300 [ 354.710838][T16075] ksys_mount+0xc2/0xf0 [ 354.714967][T16075] __x64_sys_mount+0xb1/0xc0 [ 354.719526][T16075] do_syscall_64+0xcb/0x1e0 [ 354.723998][T16075] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 354.729905][T16075] RIP: 0033:0x7f1d6d50cc2a [ 354.734293][T16075] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 354.753864][T16075] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 354.762853][T16075] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 354.770799][T16075] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 354.778740][T16075] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 04:55:04 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x5800, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 354.786684][T16075] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 354.794637][T16075] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 354.812259][T16075] EXT4-fs: failed to create workqueue [ 354.818242][T16075] EXT4-fs (loop0): mount failed 04:55:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2b, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 73) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x10}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2c, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x3c, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 355.238422][T16146] FAULT_INJECTION: forcing a failure. [ 355.238422][T16146] name failslab, interval 1, probability 0, space 0, times 0 [ 355.283023][T16146] CPU: 0 PID: 16146 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 355.294655][T16146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.304696][T16146] Call Trace: [ 355.307981][T16146] dump_stack+0x1d8/0x24e [ 355.312297][T16146] ? devkmsg_release+0x11c/0x11c [ 355.317225][T16146] ? show_regs_print_info+0x12/0x12 [ 355.322410][T16146] ? should_fail+0x3b3/0x860 [ 355.326986][T16146] should_fail+0x6f6/0x860 [ 355.331385][T16146] ? setup_fault_attr+0x3d0/0x3d0 [ 355.336390][T16146] ? alloc_workqueue+0x1cb/0x11d0 [ 355.341394][T16146] should_failslab+0x5/0x20 [ 355.345878][T16146] kmem_cache_alloc_trace+0x39/0x2b0 [ 355.351145][T16146] ? alloc_workqueue+0x156/0x11d0 [ 355.356153][T16146] alloc_workqueue+0x1cb/0x11d0 [ 355.360993][T16146] ? __free_pages_core+0x190/0x190 [ 355.366098][T16146] ? ext4_bg_has_super+0xbb/0x390 [ 355.371108][T16146] ? ext4_fill_super+0xab45/0xeb30 [ 355.376201][T16146] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 355.382251][T16146] ext4_fill_super+0xaa33/0xeb30 [ 355.387180][T16146] ? ext4_mount+0x40/0x40 [ 355.391494][T16146] ? idr_replace+0x1c4/0x230 [ 355.396086][T16146] ? snprintf+0xd6/0x120 [ 355.400405][T16146] ? apic_timer_interrupt+0xa/0x20 [ 355.405507][T16146] ? pointer+0xae/0xb10 [ 355.409655][T16146] ? set_blocksize+0x1a5/0x3a0 [ 355.413369][T16172] FAT-fs (loop3): bogus number of reserved sectors [ 355.414407][T16146] mount_bdev+0x22d/0x340 [ 355.414418][T16146] ? ext4_mount+0x40/0x40 04:55:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:04 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 355.414433][T16146] legacy_get_tree+0xde/0x170 [ 355.420906][T16172] FAT-fs (loop3): Can't find a valid FAT filesystem [ 355.425211][T16146] ? ext4_lazyinit_thread+0xd40/0xd40 [ 355.425221][T16146] vfs_get_tree+0x83/0x260 [ 355.425230][T16146] do_mount+0x19d0/0x2670 [ 355.425240][T16146] ? copy_mount_string+0x30/0x30 [ 355.425248][T16146] ? copy_mount_options+0x1d8/0x300 [ 355.425261][T16146] ? copy_mount_options+0x210/0x300 [ 355.470261][T16146] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 355.470276][T16146] ? copy_mount_options+0x273/0x300 [ 355.480969][T16146] ksys_mount+0xc2/0xf0 [ 355.485116][T16146] __x64_sys_mount+0xb1/0xc0 [ 355.489690][T16146] do_syscall_64+0xcb/0x1e0 [ 355.494168][T16146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 355.500033][T16146] RIP: 0033:0x7f1d6d50cc2a [ 355.504430][T16146] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 355.524004][T16146] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 355.532382][T16146] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 355.540453][T16146] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 355.548399][T16146] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 355.556351][T16146] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 355.564295][T16146] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 355.574168][T16146] EXT4-fs: failed to create workqueue [ 355.579592][T16146] EXT4-fs (loop0): mount failed 04:55:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:05 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x29}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:05 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x3c, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:05 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 74) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:05 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:05 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 356.082056][T16206] FAULT_INJECTION: forcing a failure. [ 356.082056][T16206] name failslab, interval 1, probability 0, space 0, times 0 04:55:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2b}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 356.122931][T16206] CPU: 0 PID: 16206 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 356.134560][T16206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.144612][T16206] Call Trace: [ 356.147896][T16206] dump_stack+0x1d8/0x24e [ 356.152234][T16206] ? devkmsg_release+0x11c/0x11c [ 356.157168][T16206] ? show_regs_print_info+0x12/0x12 [ 356.162359][T16206] should_fail+0x6f6/0x860 [ 356.166768][T16206] ? setup_fault_attr+0x3d0/0x3d0 04:55:05 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:05 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 356.171787][T16206] ? unwind_get_return_address+0x48/0x80 [ 356.177407][T16206] ? apply_wqattrs_prepare+0x102/0x17e0 [ 356.182944][T16206] should_failslab+0x5/0x20 [ 356.187443][T16206] kmem_cache_alloc_trace+0x39/0x2b0 [ 356.192728][T16206] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 356.198174][T16206] apply_wqattrs_prepare+0x102/0x17e0 [ 356.203532][T16206] ? alloc_workqueue+0x1cb/0x11d0 [ 356.208550][T16206] ? ext4_fill_super+0xaa33/0xeb30 [ 356.213646][T16206] ? mount_bdev+0x22d/0x340 [ 356.218136][T16206] ? legacy_get_tree+0xde/0x170 [ 356.222975][T16206] ? vfs_get_tree+0x83/0x260 [ 356.227551][T16206] ? do_mount+0x19d0/0x2670 [ 356.232045][T16206] ? ksys_mount+0xc2/0xf0 [ 356.236361][T16206] ? __x64_sys_mount+0xb1/0xc0 [ 356.241130][T16206] ? do_syscall_64+0xcb/0x1e0 [ 356.245880][T16206] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.251949][T16206] ? format_decode+0x441/0x1ab0 [ 356.256787][T16206] ? cwt_wakefn+0x70/0x70 [ 356.261103][T16206] ? vsnprintf+0x1d60/0x1d60 [ 356.265685][T16206] ? vsnprintf+0x1e4/0x1d60 [ 356.270179][T16206] apply_workqueue_attrs_locked+0x136/0x6d0 [ 356.276057][T16206] ? check_preemption_disabled+0x9e/0x330 [ 356.281767][T16206] ? apply_workqueue_attrs+0x40/0x40 [ 356.287035][T16206] ? mutex_lock+0xa6/0x110 [ 356.291432][T16206] ? mutex_trylock+0xb0/0xb0 [ 356.296019][T16206] ? alloc_workqueue+0x420/0x11d0 [ 356.301031][T16206] alloc_workqueue+0xcc4/0x11d0 [ 356.305882][T16206] ? ext4_fill_super+0xab45/0xeb30 [ 356.310984][T16206] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 356.317046][T16206] ext4_fill_super+0xaa33/0xeb30 [ 356.321967][T16206] ? ext4_mount+0x40/0x40 [ 356.326264][T16206] ? idr_replace+0x1c4/0x230 [ 356.330821][T16206] ? snprintf+0xd6/0x120 [ 356.335032][T16206] ? delete_node+0x733/0x790 [ 356.339592][T16206] ? vscnprintf+0x80/0x80 [ 356.343892][T16206] ? set_blocksize+0x1a5/0x3a0 [ 356.348624][T16206] mount_bdev+0x22d/0x340 [ 356.352923][T16206] ? ext4_mount+0x40/0x40 [ 356.357222][T16206] legacy_get_tree+0xde/0x170 [ 356.361867][T16206] ? ext4_lazyinit_thread+0xd40/0xd40 [ 356.367216][T16206] vfs_get_tree+0x83/0x260 [ 356.371599][T16206] do_mount+0x19d0/0x2670 [ 356.375897][T16206] ? copy_mount_string+0x30/0x30 [ 356.380802][T16206] ? copy_mount_options+0x1d8/0x300 [ 356.385968][T16206] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x90 [ 356.392174][T16206] ? copy_mount_options+0x273/0x300 [ 356.397337][T16206] ksys_mount+0xc2/0xf0 [ 356.401477][T16206] __x64_sys_mount+0xb1/0xc0 [ 356.406042][T16206] do_syscall_64+0xcb/0x1e0 [ 356.410555][T16206] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.416507][T16206] RIP: 0033:0x7f1d6d50cc2a [ 356.420900][T16206] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 356.440474][T16206] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 356.448862][T16206] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 356.456804][T16206] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 356.464755][T16206] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 356.472694][T16206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 356.480637][T16206] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 356.552899][T16206] EXT4-fs: failed to create workqueue [ 356.558468][T16206] EXT4-fs (loop0): mount failed [ 356.631642][T16267] FAT-fs (loop3): bogus number of reserved sectors [ 356.638225][T16267] FAT-fs (loop3): Can't find a valid FAT filesystem 04:55:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2c}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x10000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:06 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 75) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x5, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2f}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x29000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 356.981541][T16280] FAULT_INJECTION: forcing a failure. [ 356.981541][T16280] name failslab, interval 1, probability 0, space 0, times 0 04:55:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x7, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 357.157052][T16280] CPU: 0 PID: 16280 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 357.168681][T16280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.178718][T16280] Call Trace: [ 357.181999][T16280] dump_stack+0x1d8/0x24e [ 357.186311][T16280] ? devkmsg_release+0x11c/0x11c [ 357.191226][T16280] ? arch_stack_walk+0xf8/0x140 [ 357.196056][T16280] ? show_regs_print_info+0x12/0x12 [ 357.201246][T16280] should_fail+0x6f6/0x860 04:55:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x3c}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 357.205651][T16280] ? setup_fault_attr+0x3d0/0x3d0 [ 357.210661][T16280] ? stack_trace_save+0x1f0/0x1f0 [ 357.215670][T16280] ? apic_timer_interrupt+0xa/0x20 [ 357.220777][T16280] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 357.226225][T16280] should_failslab+0x5/0x20 [ 357.230719][T16280] kmem_cache_alloc_trace+0x39/0x2b0 [ 357.235987][T16280] apply_wqattrs_prepare+0xcb/0x17e0 [ 357.241247][T16280] ? alloc_workqueue+0x1cb/0x11d0 [ 357.246244][T16280] ? ext4_fill_super+0xaa33/0xeb30 [ 357.251442][T16280] ? mount_bdev+0x22d/0x340 [ 357.255924][T16280] ? legacy_get_tree+0xde/0x170 [ 357.260765][T16280] ? vfs_get_tree+0x83/0x260 [ 357.265321][T16280] ? do_mount+0x19d0/0x2670 [ 357.269792][T16280] ? ksys_mount+0xc2/0xf0 [ 357.274095][T16280] ? __x64_sys_mount+0xb1/0xc0 [ 357.278829][T16280] ? do_syscall_64+0xcb/0x1e0 [ 357.283472][T16280] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 357.289507][T16280] ? format_decode+0x441/0x1ab0 [ 357.294325][T16280] ? cwt_wakefn+0x70/0x70 [ 357.298623][T16280] ? vsnprintf+0x1d60/0x1d60 [ 357.303182][T16280] ? vsnprintf+0x1e4/0x1d60 [ 357.307657][T16280] apply_workqueue_attrs_locked+0x136/0x6d0 [ 357.313519][T16280] ? check_preemption_disabled+0x9e/0x330 [ 357.319206][T16280] ? apply_workqueue_attrs+0x40/0x40 [ 357.324457][T16280] ? mutex_lock+0xa6/0x110 [ 357.328840][T16280] ? mutex_trylock+0xb0/0xb0 [ 357.333398][T16280] ? __this_cpu_preempt_check+0x9/0x20 [ 357.338824][T16280] ? __sanitizer_cov_trace_pc+0x4/0x50 [ 357.344262][T16280] alloc_workqueue+0xcc4/0x11d0 [ 357.349084][T16280] ? ext4_fill_super+0xab45/0xeb30 [ 357.354170][T16280] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 357.360214][T16280] ext4_fill_super+0xaa33/0xeb30 [ 357.365131][T16280] ? ext4_mount+0x40/0x40 [ 357.369428][T16280] ? pointer+0xae/0xb10 [ 357.373560][T16280] ? vsnprintf+0x1caa/0x1d60 [ 357.378124][T16280] ? snprintf+0xdf/0x120 [ 357.382334][T16280] ? vscnprintf+0x80/0x80 [ 357.386637][T16280] ? set_blocksize+0x1a5/0x3a0 [ 357.391371][T16280] mount_bdev+0x22d/0x340 [ 357.395673][T16280] ? ext4_mount+0x40/0x40 [ 357.399971][T16280] legacy_get_tree+0xde/0x170 [ 357.404617][T16280] ? ext4_lazyinit_thread+0xd40/0xd40 [ 357.410020][T16280] vfs_get_tree+0x83/0x260 [ 357.414405][T16280] do_mount+0x19d0/0x2670 [ 357.418704][T16280] ? copy_mount_string+0x30/0x30 [ 357.423609][T16280] ? copy_mount_options+0x1d8/0x300 [ 357.428773][T16280] ? copy_mount_options+0x210/0x300 [ 357.433943][T16280] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 357.439455][T16280] ? copy_mount_options+0x273/0x300 [ 357.444619][T16280] ksys_mount+0xc2/0xf0 [ 357.448742][T16280] __x64_sys_mount+0xb1/0xc0 [ 357.453301][T16280] do_syscall_64+0xcb/0x1e0 [ 357.457772][T16280] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 357.463670][T16280] RIP: 0033:0x7f1d6d50cc2a [ 357.468069][T16280] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 357.487680][T16280] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 357.496058][T16280] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a 04:55:06 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 357.504033][T16280] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 357.511971][T16280] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 357.519915][T16280] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 357.527856][T16280] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 357.540624][T16308] FAT-fs (loop3): invalid media value (0x00) [ 357.546761][T16308] FAT-fs (loop3): Can't find a valid FAT filesystem [ 357.550595][T16280] EXT4-fs: failed to create workqueue 04:55:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 357.561713][T16280] EXT4-fs (loop0): mount failed 04:55:07 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 76) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x8, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x5, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x44}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x58}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 357.859131][T16367] FAULT_INJECTION: forcing a failure. [ 357.859131][T16367] name failslab, interval 1, probability 0, space 0, times 0 [ 357.934108][T16367] CPU: 1 PID: 16367 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 357.945735][T16367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.955775][T16367] Call Trace: [ 357.959064][T16367] dump_stack+0x1d8/0x24e [ 357.963388][T16367] ? devkmsg_release+0x11c/0x11c [ 357.968313][T16367] ? show_regs_print_info+0x12/0x12 [ 357.973501][T16367] should_fail+0x6f6/0x860 [ 357.977898][T16367] ? setup_fault_attr+0x3d0/0x3d0 [ 357.982904][T16367] ? apic_timer_interrupt+0xa/0x20 [ 357.987992][T16367] ? apply_wqattrs_prepare+0x8a5/0x17e0 [ 357.993518][T16367] should_failslab+0x5/0x20 [ 357.998001][T16367] kmem_cache_alloc+0x36/0x290 [ 358.002751][T16367] apply_wqattrs_prepare+0x8a5/0x17e0 [ 358.008106][T16367] ? do_mount+0x19d0/0x2670 [ 358.012592][T16367] ? format_decode+0x441/0x1ab0 [ 358.017426][T16367] ? cwt_wakefn+0x70/0x70 [ 358.021742][T16367] ? vsnprintf+0x1d60/0x1d60 [ 358.026314][T16367] ? apic_timer_interrupt+0xa/0x20 [ 358.031413][T16367] apply_workqueue_attrs_locked+0x136/0x6d0 [ 358.037296][T16367] ? mutex_lock+0xcd/0x110 [ 358.041703][T16367] ? apply_workqueue_attrs+0x40/0x40 [ 358.046969][T16367] ? mutex_trylock+0xb0/0xb0 [ 358.051529][T16367] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 358.057046][T16367] ? free_unref_page_commit+0x11e/0x3a0 [ 358.062559][T16367] alloc_workqueue+0xcc4/0x11d0 [ 358.067379][T16367] ? ext4_fill_super+0xab45/0xeb30 [ 358.072459][T16367] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 358.078493][T16367] ext4_fill_super+0xaa33/0xeb30 [ 358.083401][T16367] ? ext4_mount+0x40/0x40 [ 358.087695][T16367] ? idr_replace+0x1c4/0x230 [ 358.092252][T16367] ? apic_timer_interrupt+0xa/0x20 [ 358.097331][T16367] ? set_blocksize+0x99/0x3a0 [ 358.101973][T16367] ? set_blocksize+0x120/0x3a0 [ 358.106707][T16367] ? set_blocksize+0x1a5/0x3a0 [ 358.111436][T16367] mount_bdev+0x22d/0x340 [ 358.115736][T16367] ? ext4_mount+0x40/0x40 [ 358.120033][T16367] legacy_get_tree+0xde/0x170 [ 358.124674][T16367] ? ext4_lazyinit_thread+0xd40/0xd40 [ 358.130011][T16367] vfs_get_tree+0x83/0x260 [ 358.134395][T16367] do_mount+0x19d0/0x2670 [ 358.138695][T16367] ? copy_mount_string+0x30/0x30 [ 358.143634][T16367] ? copy_mount_options+0x1d8/0x300 [ 358.148798][T16367] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x90 [ 358.155003][T16367] ? copy_mount_options+0x273/0x300 [ 358.160170][T16367] ksys_mount+0xc2/0xf0 [ 358.164293][T16367] __x64_sys_mount+0xb1/0xc0 [ 358.168850][T16367] do_syscall_64+0xcb/0x1e0 [ 358.173319][T16367] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 358.179180][T16367] RIP: 0033:0x7f1d6d50cc2a [ 358.183562][T16367] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 358.203132][T16367] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 358.211510][T16367] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 358.219448][T16367] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 358.227386][T16367] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 04:55:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0xe0}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x7, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 358.235322][T16367] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 358.243299][T16367] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 358.258604][T16367] EXT4-fs: failed to create workqueue [ 358.258825][T16391] FAT-fs (loop3): invalid media value (0x00) [ 358.264206][T16367] EXT4-fs (loop0): mount failed [ 358.269975][T16391] FAT-fs (loop3): Can't find a valid FAT filesystem 04:55:07 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xa, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x8, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 77) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:08 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xb, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x40000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x1f4}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x9, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x44000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x300}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xc, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 358.725951][T16441] FAULT_INJECTION: forcing a failure. [ 358.725951][T16441] name failslab, interval 1, probability 0, space 0, times 0 [ 358.821070][T16441] CPU: 1 PID: 16441 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 358.832700][T16441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.842739][T16441] Call Trace: [ 358.846021][T16441] dump_stack+0x1d8/0x24e [ 358.850338][T16441] ? devkmsg_release+0x11c/0x11c [ 358.855259][T16441] ? show_regs_print_info+0x12/0x12 [ 358.860438][T16441] ? apply_workqueue_attrs_locked+0x333/0x6d0 [ 358.866482][T16441] ? kfree+0xe0/0x660 04:55:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x3e8}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 358.870443][T16441] should_fail+0x6f6/0x860 [ 358.874840][T16441] ? setup_fault_attr+0x3d0/0x3d0 [ 358.879851][T16441] ? __should_failslab+0xff/0x150 [ 358.884857][T16441] ? init_rescuer+0x89/0x290 [ 358.889430][T16441] should_failslab+0x5/0x20 [ 358.893921][T16441] kmem_cache_alloc_trace+0x39/0x2b0 [ 358.899189][T16441] ? mutex_trylock+0xb0/0xb0 [ 358.903759][T16441] init_rescuer+0x89/0x290 [ 358.908156][T16441] alloc_workqueue+0xdae/0x11d0 [ 358.912998][T16441] ? ext4_fill_super+0xab45/0xeb30 04:55:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x58000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 358.918100][T16441] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 358.924159][T16441] ext4_fill_super+0xaa33/0xeb30 [ 358.929100][T16441] ? ext4_mount+0x40/0x40 [ 358.933416][T16441] ? idr_replace+0x1c4/0x230 [ 358.937977][T16441] ? apic_timer_interrupt+0xa/0x20 [ 358.943066][T16441] ? set_blocksize+0x99/0x3a0 [ 358.947713][T16441] ? set_blocksize+0x120/0x3a0 [ 358.952444][T16441] ? set_blocksize+0x1a5/0x3a0 [ 358.957179][T16441] mount_bdev+0x22d/0x340 [ 358.961477][T16441] ? ext4_mount+0x40/0x40 [ 358.965773][T16441] legacy_get_tree+0xde/0x170 [ 358.970429][T16441] ? ext4_lazyinit_thread+0xd40/0xd40 [ 358.975775][T16441] vfs_get_tree+0x83/0x260 [ 358.980165][T16441] do_mount+0x19d0/0x2670 [ 358.984485][T16441] ? copy_mount_string+0x30/0x30 [ 358.989398][T16441] ? apic_timer_interrupt+0xa/0x20 [ 358.994545][T16441] ? copy_mount_options+0x1c6/0x300 [ 358.999710][T16441] ? copy_mount_options+0x273/0x300 [ 359.004876][T16441] ksys_mount+0xc2/0xf0 [ 359.009015][T16441] __x64_sys_mount+0xb1/0xc0 [ 359.013574][T16441] do_syscall_64+0xcb/0x1e0 [ 359.018055][T16441] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.023922][T16441] RIP: 0033:0x7f1d6d50cc2a [ 359.028305][T16441] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 359.047877][T16441] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 359.056259][T16441] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 359.064201][T16441] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 359.072140][T16441] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 359.080083][T16441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 359.088033][T16441] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 359.103191][T16475] FAT-fs (loop3): invalid media value (0x00) [ 359.109343][T16475] FAT-fs (loop3): Can't find a valid FAT filesystem [ 359.127148][T16441] EXT4-fs: failed to create workqueue [ 359.138718][T16441] EXT4-fs (loop0): mount failed 04:55:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:08 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xd, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x600}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xa, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 78) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:08 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x89ffffff, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xb, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 359.589964][T16504] FAULT_INJECTION: forcing a failure. [ 359.589964][T16504] name failslab, interval 1, probability 0, space 0, times 0 [ 359.665895][T16504] CPU: 1 PID: 16504 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 359.677539][T16504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.687590][T16504] Call Trace: [ 359.690889][T16504] dump_stack+0x1d8/0x24e [ 359.695208][T16504] ? devkmsg_release+0x11c/0x11c [ 359.700128][T16504] ? show_regs_print_info+0x12/0x12 [ 359.705305][T16504] ? stack_trace_save+0x120/0x1f0 [ 359.710309][T16504] ? __x64_sys_mount+0xb1/0xc0 [ 359.715072][T16504] ? do_syscall_64+0xcb/0x1e0 [ 359.719727][T16504] should_fail+0x6f6/0x860 [ 359.724129][T16504] ? setup_fault_attr+0x3d0/0x3d0 [ 359.729135][T16504] ? __sanitizer_cov_trace_pc+0x28/0x50 [ 359.734664][T16504] ? __kthread_create_on_node+0x126/0x410 [ 359.740372][T16504] should_failslab+0x5/0x20 [ 359.744859][T16504] kmem_cache_alloc_trace+0x39/0x2b0 [ 359.750128][T16504] ? ext4_fill_super+0xaa33/0xeb30 [ 359.755219][T16504] ? mount_bdev+0x22d/0x340 [ 359.759703][T16504] ? rcu_free_pwq+0x20/0x20 04:55:09 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x10, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 359.764185][T16504] ? rcu_free_pwq+0x20/0x20 [ 359.768676][T16504] __kthread_create_on_node+0x126/0x410 [ 359.774211][T16504] ? kthread_create_on_node+0x120/0x120 [ 359.779758][T16504] ? rcu_free_pwq+0x20/0x20 [ 359.784251][T16504] kthread_create_on_node+0xda/0x120 [ 359.789526][T16504] ? tsk_fork_get_node+0x10/0x10 [ 359.794465][T16504] ? init_rescuer+0x89/0x290 [ 359.799044][T16504] ? init_rescuer+0x89/0x290 [ 359.803625][T16504] ? mutex_trylock+0xb0/0xb0 [ 359.808202][T16504] init_rescuer+0x1a6/0x290 [ 359.812696][T16504] alloc_workqueue+0xdae/0x11d0 [ 359.817533][T16504] ? ext4_fill_super+0xab45/0xeb30 [ 359.822621][T16504] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 359.828684][T16504] ext4_fill_super+0xaa33/0xeb30 [ 359.828702][T16504] ? ext4_mount+0x40/0x40 [ 359.837946][T16504] ? snprintf+0xd6/0x120 [ 359.842167][T16504] ? vscnprintf+0x80/0x80 [ 359.846474][T16504] ? set_blocksize+0x1a5/0x3a0 [ 359.851212][T16504] mount_bdev+0x22d/0x340 [ 359.855587][T16504] ? ext4_mount+0x40/0x40 [ 359.859967][T16504] legacy_get_tree+0xde/0x170 [ 359.864627][T16504] ? ext4_lazyinit_thread+0xd40/0xd40 [ 359.869987][T16504] vfs_get_tree+0x83/0x260 [ 359.874399][T16504] do_mount+0x19d0/0x2670 [ 359.878711][T16504] ? copy_mount_string+0x30/0x30 [ 359.883622][T16504] ? copy_mount_options+0x1d8/0x300 [ 359.888789][T16504] ? copy_mount_options+0x210/0x300 [ 359.893989][T16504] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 359.900123][T16504] ? copy_mount_options+0x273/0x300 [ 359.905287][T16504] ksys_mount+0xc2/0xf0 [ 359.909419][T16504] __x64_sys_mount+0xb1/0xc0 [ 359.913990][T16504] do_syscall_64+0xcb/0x1e0 [ 359.918473][T16504] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.924461][T16504] RIP: 0033:0x7f1d6d50cc2a [ 359.928861][T16504] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 359.948437][T16504] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 359.956926][T16504] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a 04:55:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe0000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2900}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 359.964877][T16504] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 359.972820][T16504] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 359.980773][T16504] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 359.988712][T16504] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 360.001815][T16525] FAT-fs (loop3): invalid media value (0x00) [ 360.002689][T16504] EXT4-fs: failed to create workqueue 04:55:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xc, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 360.007975][T16525] FAT-fs (loop3): Can't find a valid FAT filesystem [ 360.021983][T16504] EXT4-fs (loop0): mount failed 04:55:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xd, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2b00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x11, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 79) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xffffff89, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2c00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x12, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:09 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xffffffff, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 360.497632][T16584] FAULT_INJECTION: forcing a failure. [ 360.497632][T16584] name failslab, interval 1, probability 0, space 0, times 0 [ 360.522781][T16584] CPU: 0 PID: 16584 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 360.534410][T16584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.544452][T16584] Call Trace: [ 360.547732][T16584] dump_stack+0x1d8/0x24e [ 360.552046][T16584] ? devkmsg_release+0x11c/0x11c [ 360.556970][T16584] ? show_regs_print_info+0x12/0x12 [ 360.562148][T16584] should_fail+0x6f6/0x860 [ 360.566551][T16584] ? setup_fault_attr+0x3d0/0x3d0 [ 360.571689][T16584] ? __kasan_kmalloc+0x1a3/0x1e0 [ 360.576613][T16584] ? __kthread_create_on_node+0x126/0x410 [ 360.582317][T16584] should_failslab+0x5/0x20 [ 360.586805][T16584] kmem_cache_alloc_trace+0x39/0x2b0 [ 360.592076][T16584] ? ext4_fill_super+0xaa33/0xeb30 [ 360.597171][T16584] ? mount_bdev+0x22d/0x340 [ 360.601656][T16584] ? rcu_free_pwq+0x20/0x20 [ 360.606143][T16584] ? rcu_free_pwq+0x20/0x20 [ 360.610630][T16584] __kthread_create_on_node+0x126/0x410 [ 360.616159][T16584] ? kthread_create_on_node+0x120/0x120 [ 360.621690][T16584] ? rcu_free_pwq+0x20/0x20 [ 360.626179][T16584] kthread_create_on_node+0xda/0x120 [ 360.631447][T16584] ? tsk_fork_get_node+0x10/0x10 [ 360.636377][T16584] ? init_rescuer+0x89/0x290 [ 360.640944][T16584] ? init_rescuer+0x89/0x290 [ 360.645514][T16584] init_rescuer+0x1a6/0x290 [ 360.650001][T16584] alloc_workqueue+0xdae/0x11d0 [ 360.655013][T16584] ? ext4_fill_super+0xab45/0xeb30 [ 360.660108][T16584] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 360.666166][T16584] ext4_fill_super+0xaa33/0xeb30 [ 360.670576][T16599] FAT-fs (loop3): invalid media value (0x00) [ 360.671101][T16584] ? ext4_mount+0x40/0x40 [ 360.671115][T16584] ? idr_replace+0x1c4/0x230 [ 360.677084][T16599] FAT-fs (loop3): Can't find a valid FAT filesystem [ 360.681375][T16584] ? snprintf+0xd6/0x120 04:55:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x2f00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x10, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 360.696955][T16584] ? vscnprintf+0x80/0x80 [ 360.701277][T16584] ? set_blocksize+0x1a5/0x3a0 [ 360.706045][T16584] mount_bdev+0x22d/0x340 [ 360.706062][T16584] ? ext4_mount+0x40/0x40 [ 360.714777][T16584] legacy_get_tree+0xde/0x170 [ 360.719443][T16584] ? ext4_lazyinit_thread+0xd40/0xd40 [ 360.724804][T16584] vfs_get_tree+0x83/0x260 [ 360.729212][T16584] do_mount+0x19d0/0x2670 [ 360.733536][T16584] ? copy_mount_string+0x30/0x30 [ 360.738458][T16584] ? copy_mount_options+0x1d8/0x300 [ 360.743640][T16584] ? copy_mount_options+0x210/0x300 [ 360.748826][T16584] ? __sanitizer_cov_trace_pc+0x36/0x50 [ 360.754363][T16584] ? copy_mount_options+0x273/0x300 [ 360.759532][T16584] ksys_mount+0xc2/0xf0 [ 360.763678][T16584] __x64_sys_mount+0xb1/0xc0 [ 360.768240][T16584] do_syscall_64+0xcb/0x1e0 [ 360.772713][T16584] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 360.778574][T16584] RIP: 0033:0x7f1d6d50cc2a [ 360.782958][T16584] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 360.802534][T16584] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 360.810929][T16584] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 360.818871][T16584] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 360.826854][T16584] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 360.834811][T16584] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 360.842759][T16584] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 360.852579][T16584] EXT4-fs: failed to create workqueue [ 360.858206][T16584] EXT4-fs (loop0): mount failed 04:55:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:10 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x3c00}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:10 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 80) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x25, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x11, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x29, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 361.300801][T16637] net_ratelimit: 24 callbacks suppressed [ 361.300811][T16637] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 361.333467][T16652] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:55:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x4000}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 361.353393][T16645] FAULT_INJECTION: forcing a failure. [ 361.353393][T16645] name failslab, interval 1, probability 0, space 0, times 0 04:55:10 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 361.479843][T16645] CPU: 1 PID: 16645 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 361.491504][T16645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.501551][T16645] Call Trace: [ 361.504837][T16645] dump_stack+0x1d8/0x24e [ 361.509153][T16645] ? devkmsg_release+0x11c/0x11c [ 361.514071][T16645] ? show_regs_print_info+0x12/0x12 [ 361.519248][T16645] should_fail+0x6f6/0x860 [ 361.523642][T16645] ? setup_fault_attr+0x3d0/0x3d0 [ 361.528646][T16645] ? security_inode_alloc+0x32/0x1d0 [ 361.533919][T16645] should_failslab+0x5/0x20 [ 361.538411][T16645] kmem_cache_alloc+0x36/0x290 [ 361.543164][T16645] ? from_kuid_munged+0x3b0/0x3b0 [ 361.548177][T16645] security_inode_alloc+0x32/0x1d0 [ 361.553285][T16645] inode_init_always+0x387/0x810 [ 361.558205][T16645] ? set_qf_name+0x310/0x310 [ 361.562766][T16645] iget_locked+0x1d6/0x7b0 [ 361.567159][T16645] __ext4_iget+0x321/0x4a50 [ 361.571640][T16645] ? mutex_unlock+0x19/0x40 [ 361.576112][T16645] ? ext4_get_projid+0x140/0x140 [ 361.581021][T16645] ? ext4_fill_super+0xab45/0xeb30 [ 361.586110][T16645] ext4_fill_super+0xaafa/0xeb30 [ 361.591023][T16645] ? ext4_mount+0x40/0x40 [ 361.595446][T16645] ? idr_replace+0x1c4/0x230 [ 361.600009][T16645] ? snprintf+0xd6/0x120 [ 361.604225][T16645] ? vscnprintf+0x80/0x80 [ 361.608538][T16645] ? set_blocksize+0x1a5/0x3a0 [ 361.613305][T16645] mount_bdev+0x22d/0x340 [ 361.617611][T16645] ? ext4_mount+0x40/0x40 [ 361.621909][T16645] legacy_get_tree+0xde/0x170 [ 361.626556][T16645] ? ext4_lazyinit_thread+0xd40/0xd40 [ 361.631904][T16645] vfs_get_tree+0x83/0x260 [ 361.636303][T16645] do_mount+0x19d0/0x2670 [ 361.640612][T16645] ? copy_mount_string+0x30/0x30 [ 361.645538][T16645] ? apic_timer_interrupt+0xa/0x20 [ 361.650621][T16645] ? copy_mount_options+0x1f9/0x300 [ 361.655785][T16645] ? copy_mount_options+0x273/0x300 [ 361.660958][T16645] ksys_mount+0xc2/0xf0 [ 361.665097][T16645] __x64_sys_mount+0xb1/0xc0 [ 361.669666][T16645] do_syscall_64+0xcb/0x1e0 [ 361.674142][T16645] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 361.680006][T16645] RIP: 0033:0x7f1d6d50cc2a [ 361.684390][T16645] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 361.703964][T16645] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 361.712346][T16645] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 361.720294][T16645] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 04:55:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x12, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 361.728236][T16645] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 361.736178][T16645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 361.744123][T16645] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 361.757839][T16666] FAT-fs (loop3): invalid media value (0x00) [ 361.763857][T16666] FAT-fs (loop3): Can't find a valid FAT filesystem 04:55:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x4400}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 361.785185][T16645] EXT4-fs (loop0): get root inode failed [ 361.802772][T16645] EXT4-fs (loop0): mount failed 04:55:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x25, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 81) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x5800}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0xe000}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x29, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0xe803}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 362.229541][T16713] FAULT_INJECTION: forcing a failure. [ 362.229541][T16713] name failslab, interval 1, probability 0, space 0, times 0 [ 362.337174][T16745] FAT-fs (loop3): bogus number of FAT sectors [ 362.343319][T16745] FAT-fs (loop3): Can't find a valid FAT filesystem [ 362.396440][T16713] CPU: 1 PID: 16713 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 362.408162][T16713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.418375][T16713] Call Trace: [ 362.421654][T16713] dump_stack+0x1d8/0x24e [ 362.425976][T16713] ? devkmsg_release+0x11c/0x11c [ 362.430901][T16713] ? show_regs_print_info+0x12/0x12 [ 362.436089][T16713] ? should_fail+0x3b3/0x860 [ 362.440668][T16713] should_fail+0x6f6/0x860 [ 362.445071][T16713] ? setup_fault_attr+0x3d0/0x3d0 [ 362.450077][T16713] ? stack_trace_save+0x120/0x1f0 [ 362.455087][T16713] ? mempool_alloc_slab+0x16/0x20 [ 362.460097][T16713] should_failslab+0x5/0x20 [ 362.464600][T16713] kmem_cache_alloc+0x36/0x290 [ 362.469346][T16713] ? mempool_free+0x380/0x380 [ 362.473992][T16713] mempool_alloc_slab+0x16/0x20 [ 362.478997][T16713] mempool_alloc+0x113/0x680 [ 362.483561][T16713] ? mempool_resize+0x900/0x900 [ 362.488391][T16713] ? debug_smp_processor_id+0x20/0x20 [ 362.493741][T16713] bio_alloc_bioset+0x1db/0x640 [ 362.498565][T16713] ? bio_chain_endio+0x110/0x110 [ 362.503483][T16713] ? apic_timer_interrupt+0xa/0x20 [ 362.508566][T16713] submit_bh_wbc+0x1ba/0x790 [ 362.513135][T16713] ? asan.module_dtor+0x20/0x20 [ 362.517959][T16713] ? write_boundary_block+0x150/0x150 [ 362.523299][T16713] ll_rw_block+0x1cb/0x230 [ 362.527684][T16713] __breadahead_gfp+0xc9/0x190 [ 362.532417][T16713] ? apic_timer_interrupt+0xa/0x20 [ 362.537496][T16713] ? __breadahead+0x170/0x170 [ 362.542144][T16713] ? __ext4_get_inode_loc+0xb82/0x1030 [ 362.547574][T16713] __ext4_get_inode_loc+0xbf6/0x1030 [ 362.552835][T16713] ? ext4_get_inode_loc+0x60/0x60 [ 362.557868][T16713] ? _raw_spin_unlock+0x49/0x60 [ 362.562694][T16713] ? iget_locked+0x6b3/0x7b0 [ 362.567259][T16713] __ext4_iget+0x3d1/0x4a50 [ 362.571730][T16713] ? mutex_unlock+0x19/0x40 [ 362.576202][T16713] ? ext4_get_projid+0x140/0x140 [ 362.581110][T16713] ? ext4_fill_super+0xab45/0xeb30 [ 362.586227][T16713] ext4_fill_super+0xaafa/0xeb30 [ 362.591145][T16713] ? ext4_mount+0x40/0x40 [ 362.595480][T16713] ? idr_replace+0x1c4/0x230 [ 362.600039][T16713] ? snprintf+0xd6/0x120 [ 362.604248][T16713] ? vscnprintf+0x80/0x80 [ 362.608547][T16713] ? set_blocksize+0x1a5/0x3a0 [ 362.613285][T16713] mount_bdev+0x22d/0x340 [ 362.617598][T16713] ? ext4_mount+0x40/0x40 [ 362.621901][T16713] legacy_get_tree+0xde/0x170 [ 362.626547][T16713] ? ext4_lazyinit_thread+0xd40/0xd40 [ 362.631886][T16713] vfs_get_tree+0x83/0x260 [ 362.636272][T16713] do_mount+0x19d0/0x2670 [ 362.640569][T16713] ? copy_mount_string+0x30/0x30 [ 362.645472][T16713] ? copy_mount_options+0x1d8/0x300 [ 362.650635][T16713] ? copy_mount_options+0x210/0x300 [ 362.655814][T16713] ? __sanitizer_cov_trace_pc+0x23/0x50 [ 362.661324][T16713] ? copy_mount_options+0x273/0x300 [ 362.666487][T16713] ksys_mount+0xc2/0xf0 [ 362.670611][T16713] __x64_sys_mount+0xb1/0xc0 [ 362.675172][T16713] do_syscall_64+0xcb/0x1e0 [ 362.679644][T16713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 362.685513][T16713] RIP: 0033:0x7f1d6d50cc2a [ 362.689899][T16713] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 362.709470][T16713] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 362.717859][T16713] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 362.725797][T16713] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 362.733737][T16713] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 04:55:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:12 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x6}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 362.741677][T16713] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 362.749624][T16713] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 362.787037][T16713] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 362.815322][T16713] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/602/file0 (deleted) supports timestamps until 2038 (0x7fffffff) 04:55:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0xf401}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:12 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 82) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:12 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x10}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0xffff}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:12 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x44, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 363.098556][T16782] FAULT_INJECTION: forcing a failure. [ 363.098556][T16782] name failslab, interval 1, probability 0, space 0, times 0 [ 363.203039][T16803] FAT-fs (loop3): bogus number of FAT sectors [ 363.209179][T16803] FAT-fs (loop3): Can't find a valid FAT filesystem [ 363.264931][T16782] CPU: 1 PID: 16782 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 363.276556][T16782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.286592][T16782] Call Trace: [ 363.289868][T16782] dump_stack+0x1d8/0x24e [ 363.294184][T16782] ? devkmsg_release+0x11c/0x11c [ 363.299102][T16782] ? sched_clock+0x36/0x40 [ 363.303503][T16782] ? show_regs_print_info+0x12/0x12 [ 363.308678][T16782] ? ctx_sched_in+0x421/0x4f0 [ 363.313336][T16782] should_fail+0x6f6/0x860 [ 363.317731][T16782] ? setup_fault_attr+0x3d0/0x3d0 [ 363.322740][T16782] ? _raw_spin_lock+0xa3/0x1b0 [ 363.327483][T16782] ? debug_smp_processor_id+0x20/0x20 [ 363.332838][T16782] ? check_preemption_disabled+0x9e/0x330 [ 363.338538][T16782] ? mempool_alloc_slab+0x16/0x20 [ 363.343532][T16782] should_failslab+0x5/0x20 [ 363.348001][T16782] kmem_cache_alloc+0x36/0x290 [ 363.352765][T16782] ? mempool_free+0x380/0x380 [ 363.357406][T16782] mempool_alloc_slab+0x16/0x20 [ 363.362223][T16782] mempool_alloc+0x113/0x680 [ 363.366871][T16782] ? mempool_resize+0x900/0x900 [ 363.371691][T16782] ? apic_timer_interrupt+0xa/0x20 [ 363.376898][T16782] bio_alloc_bioset+0x1db/0x640 [ 363.381724][T16782] ? bio_chain_endio+0x110/0x110 [ 363.386728][T16782] ? write_boundary_block+0x150/0x150 [ 363.392090][T16782] submit_bh_wbc+0x1ba/0x790 [ 363.396661][T16782] ? write_boundary_block+0x150/0x150 [ 363.402009][T16782] ll_rw_block+0x1cb/0x230 [ 363.406437][T16782] __breadahead_gfp+0xc9/0x190 [ 363.411184][T16782] ? __breadahead+0x170/0x170 [ 363.415827][T16782] ? ext4_inode_table+0x36/0xf0 [ 363.420644][T16782] __ext4_get_inode_loc+0xbf6/0x1030 [ 363.425907][T16782] ? ext4_get_inode_loc+0x60/0x60 [ 363.430893][T16782] ? memset+0x1f/0x40 [ 363.435015][T16782] ? _raw_spin_unlock+0x49/0x60 [ 363.439831][T16782] ? iget_locked+0x6b3/0x7b0 [ 363.444389][T16782] __ext4_iget+0x3d1/0x4a50 [ 363.448868][T16782] ? mutex_unlock+0x19/0x40 [ 363.453337][T16782] ? ext4_get_projid+0x140/0x140 [ 363.458331][T16782] ? ext4_fill_super+0xab45/0xeb30 [ 363.463423][T16782] ext4_fill_super+0xaafa/0xeb30 [ 363.468330][T16782] ? ext4_mount+0x40/0x40 [ 363.472640][T16782] ? idr_replace+0x1c4/0x230 [ 363.477291][T16782] ? snprintf+0xd6/0x120 [ 363.481501][T16782] ? apic_timer_interrupt+0xa/0x20 [ 363.486576][T16782] ? pointer+0xae/0xb10 [ 363.490698][T16782] ? sb_set_blocksize+0xa6/0xe0 [ 363.495521][T16782] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 363.501040][T16782] mount_bdev+0x22d/0x340 [ 363.505340][T16782] ? ext4_mount+0x40/0x40 [ 363.509636][T16782] legacy_get_tree+0xde/0x170 [ 363.514280][T16782] ? ext4_lazyinit_thread+0xd40/0xd40 [ 363.519632][T16782] vfs_get_tree+0x83/0x260 [ 363.524026][T16782] do_mount+0x19d0/0x2670 [ 363.528328][T16782] ? copy_mount_string+0x30/0x30 [ 363.533231][T16782] ? apic_timer_interrupt+0xa/0x20 [ 363.538309][T16782] ? copy_mount_options+0x1cc/0x300 [ 363.543495][T16782] ? copy_mount_options+0x273/0x300 [ 363.548673][T16782] ksys_mount+0xc2/0xf0 [ 363.552798][T16782] __x64_sys_mount+0xb1/0xc0 [ 363.557360][T16782] do_syscall_64+0xcb/0x1e0 [ 363.561831][T16782] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 363.567691][T16782] RIP: 0033:0x7f1d6d50cc2a [ 363.572081][T16782] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 363.591672][T16782] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 363.600063][T16782] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 363.608011][T16782] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 04:55:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x48, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x29}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 363.615953][T16782] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 363.623895][T16782] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 363.631835][T16782] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 363.673025][T16782] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 363.697743][T16782] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/603/file0 (deleted) supports timestamps until 2038 (0x7fffffff) 04:55:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x1, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2b}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 83) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x44, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x58, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 363.966933][T16854] FAULT_INJECTION: forcing a failure. [ 363.966933][T16854] name failslab, interval 1, probability 0, space 0, times 0 [ 363.987762][T16854] CPU: 0 PID: 16854 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 363.999387][T16854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.009431][T16854] Call Trace: [ 364.012723][T16854] dump_stack+0x1d8/0x24e 04:55:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x1, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x60, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x48, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 364.017046][T16854] ? devkmsg_release+0x11c/0x11c [ 364.021984][T16854] ? show_regs_print_info+0x12/0x12 [ 364.027179][T16854] ? update_io_ticks+0x1c5/0x1e0 [ 364.032106][T16854] ? blk_account_io_start+0x436/0x4f0 [ 364.037645][T16854] should_fail+0x6f6/0x860 [ 364.042053][T16854] ? setup_fault_attr+0x3d0/0x3d0 [ 364.047069][T16854] ? __should_failslab+0x1/0x150 [ 364.051994][T16854] ? mempool_alloc_slab+0x16/0x20 [ 364.057011][T16854] should_failslab+0x5/0x20 [ 364.061524][T16854] kmem_cache_alloc+0x36/0x290 [ 364.066278][T16854] ? mempool_free+0x380/0x380 [ 364.070939][T16854] mempool_alloc_slab+0x16/0x20 [ 364.075775][T16854] mempool_alloc+0x113/0x680 [ 364.080356][T16854] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 364.085631][T16854] ? mempool_resize+0x900/0x900 [ 364.090473][T16854] ? debug_smp_processor_id+0x20/0x20 [ 364.095837][T16854] bio_alloc_bioset+0x1db/0x640 [ 364.100679][T16854] ? bio_chain_endio+0x110/0x110 [ 364.105614][T16854] ? write_boundary_block+0x150/0x150 [ 364.110976][T16854] submit_bh_wbc+0x1ba/0x790 [ 364.115559][T16854] ll_rw_block+0x1cb/0x230 [ 364.119962][T16854] __breadahead_gfp+0xc9/0x190 [ 364.124723][T16854] ? __getblk_gfp+0x654/0x750 [ 364.129389][T16854] ? __breadahead+0x170/0x170 [ 364.134066][T16854] __ext4_get_inode_loc+0xbf6/0x1030 [ 364.139345][T16854] ? ext4_get_inode_loc+0x60/0x60 [ 364.144361][T16854] ? _raw_spin_unlock+0x49/0x60 [ 364.149205][T16854] ? iget_locked+0x6b3/0x7b0 [ 364.153784][T16854] __ext4_iget+0x3d1/0x4a50 [ 364.158274][T16854] ? mutex_unlock+0x19/0x40 [ 364.162760][T16854] ? ext4_get_projid+0x140/0x140 [ 364.167684][T16854] ? ext4_fill_super+0xab45/0xeb30 [ 364.172783][T16854] ext4_fill_super+0xaafa/0xeb30 [ 364.177716][T16854] ? ext4_mount+0x40/0x40 [ 364.182036][T16854] ? idr_replace+0x1c4/0x230 [ 364.186613][T16854] ? snprintf+0xd6/0x120 [ 364.190846][T16854] ? vscnprintf+0x80/0x80 [ 364.195158][T16854] ? set_blocksize+0x1a5/0x3a0 [ 364.199897][T16854] mount_bdev+0x22d/0x340 [ 364.204201][T16854] ? ext4_mount+0x40/0x40 [ 364.208521][T16854] legacy_get_tree+0xde/0x170 [ 364.213183][T16854] ? ext4_lazyinit_thread+0xd40/0xd40 [ 364.218530][T16854] vfs_get_tree+0x83/0x260 [ 364.222919][T16854] do_mount+0x19d0/0x2670 [ 364.227220][T16854] ? copy_mount_string+0x30/0x30 [ 364.232130][T16854] ? copy_mount_options+0x1d8/0x300 [ 364.237297][T16854] ? copy_mount_options+0x210/0x300 [ 364.242466][T16854] ? __sanitizer_cov_trace_pc+0x28/0x50 [ 364.247982][T16854] ? copy_mount_options+0x273/0x300 [ 364.253145][T16854] ksys_mount+0xc2/0xf0 [ 364.257274][T16854] __x64_sys_mount+0xb1/0xc0 [ 364.261832][T16854] do_syscall_64+0xcb/0x1e0 [ 364.266306][T16854] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 364.272166][T16854] RIP: 0033:0x7f1d6d50cc2a [ 364.276558][T16854] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 364.296145][T16854] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 364.304523][T16854] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 364.312466][T16854] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 364.320408][T16854] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 364.328367][T16854] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 364.336312][T16854] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 364.372007][T16854] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 364.383740][T16854] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/604/file0 (deleted) supports timestamps until 2038 (0x7fffffff) [ 364.430939][T16908] FAT-fs (loop3): bogus number of FAT sectors [ 364.437077][T16908] FAT-fs (loop3): Can't find a valid FAT filesystem 04:55:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x64, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2c}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:14 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 84) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x1, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2f}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x58, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:14 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x68, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 364.846926][T16923] FAULT_INJECTION: forcing a failure. [ 364.846926][T16923] name failslab, interval 1, probability 0, space 0, times 0 [ 364.878790][T16923] CPU: 0 PID: 16923 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:55:14 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3c}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 364.890417][T16923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.900457][T16923] Call Trace: [ 364.903745][T16923] dump_stack+0x1d8/0x24e [ 364.908246][T16923] ? devkmsg_release+0x11c/0x11c [ 364.913176][T16923] ? show_regs_print_info+0x12/0x12 [ 364.918370][T16923] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 364.923647][T16923] should_fail+0x6f6/0x860 [ 364.928064][T16923] ? setup_fault_attr+0x3d0/0x3d0 [ 364.933090][T16923] ? mempool_alloc_slab+0x16/0x20 [ 364.938105][T16923] should_failslab+0x5/0x20 [ 364.942600][T16923] kmem_cache_alloc+0x36/0x290 04:55:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x60, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 364.947355][T16923] ? generic_make_request+0xcf5/0xda0 [ 364.952719][T16923] ? mempool_free+0x380/0x380 [ 364.957387][T16923] mempool_alloc_slab+0x16/0x20 [ 364.962228][T16923] mempool_alloc+0x113/0x680 [ 364.966808][T16923] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 364.972782][T16923] ? __sanitizer_cov_trace_pc+0x28/0x50 [ 364.978322][T16923] ? mempool_resize+0x900/0x900 [ 364.983164][T16923] bio_alloc_bioset+0x1db/0x640 [ 364.988011][T16923] ? bio_chain_endio+0x110/0x110 [ 364.992940][T16923] ? ll_rw_block+0x211/0x230 [ 364.997521][T16923] submit_bh_wbc+0x1ba/0x790 [ 365.002100][T16923] submit_bh+0x21/0x30 [ 365.006162][T16923] __ext4_get_inode_loc+0xc66/0x1030 [ 365.011441][T16923] ? ext4_get_inode_loc+0x60/0x60 [ 365.016455][T16923] ? memset+0x1f/0x40 [ 365.020428][T16923] ? _raw_spin_unlock+0x49/0x60 [ 365.025266][T16923] ? iget_locked+0x6b3/0x7b0 [ 365.029845][T16923] __ext4_iget+0x3d1/0x4a50 [ 365.034349][T16923] ? mutex_unlock+0x19/0x40 [ 365.038848][T16923] ? ext4_get_projid+0x140/0x140 [ 365.043778][T16923] ? ext4_fill_super+0xab45/0xeb30 [ 365.048882][T16923] ext4_fill_super+0xaafa/0xeb30 [ 365.053818][T16923] ? ext4_mount+0x40/0x40 [ 365.058136][T16923] ? idr_replace+0x1c4/0x230 [ 365.062717][T16923] ? snprintf+0xd6/0x120 [ 365.066943][T16923] ? down_write+0xd8/0x150 [ 365.071341][T16923] ? vscnprintf+0x80/0x80 [ 365.075641][T16923] ? set_blocksize+0x1a5/0x3a0 [ 365.080374][T16923] mount_bdev+0x22d/0x340 [ 365.084684][T16923] ? ext4_mount+0x40/0x40 [ 365.089092][T16923] legacy_get_tree+0xde/0x170 [ 365.093882][T16923] ? ext4_lazyinit_thread+0xd40/0xd40 [ 365.099223][T16923] vfs_get_tree+0x83/0x260 [ 365.103611][T16923] do_mount+0x19d0/0x2670 [ 365.107908][T16923] ? copy_mount_string+0x30/0x30 [ 365.112815][T16923] ? copy_mount_options+0x1d8/0x300 [ 365.117987][T16923] ? copy_mount_options+0x210/0x300 [ 365.123160][T16923] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 365.129367][T16923] ? copy_mount_options+0x273/0x300 [ 365.134573][T16923] ksys_mount+0xc2/0xf0 [ 365.138784][T16923] __x64_sys_mount+0xb1/0xc0 [ 365.143342][T16923] do_syscall_64+0xcb/0x1e0 [ 365.147816][T16923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 365.153675][T16923] RIP: 0033:0x7f1d6d50cc2a [ 365.158071][T16923] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 365.177650][T16923] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 365.186050][T16923] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 365.193992][T16923] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 365.201940][T16923] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 365.209906][T16923] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 365.217859][T16923] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 365.484943][T16923] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 365.494313][T16923] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/605/file0 (deleted) supports timestamps until 2038 (0x7fffffff) 04:55:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x64, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x44}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 85) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x68, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x58}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x1, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x74, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 365.748832][T17003] FAULT_INJECTION: forcing a failure. [ 365.748832][T17003] name failslab, interval 1, probability 0, space 0, times 0 [ 365.775015][T17003] CPU: 0 PID: 17003 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 365.786639][T17003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 04:55:15 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe0}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6c, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 365.796680][T17003] Call Trace: [ 365.799961][T17003] dump_stack+0x1d8/0x24e [ 365.804283][T17003] ? devkmsg_release+0x11c/0x11c [ 365.809213][T17003] ? show_regs_print_info+0x12/0x12 [ 365.814403][T17003] ? check_preemption_disabled+0x9e/0x330 [ 365.820110][T17003] ? __rcu_read_lock+0x50/0x50 [ 365.824863][T17003] ? __unwind_start+0x72f/0x8e0 [ 365.829703][T17003] ? debug_smp_processor_id+0x20/0x20 [ 365.835063][T17003] should_fail+0x6f6/0x860 [ 365.839469][T17003] ? setup_fault_attr+0x3d0/0x3d0 [ 365.844479][T17003] ? stack_trace_save+0x1f0/0x1f0 [ 365.849492][T17003] ? __kernel_text_address+0x93/0x100 [ 365.854852][T17003] ? unwind_get_return_address+0x48/0x80 [ 365.860477][T17003] ? mempool_alloc_slab+0x16/0x20 [ 365.865493][T17003] should_failslab+0x5/0x20 [ 365.869983][T17003] kmem_cache_alloc+0x36/0x290 [ 365.874735][T17003] ? mempool_free+0x380/0x380 [ 365.879402][T17003] mempool_alloc_slab+0x16/0x20 [ 365.884241][T17003] mempool_alloc+0x113/0x680 [ 365.888821][T17003] ? __crc32c_le_base+0x15c/0xa80 [ 365.893832][T17003] ? mempool_resize+0x900/0x900 [ 365.898667][T17003] ? chksum_update+0x41/0x90 [ 365.903246][T17003] ? crypto_shash_update+0x1ed/0x2b0 [ 365.908519][T17003] ? kmem_cache_alloc+0x115/0x290 [ 365.913526][T17003] ? __d_alloc+0x2a/0x6a0 [ 365.917843][T17003] ? check_preemption_disabled+0x9e/0x330 [ 365.923547][T17003] bio_alloc_bioset+0x1db/0x640 [ 365.928381][T17003] ? debug_smp_processor_id+0x20/0x20 [ 365.933745][T17003] ? bio_chain_endio+0x110/0x110 [ 365.938671][T17003] ? __xa_set_mark+0x499/0x580 [ 365.943427][T17003] ? apic_timer_interrupt+0xa/0x20 [ 365.948607][T17003] submit_bh_wbc+0x1ba/0x790 [ 365.953171][T17003] ? __sync_dirty_buffer+0xe8/0x2d0 [ 365.958343][T17003] ? check_memory_region+0x85/0x2e0 [ 365.963517][T17003] __sync_dirty_buffer+0x1d2/0x2d0 [ 365.968598][T17003] ext4_commit_super+0x860/0xa40 [ 365.973504][T17003] ext4_setup_super+0x544/0x950 [ 365.978324][T17003] ext4_fill_super+0xac84/0xeb30 [ 365.983250][T17003] ? ext4_mount+0x40/0x40 [ 365.987557][T17003] ? idr_replace+0x1c4/0x230 [ 365.992129][T17003] ? snprintf+0xd6/0x120 [ 365.996382][T17003] ? vscnprintf+0x80/0x80 [ 366.000680][T17003] ? set_blocksize+0x1a5/0x3a0 [ 366.005414][T17003] mount_bdev+0x22d/0x340 [ 366.009711][T17003] ? ext4_mount+0x40/0x40 [ 366.014007][T17003] legacy_get_tree+0xde/0x170 [ 366.018661][T17003] ? ext4_lazyinit_thread+0xd40/0xd40 [ 366.024017][T17003] vfs_get_tree+0x83/0x260 [ 366.028414][T17003] do_mount+0x19d0/0x2670 [ 366.032712][T17003] ? copy_mount_string+0x30/0x30 [ 366.037615][T17003] ? copy_mount_options+0x1d8/0x300 [ 366.042872][T17003] ? copy_mount_options+0x210/0x300 [ 366.048036][T17003] ? __sanitizer_cov_trace_pc+0x28/0x50 [ 366.053560][T17003] ? copy_mount_options+0x273/0x300 [ 366.058828][T17003] ksys_mount+0xc2/0xf0 [ 366.062963][T17003] __x64_sys_mount+0xb1/0xc0 [ 366.067525][T17003] do_syscall_64+0xcb/0x1e0 [ 366.071999][T17003] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 366.077866][T17003] RIP: 0033:0x7f1d6d50cc2a [ 366.082250][T17003] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 366.101824][T17003] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 366.110208][T17003] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 366.118153][T17003] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 366.126096][T17003] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 366.134039][T17003] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 366.142012][T17003] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 366.264454][T17056] tmpfs: Unknown parameter '' [ 366.307236][T17003] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 366.321732][T17003] ext4 filesystem being mounted at /root/syzkaller-testdir183562456/syzkaller.FrsSXb/606/file0 supports timestamps until 2038 (0x7fffffff) 04:55:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x7a, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x300}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x74, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 86) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x600}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x7a, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 366.687429][T17079] FAULT_INJECTION: forcing a failure. [ 366.687429][T17079] name failslab, interval 1, probability 0, space 0, times 0 [ 366.710802][T17079] CPU: 1 PID: 17079 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 366.722428][T17079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.732501][T17079] Call Trace: 04:55:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1f4, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 366.735787][T17079] dump_stack+0x1d8/0x24e [ 366.740108][T17079] ? devkmsg_release+0x11c/0x11c [ 366.745038][T17079] ? show_regs_print_info+0x12/0x12 [ 366.750233][T17079] ? io_schedule+0x86/0xf0 [ 366.754642][T17079] should_fail+0x6f6/0x860 [ 366.759048][T17079] ? setup_fault_attr+0x3d0/0x3d0 [ 366.764063][T17079] ? out_of_line_wait_on_bit+0x1c3/0x240 [ 366.769687][T17079] ? bit_wait+0xa0/0xa0 [ 366.773829][T17079] ? ext4_setup_system_zone+0x137/0xec0 [ 366.779344][T17079] should_failslab+0x5/0x20 [ 366.783872][T17079] kmem_cache_alloc_trace+0x39/0x2b0 [ 366.789180][T17079] ? bit_waitqueue+0x30/0x30 [ 366.793747][T17079] ext4_setup_system_zone+0x137/0xec0 [ 366.799093][T17079] ? __sync_dirty_buffer+0x296/0x2d0 [ 366.804346][T17079] ? ext4_commit_super+0x8a4/0xa40 [ 366.809425][T17079] ? ext4_exit_system_zone+0x20/0x20 [ 366.814727][T17079] ? __cleancache_init_fs+0x66/0xb0 [ 366.819898][T17079] ? ext4_setup_super+0x597/0x950 [ 366.824903][T17079] ext4_fill_super+0xbd8c/0xeb30 [ 366.829820][T17079] ? ext4_mount+0x40/0x40 [ 366.835074][T17079] ? idr_replace+0x1c4/0x230 [ 366.839637][T17079] ? snprintf+0xd6/0x120 [ 366.843852][T17079] ? apic_timer_interrupt+0xa/0x20 [ 366.848940][T17079] ? pointer+0xae/0xb10 [ 366.853074][T17079] ? sb_set_blocksize+0x97/0xe0 [ 366.857893][T17079] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 366.863412][T17079] mount_bdev+0x22d/0x340 [ 366.867712][T17079] ? ext4_mount+0x40/0x40 [ 366.872011][T17079] legacy_get_tree+0xde/0x170 [ 366.876656][T17079] ? ext4_lazyinit_thread+0xd40/0xd40 [ 366.881996][T17079] vfs_get_tree+0x83/0x260 [ 366.886406][T17079] do_mount+0x19d0/0x2670 [ 366.890721][T17079] ? copy_mount_string+0x30/0x30 [ 366.895644][T17079] ? retint_kernel+0x1b/0x1b [ 366.900205][T17079] ? copy_mount_options+0x1c6/0x300 [ 366.905373][T17079] ? copy_mount_options+0x273/0x300 [ 366.910540][T17079] ksys_mount+0xc2/0xf0 [ 366.914668][T17079] __x64_sys_mount+0xb1/0xc0 [ 366.919246][T17079] do_syscall_64+0xcb/0x1e0 [ 366.923723][T17079] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 366.929586][T17079] RIP: 0033:0x7f1d6d50cc2a [ 366.933989][T17079] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 366.953567][T17079] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 366.961952][T17079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 366.969913][T17079] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 366.977854][T17079] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 366.985794][T17079] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 366.993741][T17079] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 367.012380][T17079] EXT4-fs (loop0): failed to initialize system zone (-12) [ 367.020191][T17079] EXT4-fs (loop0): mount failed 04:55:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe0, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2900}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 87) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x10, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x300, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, 0x0) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1f4, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3e8, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2b00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x29, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 367.624341][T17145] FAULT_INJECTION: forcing a failure. [ 367.624341][T17145] name failslab, interval 1, probability 0, space 0, times 0 [ 367.646524][T17145] CPU: 1 PID: 17145 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 367.658148][T17145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.668193][T17145] Call Trace: [ 367.671485][T17145] dump_stack+0x1d8/0x24e [ 367.675811][T17145] ? devkmsg_release+0x11c/0x11c [ 367.680747][T17145] ? show_regs_print_info+0x12/0x12 [ 367.685935][T17145] ? io_schedule+0x86/0xf0 [ 367.690332][T17145] should_fail+0x6f6/0x860 [ 367.694738][T17145] ? setup_fault_attr+0x3d0/0x3d0 [ 367.699756][T17145] ? out_of_line_wait_on_bit+0x1c3/0x240 [ 367.705375][T17145] ? bit_wait+0xa0/0xa0 [ 367.709514][T17145] ? ext4_setup_system_zone+0x137/0xec0 [ 367.715030][T17145] should_failslab+0x5/0x20 [ 367.719503][T17145] kmem_cache_alloc_trace+0x39/0x2b0 [ 367.724786][T17145] ? bit_waitqueue+0x30/0x30 [ 367.729347][T17145] ext4_setup_system_zone+0x137/0xec0 [ 367.734690][T17145] ? __sync_dirty_buffer+0x296/0x2d0 [ 367.739956][T17145] ? ext4_commit_super+0x8a4/0xa40 [ 367.745048][T17145] ? ext4_exit_system_zone+0x20/0x20 [ 367.750305][T17145] ? __cleancache_init_fs+0x66/0xb0 [ 367.755473][T17145] ? ext4_setup_super+0x597/0x950 [ 367.760476][T17145] ext4_fill_super+0xbd8c/0xeb30 [ 367.765407][T17145] ? ext4_mount+0x40/0x40 [ 367.769722][T17145] ? idr_replace+0x1c4/0x230 [ 367.774306][T17145] ? apic_timer_interrupt+0xa/0x20 [ 367.779393][T17145] ? set_blocksize+0x99/0x3a0 [ 367.784049][T17145] ? set_blocksize+0xea/0x3a0 [ 367.788694][T17145] ? set_blocksize+0x1a5/0x3a0 [ 367.793447][T17145] mount_bdev+0x22d/0x340 [ 367.797764][T17145] ? ext4_mount+0x40/0x40 [ 367.802110][T17145] legacy_get_tree+0xde/0x170 [ 367.806764][T17145] ? ext4_lazyinit_thread+0xd40/0xd40 [ 367.812109][T17145] vfs_get_tree+0x83/0x260 [ 367.816495][T17145] do_mount+0x19d0/0x2670 [ 367.820793][T17145] ? copy_mount_string+0x30/0x30 [ 367.825705][T17145] ? copy_mount_options+0x1d8/0x300 [ 367.830876][T17145] ? copy_mount_options+0x210/0x300 [ 367.836046][T17145] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 367.842255][T17145] ? copy_mount_options+0x273/0x300 [ 367.847424][T17145] ksys_mount+0xc2/0xf0 [ 367.851550][T17145] __x64_sys_mount+0xb1/0xc0 [ 367.856112][T17145] do_syscall_64+0xcb/0x1e0 [ 367.860585][T17145] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 367.866446][T17145] RIP: 0033:0x7f1d6d50cc2a [ 367.870832][T17145] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 367.890493][T17145] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 367.898883][T17145] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 367.906835][T17145] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 367.914777][T17145] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 04:55:17 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2c00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:17 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2b, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:17 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x500, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 367.922718][T17145] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 367.930659][T17145] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 04:55:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x300, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 367.968404][T17145] EXT4-fs (loop0): failed to initialize system zone (-12) [ 368.250169][T17145] EXT4-fs (loop0): mount failed 04:55:17 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2f00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:17 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2c, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3e8, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x600, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, 0x0) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2f, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 88) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3c00}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x500, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x700, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x600, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x3c, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 368.912644][T17244] FAULT_INJECTION: forcing a failure. [ 368.912644][T17244] name failslab, interval 1, probability 0, space 0, times 0 [ 368.926168][T17244] CPU: 1 PID: 17244 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 368.937782][T17244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.947823][T17244] Call Trace: [ 368.951109][T17244] dump_stack+0x1d8/0x24e [ 368.955431][T17244] ? devkmsg_release+0x11c/0x11c [ 368.960358][T17244] ? show_regs_print_info+0x12/0x12 [ 368.965548][T17244] should_fail+0x6f6/0x860 [ 368.969950][T17244] ? setup_fault_attr+0x3d0/0x3d0 [ 368.974957][T17244] ? add_system_zone+0x128/0x4f0 [ 368.979873][T17244] should_failslab+0x5/0x20 [ 368.984346][T17244] kmem_cache_alloc+0x36/0x290 [ 368.989080][T17244] add_system_zone+0x128/0x4f0 [ 368.993813][T17244] ? ext4_get_group_desc+0x253/0x2a0 [ 368.999117][T17244] ext4_setup_system_zone+0x30c/0xec0 [ 369.004477][T17244] ? ext4_commit_super+0x8a4/0xa40 [ 369.009571][T17244] ? ext4_exit_system_zone+0x20/0x20 [ 369.014825][T17244] ? __cleancache_init_fs+0x66/0xb0 [ 369.019993][T17244] ? ext4_setup_super+0x597/0x950 [ 369.024994][T17244] ext4_fill_super+0xbd8c/0xeb30 [ 369.029914][T17244] ? ext4_mount+0x40/0x40 [ 369.034214][T17244] ? idr_replace+0x1c4/0x230 [ 369.038777][T17244] ? snprintf+0xd6/0x120 [ 369.042998][T17244] ? vscnprintf+0x80/0x80 [ 369.047307][T17244] ? set_blocksize+0x1a5/0x3a0 [ 369.052042][T17244] mount_bdev+0x22d/0x340 [ 369.056349][T17244] ? ext4_mount+0x40/0x40 [ 369.060655][T17244] legacy_get_tree+0xde/0x170 [ 369.065309][T17244] ? ext4_lazyinit_thread+0xd40/0xd40 [ 369.070650][T17244] vfs_get_tree+0x83/0x260 [ 369.075037][T17244] do_mount+0x19d0/0x2670 [ 369.079396][T17244] ? copy_mount_string+0x30/0x30 [ 369.084303][T17244] ? apic_timer_interrupt+0xa/0x20 [ 369.089393][T17244] ? copy_mount_options+0x1c0/0x300 [ 369.094566][T17244] ? copy_mount_options+0x273/0x300 [ 369.099733][T17244] ksys_mount+0xc2/0xf0 [ 369.103861][T17244] __x64_sys_mount+0xb1/0xc0 [ 369.108459][T17244] do_syscall_64+0xcb/0x1e0 [ 369.112933][T17244] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 369.118793][T17244] RIP: 0033:0x7f1d6d50cc2a [ 369.123181][T17244] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 369.142767][T17244] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 369.151146][T17244] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a 04:55:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x700, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:18 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 369.159091][T17244] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 369.167041][T17244] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 369.174981][T17244] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 369.182939][T17244] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 369.197399][T17244] EXT4-fs (loop0): failed to initialize system zone (-12) [ 369.207316][T17244] EXT4-fs (loop0): mount failed 04:55:18 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4400}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, 0x0) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 89) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x5800}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xa00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x900, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xb00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xa00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xb00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 370.235635][T17319] FAULT_INJECTION: forcing a failure. [ 370.235635][T17319] name failslab, interval 1, probability 0, space 0, times 0 [ 370.257541][T17319] CPU: 0 PID: 17319 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 370.269169][T17319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.279296][T17319] Call Trace: [ 370.282665][T17319] dump_stack+0x1d8/0x24e [ 370.286979][T17319] ? devkmsg_release+0x11c/0x11c [ 370.291900][T17319] ? show_regs_print_info+0x12/0x12 [ 370.297083][T17319] should_fail+0x6f6/0x860 [ 370.301487][T17319] ? setup_fault_attr+0x3d0/0x3d0 [ 370.306497][T17319] ? add_system_zone+0x128/0x4f0 [ 370.311507][T17319] should_failslab+0x5/0x20 [ 370.315990][T17319] kmem_cache_alloc+0x36/0x290 [ 370.320745][T17319] add_system_zone+0x128/0x4f0 [ 370.325493][T17319] ? ext4_get_group_desc+0x253/0x2a0 [ 370.330758][T17319] ext4_setup_system_zone+0x363/0xec0 [ 370.336118][T17319] ? ext4_commit_super+0x8a4/0xa40 [ 370.341215][T17319] ? ext4_exit_system_zone+0x20/0x20 [ 370.346481][T17319] ? __cleancache_init_fs+0x66/0xb0 [ 370.351666][T17319] ? ext4_setup_super+0x597/0x950 [ 370.356673][T17319] ext4_fill_super+0xbd8c/0xeb30 [ 370.361609][T17319] ? ext4_mount+0x40/0x40 [ 370.365921][T17319] ? idr_replace+0x1c4/0x230 [ 370.370494][T17319] ? snprintf+0xd6/0x120 [ 370.374727][T17319] ? apic_timer_interrupt+0xa/0x20 [ 370.379828][T17319] ? pointer+0xae/0xb10 [ 370.383975][T17319] ? sb_set_blocksize+0x97/0xe0 [ 370.388822][T17319] ? sb_set_blocksize+0x90/0xe0 [ 370.393663][T17319] mount_bdev+0x22d/0x340 [ 370.397982][T17319] ? ext4_mount+0x40/0x40 [ 370.402302][T17319] legacy_get_tree+0xde/0x170 [ 370.406975][T17319] ? ext4_lazyinit_thread+0xd40/0xd40 [ 370.406990][T17319] vfs_get_tree+0x83/0x260 [ 370.416741][T17319] do_mount+0x19d0/0x2670 [ 370.421060][T17319] ? copy_mount_string+0x30/0x30 [ 370.425995][T17319] ? copy_mount_options+0x1d8/0x300 [ 370.431191][T17319] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x90 [ 370.437420][T17319] ? copy_mount_options+0x273/0x300 [ 370.442616][T17319] ksys_mount+0xc2/0xf0 [ 370.446769][T17319] __x64_sys_mount+0xb1/0xc0 [ 370.451354][T17319] do_syscall_64+0xcb/0x1e0 [ 370.455846][T17319] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 370.461720][T17319] RIP: 0033:0x7f1d6d50cc2a [ 370.466107][T17319] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 370.485679][T17319] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 370.494059][T17319] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 370.502007][T17319] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 370.509958][T17319] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 370.517902][T17319] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 370.525842][T17319] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 370.552684][T17319] EXT4-fs (loop0): failed to initialize system zone (-12) [ 370.561323][T17319] EXT4-fs (loop0): mount failed 04:55:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x1000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xc00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xc00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x7, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 90) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xd00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xd00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x804}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 371.175743][T17400] FAULT_INJECTION: forcing a failure. [ 371.175743][T17400] name failslab, interval 1, probability 0, space 0, times 0 [ 371.194466][T17400] CPU: 1 PID: 17400 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 371.206084][T17400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.216121][T17400] Call Trace: [ 371.219400][T17400] dump_stack+0x1d8/0x24e [ 371.223722][T17400] ? devkmsg_release+0x11c/0x11c [ 371.228652][T17400] ? show_regs_print_info+0x12/0x12 [ 371.233841][T17400] should_fail+0x6f6/0x860 [ 371.238245][T17400] ? setup_fault_attr+0x3d0/0x3d0 [ 371.243245][T17400] ? apic_timer_interrupt+0xa/0x20 [ 371.248332][T17400] ? add_system_zone+0x128/0x4f0 [ 371.253242][T17400] should_failslab+0x5/0x20 [ 371.257716][T17400] kmem_cache_alloc+0x36/0x290 [ 371.262447][T17400] ? rb_next+0xa9/0xf0 [ 371.266486][T17400] add_system_zone+0x128/0x4f0 [ 371.271221][T17400] ? ext4_get_group_desc+0x253/0x2a0 [ 371.276476][T17400] ext4_setup_system_zone+0x363/0xec0 [ 371.281822][T17400] ? ext4_commit_super+0x8a4/0xa40 [ 371.286901][T17400] ? ext4_exit_system_zone+0x20/0x20 [ 371.292153][T17400] ? __cleancache_init_fs+0x66/0xb0 [ 371.297317][T17400] ? ext4_setup_super+0x597/0x950 [ 371.302309][T17400] ext4_fill_super+0xbd8c/0xeb30 [ 371.307218][T17400] ? ext4_mount+0x40/0x40 [ 371.311520][T17400] ? idr_replace+0x1c4/0x230 [ 371.316076][T17400] ? snprintf+0xd6/0x120 [ 371.320284][T17400] ? apic_timer_interrupt+0xa/0x20 [ 371.325364][T17400] ? pointer+0xae/0xb10 [ 371.329505][T17400] ? sb_set_blocksize+0x1d/0xe0 [ 371.334331][T17400] ? set_blocksize+0x1a5/0x3a0 [ 371.339070][T17400] mount_bdev+0x22d/0x340 [ 371.343372][T17400] ? ext4_mount+0x40/0x40 [ 371.347670][T17400] legacy_get_tree+0xde/0x170 [ 371.352313][T17400] ? ext4_lazyinit_thread+0xd40/0xd40 [ 371.357653][T17400] vfs_get_tree+0x83/0x260 [ 371.362036][T17400] do_mount+0x19d0/0x2670 [ 371.366333][T17400] ? copy_mount_string+0x30/0x30 [ 371.371238][T17400] ? copy_mount_options+0x1d8/0x300 [ 371.376404][T17400] ? copy_mount_options+0x210/0x300 [ 371.381576][T17400] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 371.387793][T17400] ? copy_mount_options+0x273/0x300 [ 371.392958][T17400] ksys_mount+0xc2/0xf0 [ 371.397093][T17400] __x64_sys_mount+0xb1/0xc0 [ 371.401657][T17400] do_syscall_64+0xcb/0x1e0 [ 371.406177][T17400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 371.412040][T17400] RIP: 0033:0x7f1d6d50cc2a [ 371.416425][T17400] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 371.435997][T17400] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 371.444378][T17400] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 371.452331][T17400] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 371.460269][T17400] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 371.468214][T17400] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 04:55:20 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x810}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 371.476154][T17400] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 371.486590][T17400] EXT4-fs (loop0): failed to initialize system zone (-12) [ 371.495859][T17400] EXT4-fs (loop0): mount failed [ 371.658739][T17442] tmpfs: Unknown parameter '' 04:55:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x4000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 91) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1100, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x821}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x6000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1100, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x841}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1200, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 372.111928][T17473] FAULT_INJECTION: forcing a failure. [ 372.111928][T17473] name failslab, interval 1, probability 0, space 0, times 0 [ 372.142493][T17473] CPU: 0 PID: 17473 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 372.154120][T17473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.164334][T17473] Call Trace: [ 372.167628][T17473] dump_stack+0x1d8/0x24e [ 372.171953][T17473] ? devkmsg_release+0x11c/0x11c [ 372.176889][T17473] ? show_regs_print_info+0x12/0x12 [ 372.182074][T17473] ? add_system_zone+0x128/0x4f0 [ 372.187011][T17473] should_fail+0x6f6/0x860 [ 372.191421][T17473] ? setup_fault_attr+0x3d0/0x3d0 [ 372.196436][T17473] ? ext4_setup_system_zone+0x5d6/0xec0 [ 372.201975][T17473] ? ext4_mb_init+0x80/0x1330 [ 372.206641][T17473] should_failslab+0x5/0x20 04:55:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x10000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 372.211155][T17473] __kmalloc+0x5f/0x2f0 [ 372.211173][T17473] ext4_mb_init+0x80/0x1330 [ 372.217754][T17499] tmpfs: Unknown parameter '' [ 372.219796][T17473] ? ext4_fill_super+0xbe82/0xeb30 [ 372.229533][T17473] ext4_fill_super+0xbe97/0xeb30 [ 372.234475][T17473] ? __perf_event_task_sched_in+0x55c/0x5e0 [ 372.240365][T17473] ? ext4_mount+0x40/0x40 [ 372.244688][T17473] ? preempt_schedule_irq+0xef/0x140 [ 372.249965][T17473] ? preempt_schedule_notrace+0x190/0x190 [ 372.255684][T17473] ? snprintf+0xd6/0x120 04:55:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 372.259916][T17473] ? pointer+0xae/0xb10 [ 372.264084][T17473] ? sb_set_blocksize+0x50/0xe0 [ 372.268925][T17473] mount_bdev+0x22d/0x340 [ 372.273246][T17473] ? ext4_mount+0x40/0x40 [ 372.277566][T17473] legacy_get_tree+0xde/0x170 [ 372.282234][T17473] ? ext4_lazyinit_thread+0xd40/0xd40 [ 372.287594][T17473] vfs_get_tree+0x83/0x260 [ 372.292004][T17473] do_mount+0x19d0/0x2670 [ 372.296321][T17473] ? copy_mount_string+0x30/0x30 [ 372.301248][T17473] ? copy_mount_options+0x1d8/0x300 [ 372.306433][T17473] ? copy_mount_options+0x210/0x300 [ 372.311623][T17473] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 372.317153][T17473] ? copy_mount_options+0x273/0x300 [ 372.322339][T17473] ksys_mount+0xc2/0xf0 [ 372.326481][T17473] __x64_sys_mount+0xb1/0xc0 [ 372.331057][T17473] do_syscall_64+0xcb/0x1e0 [ 372.335548][T17473] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 372.341423][T17473] RIP: 0033:0x7f1d6d50cc2a [ 372.345822][T17473] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 372.365413][T17473] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 372.373815][T17473] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 372.381777][T17473] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 372.389737][T17473] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 372.397709][T17473] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 04:55:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x29000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2500, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 372.405668][T17473] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 372.416069][T17473] EXT4-fs (loop0): failed to initialize mballoc (-12) [ 372.423101][T17473] EXT4-fs (loop0): mount failed 04:55:21 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 92) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1200, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2900, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2b000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x1, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2c000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 372.809390][T17576] tmpfs: Unknown parameter '' [ 372.942291][T17548] FAULT_INJECTION: forcing a failure. [ 372.942291][T17548] name failslab, interval 1, probability 0, space 0, times 0 [ 372.960946][T17548] CPU: 1 PID: 17548 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 372.972569][T17548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.982612][T17548] Call Trace: [ 372.985890][T17548] dump_stack+0x1d8/0x24e [ 372.990205][T17548] ? devkmsg_release+0x11c/0x11c [ 372.995113][T17548] ? show_regs_print_info+0x12/0x12 [ 373.000297][T17548] ? add_system_zone+0x128/0x4f0 [ 373.005214][T17548] should_fail+0x6f6/0x860 [ 373.009626][T17548] ? setup_fault_attr+0x3d0/0x3d0 [ 373.014664][T17548] ? ext4_setup_system_zone+0x5d6/0xec0 [ 373.020195][T17548] ? ext4_mb_init+0x80/0x1330 [ 373.024843][T17548] should_failslab+0x5/0x20 [ 373.029334][T17548] __kmalloc+0x5f/0x2f0 [ 373.033465][T17548] ? ext4_commit_super+0x8a4/0xa40 [ 373.038561][T17548] ext4_mb_init+0x80/0x1330 [ 373.043122][T17548] ? __cleancache_init_fs+0x66/0xb0 [ 373.048300][T17548] ext4_fill_super+0xbe97/0xeb30 [ 373.053223][T17548] ? ext4_mount+0x40/0x40 [ 373.057530][T17548] ? idr_replace+0x1c4/0x230 [ 373.062096][T17548] ? snprintf+0xd6/0x120 [ 373.066310][T17548] ? set_blocksize+0x1a5/0x3a0 [ 373.071047][T17548] mount_bdev+0x22d/0x340 [ 373.075347][T17548] ? ext4_mount+0x40/0x40 [ 373.079647][T17548] legacy_get_tree+0xde/0x170 [ 373.084296][T17548] ? ext4_lazyinit_thread+0xd40/0xd40 [ 373.089640][T17548] vfs_get_tree+0x83/0x260 [ 373.094025][T17548] do_mount+0x19d0/0x2670 [ 373.098323][T17548] ? copy_mount_string+0x30/0x30 [ 373.103236][T17548] ? copy_mount_options+0x1d8/0x300 [ 373.108460][T17548] ? copy_mount_options+0x210/0x300 [ 373.113641][T17548] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 373.119156][T17548] ? copy_mount_options+0x273/0x300 [ 373.124320][T17548] ksys_mount+0xc2/0xf0 [ 373.128460][T17548] __x64_sys_mount+0xb1/0xc0 [ 373.133077][T17548] do_syscall_64+0xcb/0x1e0 [ 373.137562][T17548] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 373.143434][T17548] RIP: 0033:0x7f1d6d50cc2a [ 373.147824][T17548] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 373.167513][T17548] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 373.175901][T17548] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 373.183844][T17548] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 373.191788][T17548] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 373.199739][T17548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 373.207685][T17548] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 373.220024][T17548] EXT4-fs (loop0): failed to initialize mballoc (-12) [ 373.227838][T17548] EXT4-fs (loop0): mount failed 04:55:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2500, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x2f000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 93) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x3c000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x1, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2900, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:22 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x40000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 373.555421][T17605] FAULT_INJECTION: forcing a failure. [ 373.555421][T17605] name failslab, interval 1, probability 0, space 0, times 0 [ 373.598198][T17605] CPU: 0 PID: 17605 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 373.609928][T17605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.619975][T17605] Call Trace: [ 373.623261][T17605] dump_stack+0x1d8/0x24e [ 373.627575][T17605] ? devkmsg_release+0x11c/0x11c [ 373.632491][T17605] ? show_regs_print_info+0x12/0x12 [ 373.637678][T17605] should_fail+0x6f6/0x860 [ 373.642090][T17605] ? setup_fault_attr+0x3d0/0x3d0 [ 373.647108][T17605] ? kvmalloc_node+0x7e/0xf0 [ 373.651690][T17605] should_failslab+0x5/0x20 [ 373.656182][T17605] __kmalloc+0x5f/0x2f0 [ 373.660334][T17605] kvmalloc_node+0x7e/0xf0 [ 373.664744][T17605] ext4_mb_alloc_groupinfo+0xf4/0x2d0 [ 373.670111][T17605] ext4_mb_init+0xb4e/0x1330 [ 373.674697][T17605] ext4_fill_super+0xbe97/0xeb30 [ 373.679635][T17605] ? ext4_mount+0x40/0x40 [ 373.683955][T17605] ? idr_replace+0x1c4/0x230 [ 373.688538][T17605] ? snprintf+0xd6/0x120 [ 373.692773][T17605] ? set_blocksize+0x1a5/0x3a0 [ 373.697530][T17605] mount_bdev+0x22d/0x340 [ 373.701852][T17605] ? ext4_mount+0x40/0x40 [ 373.706181][T17605] legacy_get_tree+0xde/0x170 [ 373.710937][T17605] ? ext4_lazyinit_thread+0xd40/0xd40 [ 373.716298][T17605] vfs_get_tree+0x83/0x260 [ 373.720710][T17605] do_mount+0x19d0/0x2670 [ 373.725031][T17605] ? copy_mount_string+0x30/0x30 [ 373.729957][T17605] ? copy_mount_options+0x1d8/0x300 [ 373.735135][T17605] ? copy_mount_options+0x210/0x300 [ 373.740313][T17605] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 373.745832][T17605] ? copy_mount_options+0x273/0x300 [ 373.751014][T17605] ksys_mount+0xc2/0xf0 [ 373.755143][T17605] __x64_sys_mount+0xb1/0xc0 [ 373.759854][T17605] do_syscall_64+0xcb/0x1e0 [ 373.764334][T17605] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 373.770299][T17605] RIP: 0033:0x7f1d6d50cc2a [ 373.774692][T17605] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 373.794376][T17605] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 373.802761][T17605] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 373.810708][T17605] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 373.818660][T17605] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 373.826601][T17605] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 373.834547][T17605] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 374.011076][T17605] EXT4-fs (loop0): can't allocate buddy meta group [ 374.085240][T17605] EXT4-fs (loop0): failed to initialize mballoc (-12) [ 374.104735][T17605] EXT4-fs (loop0): mount failed 04:55:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x44000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2b00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 94) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4400, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x1, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x58000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:23 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4800, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 374.497322][T17686] FAULT_INJECTION: forcing a failure. [ 374.497322][T17686] name failslab, interval 1, probability 0, space 0, times 0 [ 374.534202][T17686] CPU: 1 PID: 17686 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 04:55:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x2f00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 374.545837][T17686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.555880][T17686] Call Trace: [ 374.559167][T17686] dump_stack+0x1d8/0x24e [ 374.563472][T17686] ? devkmsg_release+0x11c/0x11c [ 374.568456][T17686] ? show_regs_print_info+0x12/0x12 [ 374.573667][T17686] should_fail+0x6f6/0x860 [ 374.578057][T17686] ? setup_fault_attr+0x3d0/0x3d0 [ 374.583106][T17686] ? ext4_alloc_inode+0x1d/0x620 [ 374.588171][T17686] should_failslab+0x5/0x20 [ 374.592656][T17686] kmem_cache_alloc+0x36/0x290 [ 374.597399][T17686] ? kvmalloc_node+0x7e/0xf0 [ 374.601969][T17686] ? set_qf_name+0x310/0x310 [ 374.606530][T17686] ext4_alloc_inode+0x1d/0x620 [ 374.611266][T17686] ? set_qf_name+0x310/0x310 [ 374.615826][T17686] new_inode_pseudo+0x61/0x220 [ 374.620560][T17686] new_inode+0x25/0x1d0 [ 374.624686][T17686] ? ext4_mb_alloc_groupinfo+0x203/0x2d0 [ 374.630285][T17686] ext4_mb_init+0xb76/0x1330 [ 374.634852][T17686] ext4_fill_super+0xbe97/0xeb30 [ 374.639770][T17686] ? ext4_mount+0x40/0x40 [ 374.644075][T17686] ? idr_replace+0x1c4/0x230 [ 374.648640][T17686] ? snprintf+0xd6/0x120 [ 374.652855][T17686] ? vscnprintf+0x80/0x80 [ 374.657161][T17686] ? set_blocksize+0x1a5/0x3a0 [ 374.661898][T17686] mount_bdev+0x22d/0x340 [ 374.666201][T17686] ? ext4_mount+0x40/0x40 [ 374.670503][T17686] legacy_get_tree+0xde/0x170 [ 374.675151][T17686] ? ext4_lazyinit_thread+0xd40/0xd40 [ 374.680499][T17686] vfs_get_tree+0x83/0x260 [ 374.684889][T17686] do_mount+0x19d0/0x2670 [ 374.689195][T17686] ? copy_mount_string+0x30/0x30 [ 374.694106][T17686] ? apic_timer_interrupt+0xa/0x20 [ 374.699188][T17686] ? copy_mount_options+0x1cc/0x300 [ 374.704359][T17686] ? copy_mount_options+0x273/0x300 [ 374.709527][T17686] ksys_mount+0xc2/0xf0 [ 374.713657][T17686] __x64_sys_mount+0xb1/0xc0 [ 374.718223][T17686] do_syscall_64+0xcb/0x1e0 [ 374.722707][T17686] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 374.728574][T17686] RIP: 0033:0x7f1d6d50cc2a [ 374.732982][T17686] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 374.752557][T17686] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 374.760942][T17686] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 374.768889][T17686] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 374.776836][T17686] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 374.784789][T17686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 374.792739][T17686] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 374.810198][T17686] EXT4-fs (loop0): can't get new inode [ 374.817210][T17686] EXT4-fs (loop0): failed to initialize mballoc (-12) [ 374.824796][T17686] EXT4-fs (loop0): mount failed 04:55:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 95) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x3c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0x89ffffff}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x5800, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x1, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xe0000000}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 375.429447][T17746] FAULT_INJECTION: forcing a failure. [ 375.429447][T17746] name failslab, interval 1, probability 0, space 0, times 0 [ 375.463289][T17746] CPU: 0 PID: 17746 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 375.474919][T17746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.484964][T17746] Call Trace: [ 375.488256][T17746] dump_stack+0x1d8/0x24e [ 375.492583][T17746] ? devkmsg_release+0x11c/0x11c [ 375.497515][T17746] ? show_regs_print_info+0x12/0x12 [ 375.502791][T17746] ? should_fail+0x3d3/0x860 [ 375.507380][T17746] should_fail+0x6f6/0x860 [ 375.511793][T17746] ? setup_fault_attr+0x3d0/0x3d0 [ 375.516811][T17746] ? security_inode_alloc+0x32/0x1d0 [ 375.522096][T17746] should_failslab+0x5/0x20 04:55:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4400, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:24 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 375.526594][T17746] kmem_cache_alloc+0x36/0x290 [ 375.531354][T17746] ? from_kuid_munged+0x3b0/0x3b0 [ 375.536381][T17746] security_inode_alloc+0x32/0x1d0 [ 375.541488][T17746] inode_init_always+0x387/0x810 [ 375.546414][T17746] ? set_qf_name+0x310/0x310 [ 375.550991][T17746] new_inode_pseudo+0x90/0x220 [ 375.555744][T17746] new_inode+0x25/0x1d0 [ 375.559891][T17746] ? ext4_mb_alloc_groupinfo+0x203/0x2d0 [ 375.565511][T17746] ext4_mb_init+0xb76/0x1330 [ 375.570096][T17746] ext4_fill_super+0xbe97/0xeb30 [ 375.575033][T17746] ? ext4_mount+0x40/0x40 [ 375.579357][T17746] ? idr_replace+0x1c4/0x230 [ 375.579371][T17746] ? snprintf+0xd6/0x120 [ 375.588160][T17746] ? vscnprintf+0x80/0x80 [ 375.592480][T17746] ? set_blocksize+0x1a5/0x3a0 [ 375.597233][T17746] mount_bdev+0x22d/0x340 [ 375.601553][T17746] ? ext4_mount+0x40/0x40 [ 375.605872][T17746] legacy_get_tree+0xde/0x170 [ 375.610542][T17746] ? ext4_lazyinit_thread+0xd40/0xd40 [ 375.615907][T17746] vfs_get_tree+0x83/0x260 [ 375.620319][T17746] do_mount+0x19d0/0x2670 [ 375.624642][T17746] ? copy_mount_string+0x30/0x30 [ 375.629572][T17746] ? retint_kernel+0x1b/0x1b [ 375.634154][T17746] ? copy_mount_options+0x1d8/0x300 [ 375.639339][T17746] ? copy_mount_options+0x273/0x300 [ 375.644525][T17746] ksys_mount+0xc2/0xf0 [ 375.648668][T17746] __x64_sys_mount+0xb1/0xc0 [ 375.653251][T17746] do_syscall_64+0xcb/0x1e0 [ 375.657748][T17746] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 375.663665][T17746] RIP: 0033:0x7f1d6d50cc2a [ 375.668060][T17746] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 375.687751][T17746] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 375.696135][T17746] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 375.704078][T17746] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 375.712020][T17746] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 375.719961][T17746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 375.727906][T17746] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 375.746944][T17746] EXT4-fs (loop0): can't get new inode [ 375.752662][T17746] EXT4-fs (loop0): failed to initialize mballoc (-12) [ 375.759587][T17746] EXT4-fs (loop0): mount failed 04:55:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, 0x0, 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4800, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x14}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xffffff89}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6400, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 96) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x4c}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x4c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty=0xffffffff}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6800, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:25 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 376.366490][T17815] FAULT_INJECTION: forcing a failure. [ 376.366490][T17815] name failslab, interval 1, probability 0, space 0, times 0 [ 376.415531][T17852] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 376.415615][T17815] CPU: 1 PID: 17815 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 376.425533][T17860] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 376.432771][T17815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.432775][T17815] Call Trace: [ 376.432791][T17815] dump_stack+0x1d8/0x24e [ 376.432801][T17815] ? devkmsg_release+0x11c/0x11c [ 376.432810][T17815] ? show_regs_print_info+0x12/0x12 [ 376.432826][T17815] should_fail+0x6f6/0x860 [ 376.470517][T17815] ? setup_fault_attr+0x3d0/0x3d0 [ 376.475539][T17815] ? security_inode_alloc+0x32/0x1d0 [ 376.480816][T17815] should_failslab+0x5/0x20 [ 376.485306][T17815] kmem_cache_alloc+0x36/0x290 [ 376.490041][T17815] ? from_kuid_munged+0x3b0/0x3b0 [ 376.495049][T17815] security_inode_alloc+0x32/0x1d0 [ 376.500149][T17815] inode_init_always+0x387/0x810 [ 376.505197][T17815] ? set_qf_name+0x310/0x310 [ 376.509770][T17815] new_inode_pseudo+0x90/0x220 [ 376.514508][T17815] new_inode+0x25/0x1d0 [ 376.518636][T17815] ? ext4_mb_alloc_groupinfo+0x203/0x2d0 [ 376.524240][T17815] ext4_mb_init+0xb76/0x1330 [ 376.528804][T17815] ext4_fill_super+0xbe97/0xeb30 [ 376.533783][T17815] ? ext4_mount+0x40/0x40 [ 376.538133][T17815] ? idr_replace+0x1c4/0x230 [ 376.542708][T17815] ? snprintf+0xd6/0x120 [ 376.546935][T17815] ? vscnprintf+0x80/0x80 [ 376.551240][T17815] ? set_blocksize+0x1a5/0x3a0 [ 376.555979][T17815] mount_bdev+0x22d/0x340 [ 376.560291][T17815] ? ext4_mount+0x40/0x40 [ 376.564601][T17815] legacy_get_tree+0xde/0x170 [ 376.569255][T17815] ? ext4_lazyinit_thread+0xd40/0xd40 [ 376.574596][T17815] vfs_get_tree+0x83/0x260 [ 376.578987][T17815] do_mount+0x19d0/0x2670 [ 376.583295][T17815] ? copy_mount_string+0x30/0x30 [ 376.588205][T17815] ? apic_timer_interrupt+0xa/0x20 [ 376.593298][T17815] ? copy_mount_options+0x1cc/0x300 [ 376.598496][T17815] ? copy_mount_options+0x273/0x300 [ 376.598510][T17815] ksys_mount+0xc2/0xf0 [ 376.607813][T17815] __x64_sys_mount+0xb1/0xc0 [ 376.612401][T17815] do_syscall_64+0xcb/0x1e0 [ 376.616883][T17815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 376.622752][T17815] RIP: 0033:0x7f1d6d50cc2a [ 376.627148][T17815] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 376.646733][T17815] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 376.655113][T17815] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 376.663057][T17815] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 376.671001][T17815] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 376.678945][T17815] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 376.686890][T17815] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 376.727040][T17815] EXT4-fs (loop0): can't get new inode [ 376.741606][T17815] EXT4-fs (loop0): failed to initialize mballoc (-12) [ 376.757317][T17815] EXT4-fs (loop0): mount failed 04:55:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, 0x0, 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x5800, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x2}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x7400, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 97) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x3}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x7a00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 377.240996][T17893] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 377.247800][T17900] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:55:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6400, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 377.318277][T17890] FAULT_INJECTION: forcing a failure. [ 377.318277][T17890] name failslab, interval 1, probability 0, space 0, times 0 [ 377.347673][T17925] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 377.363351][T17890] CPU: 1 PID: 17890 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 377.374979][T17890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.384452][T17931] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 377.385033][T17890] Call Trace: [ 377.393917][T17890] dump_stack+0x1d8/0x24e [ 377.398241][T17890] ? devkmsg_release+0x11c/0x11c [ 377.403165][T17890] ? show_regs_print_info+0x12/0x12 [ 377.408339][T17890] should_fail+0x6f6/0x860 [ 377.412727][T17890] ? setup_fault_attr+0x3d0/0x3d0 [ 377.417721][T17890] ? __rcu_read_lock+0x50/0x50 [ 377.422456][T17890] ? ext4_mb_add_groupinfo+0x24e/0x760 [ 377.427886][T17890] should_failslab+0x5/0x20 [ 377.432363][T17890] kmem_cache_alloc+0x36/0x290 [ 377.437140][T17890] ext4_mb_add_groupinfo+0x24e/0x760 [ 377.442400][T17890] ext4_mb_init+0xc45/0x1330 [ 377.446966][T17890] ext4_fill_super+0xbe97/0xeb30 [ 377.451880][T17890] ? ext4_mount+0x40/0x40 [ 377.456178][T17890] ? idr_replace+0x1c4/0x230 [ 377.460752][T17890] ? snprintf+0xd6/0x120 [ 377.464968][T17890] ? down_write+0xd8/0x150 [ 377.469349][T17890] ? vscnprintf+0x80/0x80 [ 377.473648][T17890] ? set_blocksize+0x1a5/0x3a0 [ 377.478385][T17890] mount_bdev+0x22d/0x340 [ 377.482685][T17890] ? ext4_mount+0x40/0x40 [ 377.486983][T17890] legacy_get_tree+0xde/0x170 [ 377.491634][T17890] ? ext4_lazyinit_thread+0xd40/0xd40 [ 377.496973][T17890] vfs_get_tree+0x83/0x260 [ 377.501365][T17890] do_mount+0x19d0/0x2670 [ 377.505662][T17890] ? copy_mount_string+0x30/0x30 [ 377.510570][T17890] ? apic_timer_interrupt+0xa/0x20 [ 377.515652][T17890] ? copy_mount_options+0x1cc/0x300 [ 377.520821][T17890] ? copy_mount_options+0x273/0x300 [ 377.525990][T17890] ksys_mount+0xc2/0xf0 [ 377.530114][T17890] __x64_sys_mount+0xb1/0xc0 [ 377.534676][T17890] do_syscall_64+0xcb/0x1e0 [ 377.539160][T17890] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 377.545024][T17890] RIP: 0033:0x7f1d6d50cc2a [ 377.549407][T17890] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 377.568983][T17890] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 377.577362][T17890] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 377.585306][T17890] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 377.593251][T17890] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 377.601192][T17890] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 377.609132][T17890] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 377.655009][T17890] EXT4-fs (loop0): can't allocate buddy mem [ 377.664260][T17890] EXT4-fs (loop0): failed to initialize mballoc (-12) [ 377.673175][T17890] EXT4-fs (loop0): mount failed 04:55:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, 0x0, 0x108) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x4}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:27 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x10000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) (fail_nth: 98) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000000c0)={@private, @loopback}, 0xc) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800)}, 0x48020, 0x5, 0x8, 0x9, 0x0, 0x2, 0xfff7, 0x0, 0xfff, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(0x0, &(0x7f0000000180)='./file0\x00', 0x40000000007, 0x4, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000700)="c164e18615ec66c9f7e2fd21dcfefe90c3b003000000000000008ec6866c7493e95b7d06b6a1f534c939dfd35e380d0f5df03e2af6e262fb1d539bd0277b8d3c073a6742d5e0c9940d4863de4bb2b9ddb8cbd588d5907fceeefbec8f6f851353231a527c99aa83a20d4b87304735967deb608698291cf8544db80e67fe976541b6ccc6c36574eac1e37d059858a474f7139104d3cef9cf1c836e6fa8f5c9a722fa06feb0bfecaf3dd6d86b29e523d9f33ad2d657587ba4d896abad8e0a3e6450ff7bab5187524dd769e8097df9848656cc20bf587632264182af2b5d0aa9b088bf8b142a25e1f9e461b0daf7", 0xec, 0x7}, {0x0, 0x0, 0x3ff}, {0x0, 0x0, 0x80}], 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000880)={0x3, 0x80, 0x0, 0x3, 0x0, 0xef, 0x0, 0x0, 0x6c02a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000840), 0x8}, 0x48080, 0x8001, 0x3ff, 0x8, 0x40e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x3, 0xffffffffffffffff, 0x9) open(&(0x7f0000000080)='./file0\x00', 0x4180, 0x6) chown(0x0, 0x0, 0xffffffffffffffff) 04:55:27 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xe803, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6800, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x6}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:27 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0xf401, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 378.177549][T17956] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 378.203338][T17969] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:55:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 378.246888][T17982] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 378.254078][T17986] sit: non-ECT from 0.0.0.0 with TOS=0x3 04:55:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58, 0x7}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:27 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x30000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 378.570195][T17959] FAULT_INJECTION: forcing a failure. [ 378.570195][T17959] name failslab, interval 1, probability 0, space 0, times 0 [ 378.611887][T17959] CPU: 0 PID: 17959 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 378.623520][T17959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.633564][T17959] Call Trace: [ 378.636848][T17959] dump_stack+0x1d8/0x24e [ 378.641177][T17959] ? devkmsg_release+0x11c/0x11c [ 378.646112][T17959] ? show_regs_print_info+0x12/0x12 [ 378.651307][T17959] should_fail+0x6f6/0x860 [ 378.655715][T17959] ? setup_fault_attr+0x3d0/0x3d0 [ 378.660731][T17959] ? pcpu_alloc+0x39e/0x1180 [ 378.665314][T17959] ? kvmalloc_node+0x7e/0xf0 [ 378.669894][T17959] should_failslab+0x5/0x20 [ 378.674390][T17959] __kmalloc+0x5f/0x2f0 [ 378.678536][T17959] ? pcpu_alloc+0xc8a/0x1180 [ 378.683113][T17959] kvmalloc_node+0x7e/0xf0 [ 378.687510][T17959] ext4_alloc_flex_bg_array+0xf5/0x470 [ 378.692954][T17959] ext4_fill_super+0xc9a5/0xeb30 [ 378.697874][T17959] ? ext4_mount+0x40/0x40 [ 378.702180][T17959] ? idr_replace+0x1c4/0x230 [ 378.706742][T17959] ? apic_timer_interrupt+0xa/0x20 [ 378.711821][T17959] ? set_blocksize+0x30/0x3a0 [ 378.716469][T17959] ? set_blocksize+0x59/0x3a0 [ 378.721116][T17959] ? set_blocksize+0x1a5/0x3a0 [ 378.725858][T17959] mount_bdev+0x22d/0x340 [ 378.730166][T17959] ? ext4_mount+0x40/0x40 [ 378.734467][T17959] legacy_get_tree+0xde/0x170 [ 378.739118][T17959] ? ext4_lazyinit_thread+0xd40/0xd40 [ 378.744463][T17959] vfs_get_tree+0x83/0x260 [ 378.748859][T17959] do_mount+0x19d0/0x2670 [ 378.753162][T17959] ? copy_mount_string+0x30/0x30 [ 378.758077][T17959] ? apic_timer_interrupt+0xa/0x20 [ 378.763180][T17959] ? copy_mount_options+0x1c6/0x300 [ 378.768373][T17959] ? copy_mount_options+0x273/0x300 [ 378.773549][T17959] ksys_mount+0xc2/0xf0 [ 378.777683][T17959] __x64_sys_mount+0xb1/0xc0 [ 378.782253][T17959] do_syscall_64+0xcb/0x1e0 [ 378.786819][T17959] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 378.792679][T17959] RIP: 0033:0x7f1d6d50cc2a [ 378.797072][T17959] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 378.816654][T17959] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 378.825031][T17959] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 378.832973][T17959] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 378.840917][T17959] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 [ 378.848861][T17959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 378.856806][T17959] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 378.865783][T17959] EXT4-fs (loop0): not enough memory for 1 flex group pointers [ 378.874002][T17959] EXT4-fs (loop0): unable to initialize flex_bg meta info! [ 378.881665][T17959] EXT4-fs (loop0): mount failed [ 378.887188][T17959] kasan: CONFIG_KASAN_INLINE enabled [ 378.896818][T17959] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 378.905036][T17959] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 378.911962][T17959] CPU: 0 PID: 17959 Comm: syz-executor.0 Tainted: G W 5.4.125-syzkaller-00011-gd52ac987ad2a #0 [ 378.923646][T17959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.933687][T17959] RIP: 0010:legacy_get_tree+0xfe/0x170 [ 378.939123][T17959] Code: 89 ff 89 ee 48 89 da ff 14 24 48 89 c5 48 3d 01 f0 ff ff 72 07 e8 12 87 bf ff eb 48 48 89 eb 48 83 c3 68 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 03 47 ee ff 48 83 3b 00 74 50 e8 [ 378.958707][T17959] RSP: 0018:ffff8881e97afcd0 EFLAGS: 00010202 [ 378.964758][T17959] RAX: 000000000000000d RBX: 0000000000000068 RCX: 0000000000040000 [ 378.972709][T17959] RDX: ffffc90000ad8000 RSI: 000000000003ffff RDI: 0000000000040000 [ 378.980658][T17959] RBP: 0000000000000000 R08: ffffffff8198f288 R09: 000000000000000c [ 378.988610][T17959] R10: ffffffff84800000 R11: 0000000000000000 R12: ffff8881e452f200 [ 378.996564][T17959] R13: dffffc0000000000 R14: ffff8881e95f0a00 R15: ffffffff85faa1c0 [ 379.004858][T17959] FS: 00007f1d6b283700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 379.013762][T17959] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 379.020323][T17959] CR2: 00007ffefcde2620 CR3: 00000001e5224000 CR4: 00000000001406f0 [ 379.028276][T17959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 379.036234][T17959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 379.044179][T17959] Call Trace: [ 379.047470][T17959] ? ext4_lazyinit_thread+0xd40/0xd40 [ 379.052819][T17959] vfs_get_tree+0x83/0x260 [ 379.057213][T17959] do_mount+0x19d0/0x2670 [ 379.061520][T17959] ? copy_mount_string+0x30/0x30 [ 379.066536][T17959] ? apic_timer_interrupt+0xa/0x20 [ 379.071622][T17959] ? copy_mount_options+0x1c6/0x300 [ 379.076792][T17959] ? copy_mount_options+0x273/0x300 [ 379.081963][T17959] ksys_mount+0xc2/0xf0 [ 379.086093][T17959] __x64_sys_mount+0xb1/0xc0 [ 379.090697][T17959] do_syscall_64+0xcb/0x1e0 [ 379.095189][T17959] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 379.101052][T17959] RIP: 0033:0x7f1d6d50cc2a [ 379.105454][T17959] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 379.125032][T17959] RSP: 002b:00007f1d6b282fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.133415][T17959] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1d6d50cc2a [ 379.141363][T17959] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1d6b283000 [ 379.149310][T17959] RBP: 00007f1d6b283040 R08: 00007f1d6b283040 R09: 0000000020000000 04:55:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000640)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x3a2}) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x108d0, &(0x7f0000000500)=ANY=[]) r4 = creat(&(0x7f0000000040)='.\x00', 0x0) mkdirat(r3, &(0x7f00000002c0)='./file0\x00', 0x0) recvmmsg(r4, &(0x7f0000000180), 0x0, 0x100, &(0x7f00000001c0)={0x0, 0x3938700}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xc3ae9000) sched_setattr(0x0, &(0x7f00000006c0)={0x38, 0x1, 0x10000020, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0x1, 0x0) renameat(r5, &(0x7f0000000340)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400), 0x2000014, &(0x7f0000000880)=ANY=[@ANYBLOB='=always,mode=00000000000000000000011,seclabel,e\bid<\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="2c726f9bd6a88299b10e9a59ca743173740eca4c0a8355d0366b155a3ba8f600917018f7669ec454fc937dc69b06f5a7308c9cfdefff3fcd8c70c5059799e2c16cbdee70a6", @ANYRESDEC=r6, @ANYBLOB="7a9d3cf5c458da63cdef848f1c7d1afb14017cb830d94af06450e4b54125eb4ab758afe75070a43051954dcba5444665c11f8dc06bf4ca42f0448575e40c2e474a0fc694ec9bbaad6bc295e6f1e9c11517628d89854dc23b41101e5619e4fc5b9934508fdbab95268c2ec86578b5a822b48427200339156c1460faa52c86a2b944c10b5367a0b750683f7607e4164448188131790c25dc8890d18cd9d16f46085b3a70ddd9eb2dca8d3458cf80d998c47a68c0a404917722784a06ecc4de7aa2548a1a538b5614df8a857bf8733b32a525a396f92a2aaa073680e2"]) 04:55:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x6c00, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) 04:55:28 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x66, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x2, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @empty=0x1000000, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x805}, {0x0, 0x0, 0x0, 0x0, 0x58}, {0x8, 0x88be, 0x0, {{}, 0x4c1}}}}}}}, 0x0) [ 379.157253][T17959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 379.165197][T17959] R13: 0000000020000100 R14: 00007f1d6b283000 R15: 0000000020013000 [ 379.173143][T17959] Modules linked in: [ 379.209344][T17959] ---[ end trace 8e6389c0a7462793 ]--- [ 379.216945][T17959] RIP: 0010:legacy_get_tree+0xfe/0x170 [ 379.224511][T17959] Code: 89 ff 89 ee 48 89 da ff 14 24 48 89 c5 48 3d 01 f0 ff ff 72 07 e8 12 87 bf ff eb 48 48 89 eb 48 83 c3 68 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 03 47 ee ff 48 83 3b 00 74 50 e8 [ 379.247526][T17959] RSP: 0018:ffff8881e97afcd0 EFLAGS: 00010202 [ 379.254855][T17959] RAX: 000000000000000d RBX: 0000000000000068 RCX: 0000000000040000 [ 379.290014][T17959] RDX: ffffc90000ad8000 RSI: 000000000003ffff RDI: 0000000000040000 [ 379.298261][T17959] RBP: 0000000000000000 R08: ffffffff8198f288 R09: 000000000000000c [ 379.306611][T17959] R10: ffffffff84800000 R11: 0000000000000000 R12: ffff8881e452f200 [ 379.315030][T17959] R13: dffffc0000000000 R14: ffff8881e95f0a00 R15: ffffffff85faa1c0 [ 379.323081][T17959] FS: 00007f1d6b283700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 379.332061][T17959] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 379.338851][T17959] CR2: 000055cad2e93b50 CR3: 00000001e5224000 CR4: 00000000001406e0 [ 379.442248][T17959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 379.453278][T17959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 379.463844][T17959] Kernel panic - not syncing: Fatal exception [ 379.469950][T17959] Kernel Offset: disabled [ 379.474258][T17959] Rebooting in 86400 seconds..