74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {0x0, 0x0, 0x45c}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 447.419665] FAT-fs (loop7): Can't find a valid FAT filesystem
[ 447.444037] FAT-fs (loop6): unable to read boot sector
07:33:11 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 447.458374] No source specified
[ 447.477134] loop0: detected capacity change from 0 to 14
[ 447.484734] FAT-fs (loop0): bogus logical sector size 38763
[ 447.485225] FAT-fs (loop0): Can't find a valid FAT filesystem
[ 447.557619] FAT-fs (loop2): unable to read boot sector
07:33:20 executing program 6:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:33:20 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 19)
07:33:20 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {0x0, 0x0, 0x45c}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 456.340563] FAT-fs (loop5): unable to read boot sector
[ 456.342881] FAT-fs (loop4): unable to read boot sector
[ 456.366619] loop0: detected capacity change from 0 to 14
[ 456.370380] FAT-fs (loop7): unable to read boot sector
[ 456.377105] FAT-fs (loop6): unable to read boot sector
[ 456.383710] FAT-fs (loop0): bogus logical sector size 38763
[ 456.384612] FAT-fs (loop0): Can't find a valid FAT filesystem
[ 456.384858] No source specified
[ 456.387627] FAT-fs (loop2): unable to read boot sector
07:33:20 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:33:20 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 456.489638] FAT-fs (loop7): unable to read boot sector
07:33:20 executing program 3:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 6:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:33:20 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {0x0, 0x0, 0x45c}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 456.575299] FAT-fs (loop6): unable to read boot sector
07:33:20 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 20)
[ 456.622294] No source specified
07:33:20 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 456.658097] FAULT_INJECTION: forcing a failure.
[ 456.658097] name failslab, interval 1, probability 0, space 0, times 0
[ 456.670166] CPU: 0 UID: 0 PID: 6250 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 456.670197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 456.670209] Call Trace:
[ 456.670218]
[ 456.670227] dump_stack_lvl+0xfa/0x120
[ 456.670264] should_fail_ex+0x4d7/0x5e0
[ 456.670313] ? security_inode_alloc+0x3e/0x130
[ 456.670348] should_failslab+0xc2/0x120
[ 456.670377] kmem_cache_alloc_noprof+0x80/0x760
[ 456.670411] ? __pfx_map_id_range_down+0x10/0x10
[ 456.670442] ? __create_object+0x59/0x80
[ 456.670492] ? security_inode_alloc+0x3e/0x130
[ 456.670529] security_inode_alloc+0x3e/0x130
[ 456.670574] inode_init_always_gfp+0xc9d/0xff0
[ 456.670617] alloc_inode+0x8d/0x250
[ 456.670654] new_inode+0x1e/0x160
[ 456.670696] proc_pid_make_inode+0x21/0x170
[ 456.670738] proc_ns_dir_lookup+0x253/0x390
[ 456.670776] ? __pfx_proc_ns_dir_lookup+0x10/0x10
[ 456.670818] lookup_open.isra.0+0x63e/0x1030
[ 456.670878] ? __pfx_lookup_open.isra.0+0x10/0x10
[ 456.670976] ? mnt_get_write_access+0x7f/0x2c0
[ 456.671004] ? mnt_get_write_access+0x1dc/0x2c0
[ 456.671057] path_openat+0x15e8/0x2d60
[ 456.671127] ? __pfx_path_openat+0x10/0x10
[ 456.671154] ? perf_trace_run_bpf_submit+0xef/0x180
[ 456.671180] ? perf_trace_run_bpf_submit+0xef/0x180
[ 456.671234] do_file_open+0x209/0x460
[ 456.671261] ? __pfx_do_file_open+0x10/0x10
[ 456.671324] ? __pfx_kfree_link+0x10/0x10
[ 456.671364] ? lock_release+0xc8/0x270
[ 456.671414] ? alloc_fd+0x2c1/0x560
[ 456.671469] do_sys_openat2+0xe7/0x210
[ 456.671502] ? __pfx_do_sys_openat2+0x10/0x10
[ 456.671544] ? __fget_files+0x20d/0x3b0
[ 456.671592] __x64_sys_openat+0x142/0x200
[ 456.671625] ? __pfx___x64_sys_openat+0x10/0x10
[ 456.671654] ? ksys_write+0x1a3/0x240
[ 456.671680] ? irqentry_exit+0xee/0x650
[ 456.671703] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 456.671731] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 456.671784] do_syscall_64+0xbf/0x420
[ 456.671817] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 456.671842] RIP: 0033:0x7f11d849aa04
[ 456.671861] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 456.671881] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 456.671903] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 456.671917] RDX: 0000000000000002 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 456.671946] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 456.671960] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 456.671972] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 456.672033]
[ 456.676815] FAT-fs (loop2): unable to read boot sector
[ 456.680098] loop0: detected capacity change from 0 to 14
[ 456.753622] FAT-fs (loop7): unable to read boot sector
[ 456.764873] FAT-fs (loop0): bogus logical sector size 38763
[ 456.765789] FAT-fs (loop0): Can't find a valid FAT filesystem
07:33:20 executing program 3:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:20 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 456.823440] No source specified
07:33:30 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 21)
07:33:30 executing program 3:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:30 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:30 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:33:30 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:33:30 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:30 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:33:30 executing program 6:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 466.295020] FAT-fs (loop2): unable to read boot sector
[ 466.317509] No source specified
07:33:30 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 466.348756] loop6: detected capacity change from 0 to 14
07:33:30 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0, 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 466.375296] FAT-fs (loop6): bogus logical sector size 38763
[ 466.376381] FAT-fs (loop6): Can't find a valid FAT filesystem
[ 466.384895] loop0: detected capacity change from 0 to 14
[ 466.392034] FAT-fs (loop0): bogus logical sector size 38763
07:33:30 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 22)
07:33:30 executing program 3:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 466.394741] FAT-fs (loop0): Can't find a valid FAT filesystem
07:33:30 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:33:30 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:33:30 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 466.462051] No source specified
[ 466.505307] FAT-fs (loop2): unable to read boot sector
[ 466.514856] FAULT_INJECTION: forcing a failure.
07:33:30 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x3, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:30 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 466.514856] name failslab, interval 1, probability 0, space 0, times 0
[ 466.539419] CPU: 0 UID: 0 PID: 6292 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 466.539454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 466.539468] Call Trace:
[ 466.539477]
[ 466.539488] dump_stack_lvl+0xfa/0x120
[ 466.539529] should_fail_ex+0x4d7/0x5e0
[ 466.539582] ? alloc_inode+0x181/0x250
[ 466.539615] should_failslab+0xc2/0x120
[ 466.539647] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 466.539683] ? stashed_dentry_get+0x26/0x2c0
[ 466.539715] ? find_held_lock+0x2b/0x80
[ 466.539762] ? stashed_dentry_get+0x10c/0x2c0
[ 466.539806] ? alloc_inode+0x181/0x250
[ 466.539839] alloc_inode+0x181/0x250
[ 466.539877] path_from_stashed+0x1b2/0x660
[ 466.539906] ? do_raw_spin_unlock+0x53/0x220
[ 466.539971] ns_get_path+0x64/0x90
[ 466.540016] proc_ns_get_link+0x10e/0x210
[ 466.540067] ? __pfx_proc_ns_get_link+0x10/0x10
[ 466.540133] pick_link+0xc98/0x1320
[ 466.540175] ? __pfx_proc_ns_get_link+0x10/0x10
[ 466.540227] step_into_slowpath+0x972/0xec0
[ 466.540262] ? __pfx_perf_trace_lock+0x10/0x10
[ 466.540315] ? __pfx_step_into_slowpath+0x10/0x10
[ 466.540355] ? find_held_lock+0x2b/0x80
[ 466.540432] path_openat+0xa6a/0x2d60
[ 466.540508] ? __pfx_path_openat+0x10/0x10
[ 466.540537] ? perf_trace_run_bpf_submit+0xef/0x180
[ 466.540566] ? perf_trace_run_bpf_submit+0xef/0x180
[ 466.540624] do_file_open+0x209/0x460
[ 466.540654] ? __pfx_do_file_open+0x10/0x10
[ 466.540734] ? lock_release+0xc8/0x270
[ 466.540787] ? alloc_fd+0x2c1/0x560
[ 466.540848] do_sys_openat2+0xe7/0x210
[ 466.540885] ? __pfx_do_sys_openat2+0x10/0x10
[ 466.540932] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 466.540963] ? irqentry_exit+0x17b/0x650
[ 466.541009] __x64_sys_openat+0x142/0x200
[ 466.541046] ? __pfx___x64_sys_openat+0x10/0x10
[ 466.541102] ? trace_hardirqs_on+0x4b/0x110
[ 466.541152] do_syscall_64+0xbf/0x420
[ 466.541189] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 466.541215] RIP: 0033:0x7f11d849aa04
[ 466.541237] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 466.541259] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 466.541283] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 466.541298] RDX: 0000000000000002 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 466.541313] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 466.541327] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 466.541341] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 466.541407]
[ 466.607119] No source specified
[ 466.647089] FAT-fs (loop4): unable to read boot sector
07:33:30 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0, 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:30 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:30 executing program 6:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 466.702629] FAT-fs (loop6): unable to read boot sector
[ 466.715034] No source specified
[ 466.717217] loop0: detected capacity change from 0 to 14
[ 466.727265] FAT-fs (loop0): invalid media value (0xb2)
[ 466.727725] FAT-fs (loop0): Can't find a valid FAT filesystem
[ 466.729600] FAT-fs (loop2): unable to read boot sector
[ 466.756361] FAT-fs (loop5): unable to read boot sector
07:33:39 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:39 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:39 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:39 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:39 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x3, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:39 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 23)
07:33:39 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:39 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 475.513498] No source specified
[ 475.521701] loop6: detected capacity change from 0 to 14
[ 475.530355] loop0: detected capacity change from 0 to 14
[ 475.545028] FAT-fs (loop6): bogus logical sector size 38763
[ 475.545840] FAT-fs (loop6): Can't find a valid FAT filesystem
[ 475.546873] FAT-fs (loop4): unable to read boot sector
[ 475.551078] FAT-fs (loop2): unable to read boot sector
[ 475.552703] FAT-fs (loop5): unable to read boot sector
[ 475.563403] FAT-fs (loop0): invalid media value (0xb2)
[ 475.564290] FAT-fs (loop0): Can't find a valid FAT filesystem
07:33:39 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:33:39 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:39 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x5, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}, {0x0, 0x0, 0x45c}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:39 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:39 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 24)
[ 475.694126] No source specified
[ 475.699080] loop6: detected capacity change from 0 to 14
[ 475.703535] FAT-fs (loop7): unable to read boot sector
[ 475.717000] FAT-fs (loop6): invalid media value (0xa2)
[ 475.717666] FAT-fs (loop6): Can't find a valid FAT filesystem
[ 475.769672] FAT-fs (loop0): unable to read boot sector
[ 475.792519] FAULT_INJECTION: forcing a failure.
[ 475.792519] name failslab, interval 1, probability 0, space 0, times 0
[ 475.800066] CPU: 0 UID: 0 PID: 6344 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 475.800099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 475.800113] Call Trace:
[ 475.800121]
[ 475.800131] dump_stack_lvl+0xfa/0x120
[ 475.800186] should_fail_ex+0x4d7/0x5e0
[ 475.800237] ? security_inode_alloc+0x3e/0x130
[ 475.800274] should_failslab+0xc2/0x120
[ 475.800305] kmem_cache_alloc_noprof+0x80/0x760
[ 475.800341] ? __pfx_map_id_range_down+0x10/0x10
[ 475.800401] ? security_inode_alloc+0x3e/0x130
[ 475.800439] security_inode_alloc+0x3e/0x130
[ 475.800485] inode_init_always_gfp+0xc9d/0xff0
[ 475.800531] alloc_inode+0x8d/0x250
[ 475.800569] path_from_stashed+0x1b2/0x660
[ 475.800597] ? do_raw_spin_unlock+0x53/0x220
[ 475.800653] ns_get_path+0x64/0x90
[ 475.800697] proc_ns_get_link+0x10e/0x210
[ 475.800735] ? __pfx_proc_ns_get_link+0x10/0x10
[ 475.800800] pick_link+0xc98/0x1320
[ 475.800840] ? __pfx_proc_ns_get_link+0x10/0x10
[ 475.800890] step_into_slowpath+0x972/0xec0
[ 475.800932] ? __pfx_perf_trace_lock+0x10/0x10
[ 475.800985] ? __pfx_step_into_slowpath+0x10/0x10
[ 475.801023] ? find_held_lock+0x2b/0x80
[ 475.801099] path_openat+0xa6a/0x2d60
[ 475.801172] ? __pfx_path_openat+0x10/0x10
[ 475.801201] ? perf_trace_run_bpf_submit+0xef/0x180
[ 475.801229] ? perf_trace_run_bpf_submit+0xef/0x180
[ 475.801285] do_file_open+0x209/0x460
[ 475.801316] ? __pfx_do_file_open+0x10/0x10
[ 475.801393] ? lock_release+0xc8/0x270
[ 475.801444] ? alloc_fd+0x2c1/0x560
[ 475.801502] do_sys_openat2+0xe7/0x210
[ 475.801537] ? __pfx_do_sys_openat2+0x10/0x10
[ 475.801581] ? __fget_files+0x20d/0x3b0
[ 475.801631] __x64_sys_openat+0x142/0x200
[ 475.801666] ? __pfx___x64_sys_openat+0x10/0x10
[ 475.801697] ? ksys_write+0x1a3/0x240
[ 475.801725] ? irqentry_exit+0xee/0x650
[ 475.801749] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 475.801780] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 475.801834] do_syscall_64+0xbf/0x420
[ 475.801870] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 475.801896] RIP: 0033:0x7f11d849aa04
[ 475.801917] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 475.801938] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 475.801960] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 475.801975] RDX: 0000000000000002 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 475.801989] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 475.802003] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 475.802017] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 475.802080]
07:33:49 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:49 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:49 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:49 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:49 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:49 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:49 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 25)
07:33:49 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x1, &(0x7f0000000640)=[{0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 485.863627] FAT-fs (loop7): unable to read boot sector
[ 485.867636] FAT-fs (loop6): unable to read boot sector
[ 485.870576] FAT-fs (loop0): unable to read boot sector
[ 485.872722] FAT-fs (loop5): unable to read boot sector
[ 485.874838] FAT-fs (loop4): unable to read boot sector
[ 485.878581] No source specified
[ 485.901578] FAT-fs (loop2): unable to read boot sector
07:33:59 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:59 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:59 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:59 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:33:59 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 26)
07:33:59 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:59 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:33:59 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x1, &(0x7f0000000640)=[{0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 495.656089] FAULT_INJECTION: forcing a failure.
[ 495.656089] name failslab, interval 1, probability 0, space 0, times 0
[ 495.660144] FAT-fs (loop4): unable to read boot sector
[ 495.661039] CPU: 0 UID: 0 PID: 6379 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 495.661068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 495.661080] Call Trace:
[ 495.661089]
[ 495.661099] dump_stack_lvl+0xfa/0x120
[ 495.661135] should_fail_ex+0x4d7/0x5e0
[ 495.661184] ? __d_alloc+0x34/0x9c0
[ 495.661209] should_failslab+0xc2/0x120
[ 495.661238] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 495.661273] ? inode_set_ctime_current+0x251/0x740
[ 495.661327] ? __d_alloc+0x34/0x9c0
[ 495.661352] __d_alloc+0x34/0x9c0
[ 495.661377] ? __ns_ref_active_get+0x79/0x160
[ 495.661419] path_from_stashed+0x373/0x660
[ 495.661446] ? do_raw_spin_unlock+0x53/0x220
[ 495.661498] ns_get_path+0x64/0x90
[ 495.661539] proc_ns_get_link+0x10e/0x210
[ 495.661574] ? __pfx_proc_ns_get_link+0x10/0x10
[ 495.661635] pick_link+0xc98/0x1320
[ 495.661672] ? __pfx_proc_ns_get_link+0x10/0x10
[ 495.661719] step_into_slowpath+0x972/0xec0
[ 495.661751] ? __pfx_perf_trace_lock+0x10/0x10
[ 495.661800] ? __pfx_step_into_slowpath+0x10/0x10
[ 495.661836] ? find_held_lock+0x2b/0x80
[ 495.661915] path_openat+0xa6a/0x2d60
[ 495.661984] ? __pfx_path_openat+0x10/0x10
[ 495.662011] ? perf_trace_run_bpf_submit+0xef/0x180
[ 495.662037] ? perf_trace_run_bpf_submit+0xef/0x180
[ 495.662090] do_file_open+0x209/0x460
[ 495.662117] ? __pfx_do_file_open+0x10/0x10
[ 495.662190] ? lock_release+0xc8/0x270
[ 495.662239] ? alloc_fd+0x2c1/0x560
[ 495.662294] do_sys_openat2+0xe7/0x210
[ 495.662327] ? __pfx_do_sys_openat2+0x10/0x10
[ 495.662368] ? __fget_files+0x20d/0x3b0
[ 495.662415] __x64_sys_openat+0x142/0x200
[ 495.662449] ? __pfx___x64_sys_openat+0x10/0x10
[ 495.662478] ? ksys_write+0x1a3/0x240
[ 495.662504] ? irqentry_exit+0xee/0x650
[ 495.662526] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 495.662555] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 495.662607] do_syscall_64+0xbf/0x420
[ 495.662641] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 495.662666] RIP: 0033:0x7f11d849aa04
[ 495.662685] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 495.662705] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 495.662726] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 495.662740] RDX: 0000000000000002 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 495.662753] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 495.662766] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 495.662779] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 495.662839]
[ 495.718048] FAT-fs (loop0): unable to read boot sector
[ 495.723224] FAT-fs (loop6): unable to read boot sector
[ 495.752232] FAT-fs (loop5): unable to read boot sector
[ 495.761864] FAT-fs (loop2): unable to read boot sector
[ 495.768817] FAT-fs (loop7): unable to read boot sector
07:33:59 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:33:59 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:59 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x1, &(0x7f0000000640)=[{0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:59 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, 0x0)
07:33:59 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 495.864038] FAT-fs (loop4): unable to read boot sector
07:33:59 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:33:59 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 27)
[ 495.902677] FAT-fs (loop0): unable to read boot sector
07:33:59 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 495.947619] FAT-fs (loop7): unable to read boot sector
07:33:59 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 495.969189] FAT-fs (loop5): unable to read boot sector
[ 495.975681] FAT-fs (loop6): unable to read boot sector
07:33:59 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, 0x0)
07:33:59 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{0x0, 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:33:59 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
[ 496.056300] FAT-fs (loop0): unable to read boot sector
[ 496.089191] FAT-fs (loop4): unable to read boot sector
[ 496.095808] FAT-fs (loop7): unable to read boot sector
07:34:08 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 28)
07:34:08 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:08 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:08 executing program 6:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:08 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:08 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, 0x0)
07:34:08 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{0x0, 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:08 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 504.788754] FAT-fs (loop0): unable to read boot sector
[ 504.791028] FAT-fs (loop5): unable to read boot sector
[ 504.802379] FAT-fs (loop6): unable to read boot sector
[ 504.812777] FAT-fs (loop7): unable to read boot sector
07:34:08 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 29)
07:34:08 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 504.852287] FAT-fs (loop4): unable to read boot sector
07:34:08 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{0x0, 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:08 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:08 executing program 6:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:08 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:08 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 504.927669] FAT-fs (loop2): unable to read boot sector
[ 504.937497] FAT-fs (loop0): unable to read boot sector
[ 504.942604] FAT-fs (loop6): unable to read boot sector
[ 504.970243] FAT-fs (loop5): unable to read boot sector
07:34:08 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 30)
07:34:08 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180), 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 505.017045] FAULT_INJECTION: forcing a failure.
[ 505.017045] name failslab, interval 1, probability 0, space 0, times 0
[ 505.025044] CPU: 1 UID: 0 PID: 6454 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 505.025064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 505.025071] Call Trace:
[ 505.025077]
[ 505.025083] dump_stack_lvl+0xfa/0x120
[ 505.025108] should_fail_ex+0x4d7/0x5e0
[ 505.025137] ? do_getname+0x2b/0x3d0
[ 505.025153] should_failslab+0xc2/0x120
[ 505.025169] kmem_cache_alloc_noprof+0x80/0x760
[ 505.025203] ? do_getname+0x2b/0x3d0
[ 505.025217] do_getname+0x2b/0x3d0
[ 505.025239] do_sys_openat2+0xa0/0x210
[ 505.025258] ? __pfx_do_sys_openat2+0x10/0x10
[ 505.025286] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 505.025313] __x64_sys_openat+0x142/0x200
[ 505.025332] ? __pfx___x64_sys_openat+0x10/0x10
[ 505.025371] do_syscall_64+0xbf/0x420
[ 505.025390] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 505.025405] RIP: 0033:0x7f11d849aa04
[ 505.025416] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 505.025428] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 505.025440] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 505.025449] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 505.025456] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 505.025463] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 505.025470] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 505.025504]
[ 505.068075] FAT-fs (loop7): unable to read boot sector
[ 505.126438] FAT-fs (loop0): unable to read boot sector
07:34:17 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:17 executing program 6:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:17 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:17 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 31)
07:34:17 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:17 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:17 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180), 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:17 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{0x0, 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 513.597378] FAT-fs (loop7): unable to read boot sector
[ 513.597812] FAT-fs (loop0): unable to read boot sector
[ 513.601076] FAT-fs (loop5): unable to read boot sector
[ 513.602725] FAT-fs (loop6): unable to read boot sector
[ 513.604826] FAT-fs (loop2): unable to read boot sector
07:34:17 executing program 6:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:17 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180), 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:17 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:17 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:17 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 513.739831] FAT-fs (loop5): unable to read boot sector
[ 513.741183] FAT-fs (loop6): unable to read boot sector
[ 513.743156] FAT-fs (loop0): unable to read boot sector
07:34:17 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:17 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:17 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 32)
[ 513.824149] FAT-fs (loop4): unable to read boot sector
07:34:17 executing program 6:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 513.855933] FAT-fs (loop2): unable to read boot sector
[ 513.857859] FAT-fs (loop7): unable to read boot sector
07:34:17 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6", 0x76, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:17 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 513.878631] FAT-fs (loop6): unable to read boot sector
[ 513.881981] FAULT_INJECTION: forcing a failure.
[ 513.881981] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 513.882893] CPU: 1 UID: 0 PID: 6500 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 513.882912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 513.882921] Call Trace:
[ 513.882926]
[ 513.882931] dump_stack_lvl+0xfa/0x120
[ 513.882955] should_fail_ex+0x4d7/0x5e0
[ 513.882985] strncpy_from_user+0x3b/0x2f0
[ 513.883011] do_getname+0x70/0x3d0
[ 513.883036] do_sys_openat2+0xa0/0x210
[ 513.883056] ? __pfx_do_sys_openat2+0x10/0x10
[ 513.883085] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 513.883116] __x64_sys_openat+0x142/0x200
[ 513.883134] ? __pfx___x64_sys_openat+0x10/0x10
[ 513.883172] do_syscall_64+0xbf/0x420
[ 513.883191] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 513.883207] RIP: 0033:0x7f11d849aa04
[ 513.883218] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 513.883229] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 513.883241] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 513.883249] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 513.883257] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 513.883264] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 513.883272] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 513.883305]
[ 513.898273] FAT-fs (loop5): unable to read boot sector
07:34:17 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 514.009387] No source specified
07:34:28 executing program 6:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:28 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:28 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
07:34:28 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 33)
07:34:28 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:28 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:28 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:28 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6", 0x76, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 524.687719] FAULT_INJECTION: forcing a failure.
[ 524.687719] name failslab, interval 1, probability 0, space 0, times 0
[ 524.698977] CPU: 1 UID: 0 PID: 6516 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 524.698998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 524.699007] Call Trace:
[ 524.699013]
[ 524.699019] dump_stack_lvl+0xfa/0x120
[ 524.699046] should_fail_ex+0x4d7/0x5e0
[ 524.699080] ? alloc_empty_file+0x58/0x1e0
[ 524.699100] should_failslab+0xc2/0x120
[ 524.699120] kmem_cache_alloc_noprof+0x80/0x760
[ 524.699143] ? __is_insn_slot_addr+0x136/0x290
[ 524.699164] ? lock_release+0xc8/0x270
[ 524.699194] ? alloc_empty_file+0x58/0x1e0
[ 524.699211] alloc_empty_file+0x58/0x1e0
[ 524.699236] path_openat+0xee/0x2d60
[ 524.699264] ? perf_trace_run_bpf_submit+0xef/0x180
[ 524.699286] ? perf_trace_run_bpf_submit+0xef/0x180
[ 524.699311] ? __pfx_path_openat+0x10/0x10
[ 524.699329] ? perf_trace_run_bpf_submit+0xef/0x180
[ 524.699345] ? perf_trace_run_bpf_submit+0xef/0x180
[ 524.699380] do_file_open+0x209/0x460
[ 524.699398] ? __pfx_do_file_open+0x10/0x10
[ 524.699438] ? find_held_lock+0x2b/0x80
[ 524.699464] ? alloc_fd+0x2c1/0x560
[ 524.699481] ? lock_release+0xc8/0x270
[ 524.699510] ? _raw_spin_unlock+0x1e/0x40
[ 524.699532] ? alloc_fd+0x2c1/0x560
[ 524.699569] do_sys_openat2+0xe7/0x210
[ 524.699591] ? __pfx_do_sys_openat2+0x10/0x10
[ 524.699618] ? __fget_files+0x20d/0x3b0
[ 524.699649] __x64_sys_openat+0x142/0x200
[ 524.699671] ? __pfx___x64_sys_openat+0x10/0x10
[ 524.699690] ? ksys_write+0x1a3/0x240
[ 524.699708] ? irqentry_exit+0xee/0x650
[ 524.699723] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 524.699743] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 524.699777] do_syscall_64+0xbf/0x420
[ 524.699801] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 524.699817] RIP: 0033:0x7f11d849aa04
[ 524.699830] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 524.699844] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 524.699858] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 524.699867] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 524.699876] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 524.699885] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 524.699893] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 524.699939]
[ 524.717865] loop5: detected capacity change from 0 to 14
[ 524.723542] FAT-fs (loop6): unable to read boot sector
[ 524.732662] FAT-fs (loop2): unable to read boot sector
[ 524.735162] FAT-fs (loop0): unable to read boot sector
[ 524.739334] loop4: detected capacity change from 0 to 14
[ 524.749736] FAT-fs (loop7): unable to read boot sector
[ 524.755748] FAT-fs (loop4): invalid media value (0xa2)
[ 524.757988] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 524.764960] FAT-fs (loop5): invalid media value (0xa2)
[ 524.765772] FAT-fs (loop5): Can't find a valid FAT filesystem
07:34:28 executing program 6:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:28 executing program 7:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 524.866887] FAT-fs (loop6): unable to read boot sector
[ 524.899495] FAT-fs (loop7): unable to read boot sector
07:34:38 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180), 0x0, 0x5}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:38 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:38 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:38 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}, {&(0x7f0000000500)="85ddd2a3ccd3ce196a58631c3fc6e522c6aec3ce34755771e407c87b6638f1b8592313dbcb5ed6c7808e8dd7dfaa5427c0cff0c97dd652557bf0a7271afa167a4390e3c17b9cf0b654e132251744d73d17442425e25f03e556f446f43346907eefb42ed3641aedaf5780b816", 0x6c, 0x45c}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:38 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 34)
07:34:38 executing program 6:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:38 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}, {&(0x7f0000000500)="85ddd2a3ccd3ce196a58631c3fc6e522c6aec3ce34755771e407c87b6638f1b8592313dbcb5ed6c7808e8dd7dfaa5427c0cff0c97dd652557bf0a7271afa167a4390e3c17b9cf0b654e132251744d73d17442425e25f03e556f446f43346907eefb42ed3641aedaf5780b816", 0x6c, 0x45c}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:38 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
[ 534.369627] loop5: detected capacity change from 0 to 14
[ 534.383150] FAT-fs (loop5): invalid media value (0xa2)
[ 534.383580] FAT-fs (loop5): Can't find a valid FAT filesystem
[ 534.404478] FAT-fs (loop2): unable to read boot sector
[ 534.405778] loop4: detected capacity change from 0 to 14
[ 534.410066] FAT-fs (loop0): unable to read boot sector
07:34:38 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 35)
[ 534.428201] FAT-fs (loop7): unable to read boot sector
[ 534.431068] FAT-fs (loop6): unable to read boot sector
07:34:38 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
07:34:38 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x7, 0x6, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}, {&(0x7f0000000500)="85ddd2a3ccd3ce196a58631c3fc6e522c6aec3ce34755771e407c87b6638f1b8592313dbcb5ed6c7808e8dd7dfaa5427c0cff0c97dd652557bf0a7271afa167a4390e3c17b9cf0b654e132251744d73d17442425e25f03e556f446f43346907eefb42ed3641aedaf5780b816", 0x6c, 0x45c}, {&(0x7f0000000580)="bcff005ea503b645f75eaf644b053933613b4ee348aa0456bc04bbd817e4ee83a0dc7543faa19432a7992578f598beb3b4917b21437924307e76646ca1a2a89c04d9372e8f1a47fc5cb82765808a1020368a93570d82f560b21ec4a0acd0ef5b3d847cb550ee2cc486e2bc50de129f21152c6133f6efd934bf929e13050e18b0d8b0abd4d876f6ed84cb950dd73a2187ad8bb10f86f17ac8c795c8f4c68cb6939af23c867d691cc3", 0xa8, 0x6}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 534.444467] FAT-fs (loop4): invalid media value (0xa2)
[ 534.445385] FAT-fs (loop4): Can't find a valid FAT filesystem
07:34:38 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 534.487576] FAULT_INJECTION: forcing a failure.
[ 534.487576] name failslab, interval 1, probability 0, space 0, times 0
[ 534.494949] CPU: 1 UID: 0 PID: 6562 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 534.494966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 534.494974] Call Trace:
[ 534.494979]
[ 534.494984] dump_stack_lvl+0xfa/0x120
[ 534.495008] should_fail_ex+0x4d7/0x5e0
[ 534.495036] ? security_file_alloc+0x35/0x130
[ 534.495052] should_failslab+0xc2/0x120
[ 534.495069] kmem_cache_alloc_noprof+0x80/0x760
[ 534.495090] ? __create_object+0x59/0x80
[ 534.495117] ? security_file_alloc+0x35/0x130
[ 534.495131] security_file_alloc+0x35/0x130
[ 534.495147] init_file+0x95/0x480
[ 534.495167] alloc_empty_file+0x76/0x1e0
[ 534.495188] path_openat+0xee/0x2d60
[ 534.495212] ? perf_trace_run_bpf_submit+0xef/0x180
[ 534.495231] ? perf_trace_run_bpf_submit+0xef/0x180
[ 534.495251] ? __pfx_path_openat+0x10/0x10
[ 534.495266] ? perf_trace_run_bpf_submit+0xef/0x180
[ 534.495279] ? perf_trace_run_bpf_submit+0xef/0x180
[ 534.495308] do_file_open+0x209/0x460
[ 534.495327] ? __pfx_do_file_open+0x10/0x10
[ 534.495359] ? find_held_lock+0x2b/0x80
[ 534.495382] ? alloc_fd+0x2c1/0x560
[ 534.495396] ? lock_release+0xc8/0x270
[ 534.495420] ? _raw_spin_unlock+0x1e/0x40
[ 534.495439] ? alloc_fd+0x2c1/0x560
[ 534.495468] do_sys_openat2+0xe7/0x210
[ 534.495487] ? __pfx_do_sys_openat2+0x10/0x10
[ 534.495514] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 534.495541] __x64_sys_openat+0x142/0x200
[ 534.495559] ? __pfx___x64_sys_openat+0x10/0x10
[ 534.495598] do_syscall_64+0xbf/0x420
[ 534.495616] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 534.495630] RIP: 0033:0x7f11d849aa04
[ 534.495642] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 534.495653] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 534.495665] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 534.495673] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 534.495680] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 534.495688] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 534.495695] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 534.495728]
[ 534.531801] loop5: detected capacity change from 0 to 14
07:34:38 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:38 executing program 4:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:34:38 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:38 executing program 6:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 534.583331] FAT-fs (loop2): unable to read boot sector
[ 534.600940] FAT-fs (loop0): unable to read boot sector
[ 534.604449] FAT-fs (loop6): unable to read boot sector
07:34:38 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 36)
07:34:38 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 534.655829] FAT-fs (loop7): unable to read boot sector
07:34:38 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:38 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:38 executing program 5:
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x6, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}, {&(0x7f0000000500)="85ddd2a3ccd3ce196a58631c3fc6e522c6aec3ce34755771e407c87b6638f1b8592313dbcb5ed6c7808e8dd7dfaa5427c0cff0c97dd652557bf0a7271afa167a4390e3c17b9cf0b654e132251744d73d17442425e25f03e556f446f43346907eefb42ed3641aedaf5780b816", 0x6c, 0x45c}, {&(0x7f0000000580)="bcff005ea503b645f75eaf644b053933613b4ee348aa0456bc04bbd817e4ee83a0dc7543faa19432a7992578f598beb3b4917b21437924307e76646ca1a2a89c04d9372e8f1a47fc5cb82765808a1020368a93570d82f560b21ec4a0acd0ef5b3d847cb550ee2cc486e2bc50de129f21152c6133f6efd934bf929e13050e18b0d8b0abd4d876f6ed84cb950dd73a2187ad8bb10f86f17ac8c795c8f4c68cb6939af23c867d691cc3", 0xa8, 0x6}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:38 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 534.694473] No source specified
[ 534.729543] FAT-fs (loop2): unable to read boot sector
[ 534.732024] FAT-fs (loop0): unable to read boot sector
[ 534.756842] loop5: detected capacity change from 0 to 14
[ 534.759531] FAT-fs (loop5): invalid media value (0x33)
[ 534.760055] FAT-fs (loop5): Can't find a valid FAT filesystem
[ 534.811343] FAT-fs (loop6): unable to read boot sector
07:34:46 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:46 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:46 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:46 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:46 executing program 7:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:46 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0x6, &(0x7f0000000640)=[{&(0x7f0000000180)="6bf41f75d477f7974cb79d5105ea45b3b26beae799934bcf0bb7f1236cddfc944072e86fe46cc073d2b4371c7bbb0838ff884ce8bd7eca224273736f4f5d3ebd3a280c7cceaecd0902ac2541bee52e2639f82f4952446295e4d63fba731d0697eb0d03b92b26884c79be84efa553f4bd35eeccdbfbf6d41fef0caa8a42420bc756c22183da019e3c1d1f2f2f40f8f478cdfb91d9e15e57929d30b69e3750054b5087a0b1dd1f8703983700bc5c577bcb8f226480e3efbc8444be7fc148632e57807a9d6ec2264e1f7441334c6b484c2b0b36cafb0638b684bd74892dd93f2274911df760dff2a6866405839f", 0xec, 0x5}, {&(0x7f0000000280)="e19cd8979bdcc831347bcf10d2e335287019b9978b1d899ac02273a343b55cb37cb881fb93b0fd3d5230586a54b788d7a81d92f3242b639a81cf00a3c99d9cbe0b7ee920e55e59b09ee33cdc4755dedb1f12205a16e24f0d39a113e01363d20832786efa", 0x64, 0xe40}, {&(0x7f0000000340)="49b8c13a09e76a91c86b971dbca66ee886756efcc20542c325c15d4831d5502581436a981f9efdc953096350878fd39a42f1e54cd0caa89d7bd8a23c419d85990ffbe2b5ceb37048ec70e85b6fe8ba13c6c723231b2506ff847ab5cebd6ae3f6ed17621df0f1a885c34a332fb61723a8db290c301d548cf9298b41c10eabb617225e732aa03d25f5cd4e8dcc577c4b2e678d38dc18a78fe56669574703a452f3f101180bf7227971", 0xa8, 0x2}, {&(0x7f0000000400)="3958bd683fb76b6921da5587a39e71a0875974b8f0a25c868d4c6950c14cea7ff95674ef8b9eb23f539ea8e763ffadae9e04ba1baf58567e5e4a74e41d0081e4c43f3dc7218a5f37d3f7750cc9ffff4c088248dda96f0647b90b7f0be1b081ab899230515486d8f22183ebd8741a51e7e1d1f659dabc36d8f7fb423c195169d4d9716901e86341e0703cc259c08e44cafba6bfbf9419d9cd55c2bc96886b67d67ec9584e261764984687a7e3056206d4c7167ff34aac689fc584741f09c27aa0d1c2c81358f110e1b52f4e8c753b7e6de6ca5f040dce5972ac2959cb39b58778b1a9fc40", 0xe4}, {&(0x7f0000000500)="85ddd2a3ccd3ce196a58631c3fc6e522c6aec3ce34755771e407c87b6638f1b8592313dbcb5ed6c7808e8dd7dfaa5427c0cff0c97dd652557bf0a7271afa167a4390e3c17b9cf0b654e132251744d73d17442425e25f03e556f446f43346907eefb42ed3641aedaf5780b816", 0x6c, 0x45c}, {&(0x7f0000000580)="bcff005ea503b645f75eaf644b053933613b4ee348aa0456bc04bbd817e4ee83a0dc7543faa19432a7992578f598beb3b4917b21437924307e76646ca1a2a89c04d9372e8f1a47fc5cb82765808a1020368a93570d82f560b21ec4a0acd0ef5b3d847cb550ee2cc486e2bc50de129f21152c6133f6efd934bf929e13050e18b0d8b0abd4d876f6ed84cb950dd73a2187ad8bb10f86f17ac8c795c8f4c68cb6939af23c867d691cc3", 0xa8, 0x6}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:46 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 37)
07:34:46 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 542.955102] loop5: detected capacity change from 0 to 14
[ 542.960256] No source specified
[ 542.968479] FAT-fs (loop2): unable to read boot sector
[ 543.000004] No source specified
[ 543.001305] FAT-fs (loop6): unable to read boot sector
07:34:46 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 543.007355] FAULT_INJECTION: forcing a failure.
[ 543.007355] name failslab, interval 1, probability 0, space 0, times 0
[ 543.011150] FAT-fs (loop7): unable to read boot sector
[ 543.019151] FAT-fs (loop0): unable to read boot sector
[ 543.030030] CPU: 0 UID: 0 PID: 6600 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 543.030067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 543.030082] Call Trace:
[ 543.030092]
[ 543.030104] dump_stack_lvl+0xfa/0x120
[ 543.030147] should_fail_ex+0x4d7/0x5e0
[ 543.030204] ? proc_self_get_link+0x1ae/0x230
[ 543.030241] should_failslab+0xc2/0x120
[ 543.030276] __kmalloc_cache_noprof+0x80/0x730
[ 543.030312] ? __task_pid_nr_ns+0x1a6/0x4f0
[ 543.030346] ? lock_release+0xc8/0x270
[ 543.030377] ? lock_is_held_type+0x9e/0x120
[ 543.030428] ? proc_self_get_link+0x1ae/0x230
[ 543.030466] proc_self_get_link+0x1ae/0x230
[ 543.030513] pick_link+0xaff/0x1320
[ 543.030557] ? __pfx_proc_self_get_link+0x10/0x10
[ 543.030614] step_into_slowpath+0x972/0xec0
[ 543.030678] ? __pfx_step_into_slowpath+0x10/0x10
[ 543.030742] ? lookup_fast+0x14f/0x5e0
[ 543.030801] link_path_walk+0xc00/0x1c80
[ 543.030886] path_openat+0x1c7/0x2d60
[ 543.030957] ? perf_trace_run_bpf_submit+0xef/0x180
[ 543.031003] ? __pfx_path_openat+0x10/0x10
[ 543.031035] ? perf_trace_run_bpf_submit+0xef/0x180
[ 543.031064] ? perf_trace_run_bpf_submit+0xef/0x180
[ 543.031127] do_file_open+0x209/0x460
[ 543.031159] ? __pfx_do_file_open+0x10/0x10
[ 543.031238] ? alloc_fd+0x2c1/0x560
[ 543.031267] ? lock_release+0xc8/0x270
[ 543.031319] ? _raw_spin_unlock+0x1e/0x40
[ 543.031358] ? alloc_fd+0x2c1/0x560
[ 543.031423] do_sys_openat2+0xe7/0x210
[ 543.031462] ? __pfx_do_sys_openat2+0x10/0x10
[ 543.031511] ? __fget_files+0x20d/0x3b0
[ 543.031567] __x64_sys_openat+0x142/0x200
[ 543.031606] ? __pfx___x64_sys_openat+0x10/0x10
[ 543.031640] ? ksys_write+0x1a3/0x240
[ 543.031710] do_syscall_64+0xbf/0x420
[ 543.031750] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 543.031779] RIP: 0033:0x7f11d849aa04
[ 543.031802] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 543.031825] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 543.031850] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 543.031867] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 543.031883] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 543.031898] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 543.031913] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 543.031985]
[ 543.043097] No source specified
07:34:55 executing program 7:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
07:34:55 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 38)
07:34:55 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:55 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:34:55 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 1)
07:34:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 1)
07:34:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 1)
[ 551.618983] FAULT_INJECTION: forcing a failure.
[ 551.618983] name failslab, interval 1, probability 0, space 0, times 0
[ 551.624059] CPU: 1 UID: 0 PID: 6632 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 551.624076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 551.624084] Call Trace:
[ 551.624088]
[ 551.624093] dump_stack_lvl+0xfa/0x120
[ 551.624113] should_fail_ex+0x4d7/0x5e0
[ 551.624136] ? __do_sys_memfd_create+0x1e5/0xa90
[ 551.624154] should_failslab+0xc2/0x120
[ 551.624168] __kmalloc_cache_noprof+0x80/0x730
[ 551.624191] ? __do_sys_memfd_create+0x1e5/0xa90
[ 551.624208] __do_sys_memfd_create+0x1e5/0xa90
[ 551.624226] ? ksys_write+0x1a3/0x240
[ 551.624238] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 551.624255] ? irqentry_exit+0xee/0x650
[ 551.624266] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 551.624282] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 551.624304] do_syscall_64+0xbf/0x420
[ 551.624319] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 551.624332] RIP: 0033:0x7f591fd23b19
[ 551.624342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 551.624353] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 551.624365] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f591fd23b19
[ 551.624373] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f591fd7d0fb
[ 551.624380] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 551.624387] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 551.624394] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 551.624411]
[ 551.632262] FAULT_INJECTION: forcing a failure.
[ 551.632262] name failslab, interval 1, probability 0, space 0, times 0
[ 551.633811] FAULT_INJECTION: forcing a failure.
[ 551.633811] name failslab, interval 1, probability 0, space 0, times 0
[ 551.640095] FAT-fs (loop0): unable to read boot sector
[ 551.647015] CPU: 0 UID: 0 PID: 6630 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 551.647053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 551.647068] Call Trace:
[ 551.647085]
[ 551.647095] dump_stack_lvl+0xfa/0x120
[ 551.647132] should_fail_ex+0x4d7/0x5e0
[ 551.647180] ? __do_sys_memfd_create+0x1e5/0xa90
[ 551.647219] should_failslab+0xc2/0x120
[ 551.647248] __kmalloc_cache_noprof+0x80/0x730
[ 551.647298] ? __do_sys_memfd_create+0x1e5/0xa90
[ 551.647337] __do_sys_memfd_create+0x1e5/0xa90
[ 551.647380] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 551.647417] ? irqentry_exit+0xee/0x650
[ 551.647441] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 551.647474] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 551.647520] do_syscall_64+0xbf/0x420
[ 551.647552] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 551.647580] RIP: 0033:0x7fe78a917b19
[ 551.647600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 551.647624] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 551.647650] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a917b19
[ 551.647667] RDX: 00007fe787e8d000 RSI: 0000000000000000 RDI: 00007fe78a9710fb
[ 551.647684] RBP: 0000000000000000 R08: 00007fe787e8cff8 R09: ffffffffffffffff
07:34:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 551.647700] R10: 00007fe787e8cffc R11: 0000000000000246 R12: 0000000020000000
[ 551.647716] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 551.647753]
[ 551.648651] FAT-fs (loop7): unable to read boot sector
[ 551.654351] FAT-fs (loop6): unable to read boot sector
[ 551.655971] CPU: 1 UID: 0 PID: 6633 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 551.655988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 551.655994] Call Trace:
[ 551.655998]
[ 551.656003] dump_stack_lvl+0xfa/0x120
[ 551.656017] should_fail_ex+0x4d7/0x5e0
[ 551.656037] ? __do_sys_memfd_create+0x1e5/0xa90
[ 551.656054] should_failslab+0xc2/0x120
[ 551.656067] __kmalloc_cache_noprof+0x80/0x730
[ 551.656089] ? __do_sys_memfd_create+0x1e5/0xa90
[ 551.656106] __do_sys_memfd_create+0x1e5/0xa90
[ 551.656126] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 551.656143] ? irqentry_exit+0xee/0x650
[ 551.656154] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 551.656168] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 551.656188] do_syscall_64+0xbf/0x420
07:34:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 2)
[ 551.656202] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 551.656213] RIP: 0033:0x7f775d7e3b19
[ 551.656222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 551.656233] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
07:34:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 2)
[ 551.656244] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e3b19
[ 551.656252] RDX: 00007f775ad59000 RSI: 0000000000000000 RDI: 00007f775d83d0fb
[ 551.656259] RBP: 0000000000000000 R08: 00007f775ad58ff8 R09: ffffffffffffffff
[ 551.656266] R10: 00007f775ad58ffc R11: 0000000000000246 R12: 0000000020000000
[ 551.656273] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 551.656290]
[ 551.701731] FAT-fs (loop0): unable to read boot sector
[ 551.704974] No source specified
07:34:55 executing program 7:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 551.747794] FAT-fs (loop2): unable to read boot sector
[ 551.751010] FAT-fs (loop5): unable to read boot sector
07:34:55 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 2)
07:34:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 3)
07:34:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 3)
07:34:55 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:34:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@fat=@umask={'umask', 0x3d, 0x4897}}]})
[ 551.856519] FAT-fs (loop0): unable to read boot sector
[ 551.857113] FAULT_INJECTION: forcing a failure.
[ 551.857113] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 551.858062] CPU: 1 UID: 0 PID: 6651 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 551.858076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 551.858084] Call Trace:
[ 551.858088]
[ 551.858096] dump_stack_lvl+0xfa/0x120
[ 551.858114] should_fail_ex+0x4d7/0x5e0
[ 551.858136] strncpy_from_user+0x3b/0x2f0
[ 551.858153] __do_sys_memfd_create+0x21e/0xa90
[ 551.858173] ? ksys_write+0x1a3/0x240
[ 551.858185] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 551.858201] ? irqentry_exit+0xee/0x650
[ 551.858212] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 551.858228] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 551.858248] do_syscall_64+0xbf/0x420
[ 551.858262] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 551.858276] RIP: 0033:0x7f591fd23b19
[ 551.858285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 551.858296] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 551.858307] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f591fd23b19
[ 551.858315] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f591fd7d0fb
[ 551.858322] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 551.858329] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 551.858336] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 551.858351]
[ 551.877171] FAULT_INJECTION: forcing a failure.
[ 551.877171] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 551.882121] CPU: 1 UID: 0 PID: 6653 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 551.882137] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 551.882143] Call Trace:
[ 551.882147]
[ 551.882151] dump_stack_lvl+0xfa/0x120
[ 551.882165] should_fail_ex+0x4d7/0x5e0
[ 551.882185] strncpy_from_user+0x3b/0x2f0
[ 551.882201] __do_sys_memfd_create+0x21e/0xa90
[ 551.882220] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 551.882237] ? irqentry_exit+0xee/0x650
[ 551.882247] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 551.882262] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 551.882281] do_syscall_64+0xbf/0x420
[ 551.882294] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 551.882306] RIP: 0033:0x7f775d7e3b19
[ 551.882315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 551.882325] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 551.882336] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e3b19
[ 551.882344] RDX: 00007f775ad59000 RSI: 0000000000000000 RDI: 00007f775d83d0fb
[ 551.882351] RBP: 0000000000000000 R08: 00007f775ad58ff8 R09: ffffffffffffffff
[ 551.882358] R10: 00007f775ad58ffc R11: 0000000000000246 R12: 0000000020000000
[ 551.882366] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 551.882381]
[ 551.890822] FAT-fs (loop4): unable to read boot sector
[ 551.892676] FAT-fs (loop7): unable to read boot sector
07:34:55 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 551.904627] No source specified
07:34:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 4)
07:34:55 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 39)
07:34:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, 0x0)
[ 551.958846] FAULT_INJECTION: forcing a failure.
[ 551.958846] name failslab, interval 1, probability 0, space 0, times 0
[ 551.959790] CPU: 1 UID: 0 PID: 6659 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 551.959805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 551.959813] Call Trace:
[ 551.959817]
[ 551.959822] dump_stack_lvl+0xfa/0x120
[ 551.959841] should_fail_ex+0x4d7/0x5e0
[ 551.959863] ? shmem_alloc_inode+0x27/0x50
[ 551.959876] should_failslab+0xc2/0x120
[ 551.959890] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 551.959916] ? shmem_alloc_inode+0x27/0x50
[ 551.959927] shmem_alloc_inode+0x27/0x50
[ 551.959938] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 551.959949] alloc_inode+0x67/0x250
[ 551.959967] new_inode+0x1e/0x160
[ 551.959983] __shmem_get_inode+0x17c/0xe80
[ 551.960000] __shmem_file_setup+0x108/0x370
[ 551.960015] __do_sys_memfd_create+0x4cc/0xa90
[ 551.960033] ? ksys_write+0x1a3/0x240
[ 551.960045] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 551.960062] ? irqentry_exit+0xee/0x650
[ 551.960073] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 551.960089] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 551.960108] do_syscall_64+0xbf/0x420
[ 551.960123] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 551.960136] RIP: 0033:0x7f591fd23b19
[ 551.960145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 551.960156] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 551.960168] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f591fd23b19
[ 551.960175] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f591fd7d0fb
[ 551.960183] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 551.960190] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 551.960197] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 551.960212]
[ 551.975141] FAT-fs (loop6): unable to read boot sector
[ 552.042439] FAULT_INJECTION: forcing a failure.
[ 552.042439] name failslab, interval 1, probability 0, space 0, times 0
[ 552.043415] CPU: 1 UID: 0 PID: 6663 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 552.043431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 552.043439] Call Trace:
[ 552.043444]
[ 552.043449] dump_stack_lvl+0xfa/0x120
[ 552.043472] should_fail_ex+0x4d7/0x5e0
[ 552.043499] ? alloc_inode+0x181/0x250
[ 552.043516] should_failslab+0xc2/0x120
[ 552.043532] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 552.043550] ? stashed_dentry_get+0x26/0x2c0
[ 552.043567] ? find_held_lock+0x2b/0x80
[ 552.043589] ? stashed_dentry_get+0x10c/0x2c0
[ 552.043611] ? alloc_inode+0x181/0x250
[ 552.043627] alloc_inode+0x181/0x250
[ 552.043646] path_from_stashed+0x1b2/0x660
[ 552.043661] ? do_raw_spin_unlock+0x53/0x220
[ 552.043689] ns_get_path+0x64/0x90
[ 552.043712] proc_ns_get_link+0x10e/0x210
[ 552.043732] ? __pfx_proc_ns_get_link+0x10/0x10
[ 552.043749] ? try_to_unlazy+0x2d5/0x8f0
[ 552.043780] pick_link+0xc98/0x1320
[ 552.043800] ? __pfx_proc_ns_get_link+0x10/0x10
[ 552.043826] step_into_slowpath+0x972/0xec0
[ 552.043843] ? find_held_lock+0x2b/0x80
[ 552.043871] ? __pfx_step_into_slowpath+0x10/0x10
[ 552.043893] ? pid_revalidate+0x16e/0x2c0
[ 552.043920] ? lookup_fast+0x14f/0x5e0
[ 552.043947] path_openat+0xa6a/0x2d60
[ 552.043975] ? perf_trace_run_bpf_submit+0xef/0x180
[ 552.043997] ? __pfx_path_openat+0x10/0x10
[ 552.044011] ? perf_trace_run_bpf_submit+0xef/0x180
[ 552.044025] ? perf_trace_run_bpf_submit+0xef/0x180
[ 552.044053] do_file_open+0x209/0x460
[ 552.044068] ? __pfx_do_file_open+0x10/0x10
[ 552.044107] ? lock_release+0xc8/0x270
[ 552.044133] ? alloc_fd+0x2c1/0x560
[ 552.044162] do_sys_openat2+0xe7/0x210
[ 552.044180] ? __pfx_do_sys_openat2+0x10/0x10
[ 552.044202] ? __fget_files+0x20d/0x3b0
[ 552.044228] __x64_sys_openat+0x142/0x200
[ 552.044246] ? __pfx___x64_sys_openat+0x10/0x10
[ 552.044262] ? ksys_write+0x1a3/0x240
[ 552.044276] ? irqentry_exit+0xee/0x650
[ 552.044289] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 552.044305] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 552.044333] do_syscall_64+0xbf/0x420
[ 552.044352] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 552.044366] RIP: 0033:0x7f11d849aa04
[ 552.044377] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 552.044388] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 552.044400] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 552.044408] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 552.044416] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 552.044423] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 552.044430] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 552.044462]
07:35:04 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 40)
07:35:04 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 4)
07:35:04 executing program 7:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:04 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:04 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 3)
07:35:04 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:04 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 5)
07:35:04 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, 0x0)
[ 560.473364] FAULT_INJECTION: forcing a failure.
[ 560.473364] name failslab, interval 1, probability 0, space 0, times 0
[ 560.474469] CPU: 1 UID: 0 PID: 6673 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 560.474487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 560.474495] Call Trace:
[ 560.474500]
[ 560.474505] dump_stack_lvl+0xfa/0x120
[ 560.474527] should_fail_ex+0x4d7/0x5e0
[ 560.474551] ? shmem_alloc_inode+0x27/0x50
[ 560.474565] should_failslab+0xc2/0x120
[ 560.474581] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 560.474607] ? shmem_alloc_inode+0x27/0x50
[ 560.474620] shmem_alloc_inode+0x27/0x50
[ 560.474632] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 560.474644] alloc_inode+0x67/0x250
[ 560.474663] new_inode+0x1e/0x160
[ 560.474682] __shmem_get_inode+0x17c/0xe80
[ 560.474702] __shmem_file_setup+0x108/0x370
[ 560.474720] __do_sys_memfd_create+0x4cc/0xa90
[ 560.474742] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 560.474761] ? irqentry_exit+0xee/0x650
[ 560.474774] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 560.474792] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 560.474814] do_syscall_64+0xbf/0x420
[ 560.474831] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 560.474846] RIP: 0033:0x7f775d7e3b19
[ 560.474857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 560.474869] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 560.474883] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e3b19
[ 560.474891] RDX: 00007f775ad59000 RSI: 0000000000000000 RDI: 00007f775d83d0fb
[ 560.474904] RBP: 0000000000000000 R08: 00007f775ad58ff8 R09: ffffffffffffffff
[ 560.474912] R10: 00007f775ad58ffc R11: 0000000000000246 R12: 0000000020000000
[ 560.474921] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 560.474938]
[ 560.498830] FAULT_INJECTION: forcing a failure.
[ 560.498830] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 560.500901] CPU: 0 UID: 0 PID: 6675 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 560.500941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 560.500957] Call Trace:
[ 560.500966]
[ 560.500975] dump_stack_lvl+0xfa/0x120
[ 560.501011] should_fail_ex+0x4d7/0x5e0
[ 560.501058] strncpy_from_user+0x3b/0x2f0
[ 560.501096] __do_sys_memfd_create+0x21e/0xa90
[ 560.501155] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 560.501192] ? irqentry_exit+0xee/0x650
[ 560.501217] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 560.501251] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 560.501294] do_syscall_64+0xbf/0x420
[ 560.501326] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 560.501353] RIP: 0033:0x7fe78a917b19
[ 560.501373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 560.501398] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 560.501423] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a917b19
[ 560.501440] RDX: 00007fe787e8d000 RSI: 0000000000000000 RDI: 00007fe78a9710fb
[ 560.501456] RBP: 0000000000000000 R08: 00007fe787e8cff8 R09: ffffffffffffffff
[ 560.501472] R10: 00007fe787e8cffc R11: 0000000000000246 R12: 0000000020000000
[ 560.501489] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 560.501523]
[ 560.510754] FAT-fs (loop7): unable to read boot sector
[ 560.527488] FAT-fs (loop2): unable to read boot sector
[ 560.558344] No source specified
07:35:04 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 41)
07:35:04 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 6)
07:35:04 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 5)
07:35:04 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 560.636358] FAULT_INJECTION: forcing a failure.
[ 560.636358] name failslab, interval 1, probability 0, space 0, times 0
[ 560.637619] FAULT_INJECTION: forcing a failure.
[ 560.637619] name failslab, interval 1, probability 0, space 0, times 0
[ 560.638573] CPU: 1 UID: 0 PID: 6691 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 560.638589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 560.638596] Call Trace:
[ 560.638602]
[ 560.638607] dump_stack_lvl+0xfa/0x120
[ 560.638630] should_fail_ex+0x4d7/0x5e0
[ 560.638659] ? security_inode_alloc+0x3e/0x130
[ 560.638679] should_failslab+0xc2/0x120
[ 560.638696] kmem_cache_alloc_noprof+0x80/0x760
[ 560.638716] ? __pfx_map_id_range_down+0x10/0x10
[ 560.638748] ? security_inode_alloc+0x3e/0x130
[ 560.638768] security_inode_alloc+0x3e/0x130
[ 560.638791] inode_init_always_gfp+0xc9d/0xff0
[ 560.638816] alloc_inode+0x8d/0x250
[ 560.638836] path_from_stashed+0x1b2/0x660
[ 560.638852] ? do_raw_spin_unlock+0x53/0x220
[ 560.638882] ns_get_path+0x64/0x90
[ 560.638910] proc_ns_get_link+0x10e/0x210
[ 560.638931] ? __pfx_proc_ns_get_link+0x10/0x10
[ 560.638965] pick_link+0xc98/0x1320
[ 560.638986] ? __pfx_proc_ns_get_link+0x10/0x10
[ 560.639013] step_into_slowpath+0x972/0xec0
[ 560.639031] ? find_held_lock+0x2b/0x80
[ 560.639061] ? __pfx_step_into_slowpath+0x10/0x10
[ 560.639085] ? pid_revalidate+0x16e/0x2c0
[ 560.639108] ? lookup_fast+0x14f/0x5e0
[ 560.639136] path_openat+0xa6a/0x2d60
[ 560.639165] ? perf_trace_run_bpf_submit+0xef/0x180
[ 560.639187] ? __pfx_path_openat+0x10/0x10
[ 560.639202] ? perf_trace_run_bpf_submit+0xef/0x180
[ 560.639216] ? perf_trace_run_bpf_submit+0xef/0x180
[ 560.639246] do_file_open+0x209/0x460
[ 560.639261] ? __pfx_do_file_open+0x10/0x10
[ 560.639302] ? lock_release+0xc8/0x270
[ 560.639329] ? alloc_fd+0x2c1/0x560
[ 560.639360] do_sys_openat2+0xe7/0x210
[ 560.639379] ? __pfx_do_sys_openat2+0x10/0x10
[ 560.639407] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 560.639434] __x64_sys_openat+0x142/0x200
[ 560.639453] ? __pfx___x64_sys_openat+0x10/0x10
[ 560.639493] do_syscall_64+0xbf/0x420
[ 560.639512] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 560.639526] RIP: 0033:0x7f11d849aa04
[ 560.639538] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 560.639549] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 560.639561] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 560.639569] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 560.639576] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 560.639584] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 560.639591] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 560.639624]
[ 560.667475] CPU: 1 UID: 0 PID: 6693 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 560.667492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 560.667498] Call Trace:
[ 560.667502]
[ 560.667506] dump_stack_lvl+0xfa/0x120
[ 560.667521] should_fail_ex+0x4d7/0x5e0
[ 560.667542] ? security_inode_alloc+0x3e/0x130
[ 560.667560] should_failslab+0xc2/0x120
[ 560.667573] kmem_cache_alloc_noprof+0x80/0x760
[ 560.667590] ? __pfx_map_id_range_down+0x10/0x10
[ 560.667606] ? __create_object+0x59/0x80
[ 560.667626] ? security_inode_alloc+0x3e/0x130
[ 560.667645] security_inode_alloc+0x3e/0x130
[ 560.667665] inode_init_always_gfp+0xc9d/0xff0
[ 560.667680] alloc_inode+0x8d/0x250
[ 560.667697] new_inode+0x1e/0x160
[ 560.667715] __shmem_get_inode+0x17c/0xe80
[ 560.667733] __shmem_file_setup+0x108/0x370
[ 560.667749] __do_sys_memfd_create+0x4cc/0xa90
[ 560.667768] ? ksys_write+0x1a3/0x240
[ 560.667780] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 560.667798] ? irqentry_exit+0xee/0x650
[ 560.667809] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 560.667824] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 560.667844] do_syscall_64+0xbf/0x420
[ 560.667858] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 560.667870] RIP: 0033:0x7f591fd23b19
[ 560.667879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 560.667890] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 560.667906] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f591fd23b19
[ 560.667914] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f591fd7d0fb
[ 560.667921] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 560.667928] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 560.667935] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 560.667952]
07:35:04 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 560.687206] FAT-fs (loop5): unable to read boot sector
07:35:04 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 4)
07:35:04 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:04 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 6)
07:35:04 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, 0x0)
07:35:04 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 7)
[ 560.772763] FAULT_INJECTION: forcing a failure.
[ 560.772763] name failslab, interval 1, probability 0, space 0, times 0
[ 560.775953] CPU: 1 UID: 0 PID: 6699 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 560.775970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 560.775977] Call Trace:
[ 560.775981]
[ 560.775986] dump_stack_lvl+0xfa/0x120
[ 560.776006] should_fail_ex+0x4d7/0x5e0
[ 560.776028] ? security_inode_alloc+0x3e/0x130
[ 560.776046] should_failslab+0xc2/0x120
[ 560.776060] kmem_cache_alloc_noprof+0x80/0x760
[ 560.776077] ? __pfx_map_id_range_down+0x10/0x10
[ 560.776094] ? __create_object+0x59/0x80
[ 560.776112] ? security_inode_alloc+0x3e/0x130
[ 560.776130] security_inode_alloc+0x3e/0x130
[ 560.776148] inode_init_always_gfp+0xc9d/0xff0
[ 560.776165] alloc_inode+0x8d/0x250
[ 560.776182] new_inode+0x1e/0x160
[ 560.776198] __shmem_get_inode+0x17c/0xe80
[ 560.776216] __shmem_file_setup+0x108/0x370
[ 560.776231] __do_sys_memfd_create+0x4cc/0xa90
[ 560.776249] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 560.776266] ? irqentry_exit+0xee/0x650
[ 560.776277] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 560.776292] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 560.776313] do_syscall_64+0xbf/0x420
[ 560.776327] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 560.776340] RIP: 0033:0x7f775d7e3b19
[ 560.776349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 560.776360] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 560.776372] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e3b19
[ 560.776380] RDX: 00007f775ad59000 RSI: 0000000000000000 RDI: 00007f775d83d0fb
[ 560.776387] RBP: 0000000000000000 R08: 00007f775ad58ff8 R09: ffffffffffffffff
[ 560.776394] R10: 00007f775ad58ffc R11: 0000000000000246 R12: 0000000020000000
[ 560.776401] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 560.776416]
[ 560.777952] FAULT_INJECTION: forcing a failure.
[ 560.777952] name failslab, interval 1, probability 0, space 0, times 0
[ 560.808562] FAT-fs (loop7): unable to read boot sector
07:35:04 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 7)
[ 560.821489] No source specified
[ 560.822741] FAT-fs (loop2): unable to read boot sector
[ 560.823958] CPU: 0 UID: 0 PID: 6700 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 560.823991] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 560.824005] Call Trace:
[ 560.824013]
[ 560.824022] dump_stack_lvl+0xfa/0x120
[ 560.824054] should_fail_ex+0x4d7/0x5e0
[ 560.824095] ? shmem_alloc_inode+0x27/0x50
[ 560.824118] should_failslab+0xc2/0x120
[ 560.824143] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 560.824188] ? shmem_alloc_inode+0x27/0x50
[ 560.824210] shmem_alloc_inode+0x27/0x50
[ 560.824231] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 560.824252] alloc_inode+0x67/0x250
[ 560.824284] new_inode+0x1e/0x160
[ 560.824317] __shmem_get_inode+0x17c/0xe80
[ 560.824349] __shmem_file_setup+0x108/0x370
[ 560.824379] __do_sys_memfd_create+0x4cc/0xa90
[ 560.824418] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 560.824451] ? irqentry_exit+0xee/0x650
[ 560.824471] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 560.824501] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 560.824540] do_syscall_64+0xbf/0x420
[ 560.824569] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 560.824594] RIP: 0033:0x7fe78a917b19
[ 560.824613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 560.824634] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 560.824657] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a917b19
[ 560.824672] RDX: 00007fe787e8d000 RSI: 0000000000000000 RDI: 00007fe78a9710fb
[ 560.824686] RBP: 0000000000000000 R08: 00007fe787e8cff8 R09: ffffffffffffffff
[ 560.824701] R10: 00007fe787e8cffc R11: 0000000000000246 R12: 0000000020000000
[ 560.824715] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 560.824744]
[ 560.879723] FAT-fs (loop5): unable to read boot sector
07:35:13 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 42)
07:35:13 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 5)
07:35:13 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:13 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 8)
07:35:13 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:13 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:13 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:13 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 8)
[ 569.568640] FAULT_INJECTION: forcing a failure.
[ 569.568640] name failslab, interval 1, probability 0, space 0, times 0
[ 569.573343] FAT-fs (loop7): unable to read boot sector
[ 569.574305] CPU: 1 UID: 0 PID: 6725 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 569.574322] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 569.574330] Call Trace:
[ 569.574335]
[ 569.574339] dump_stack_lvl+0xfa/0x120
[ 569.574360] should_fail_ex+0x4d7/0x5e0
[ 569.574383] ? __d_alloc+0x34/0x9c0
[ 569.574397] should_failslab+0xc2/0x120
[ 569.574413] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 569.574435] ? find_held_lock+0x2b/0x80
[ 569.574461] ? __d_alloc+0x34/0x9c0
[ 569.574473] __d_alloc+0x34/0x9c0
[ 569.574485] ? mpol_shared_policy_init+0x24f/0x390
[ 569.574508] d_alloc_pseudo+0x1d/0xc0
[ 569.574525] alloc_file_pseudo+0xbe/0x220
[ 569.574543] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 569.574558] ? __shmem_get_inode+0x684/0xe80
[ 569.574576] __shmem_file_setup+0x1a8/0x370
[ 569.574592] __do_sys_memfd_create+0x4cc/0xa90
[ 569.574613] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 569.574630] ? irqentry_exit+0xee/0x650
[ 569.574641] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 569.574657] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 569.574677] do_syscall_64+0xbf/0x420
[ 569.574692] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 569.574705] RIP: 0033:0x7f775d7e3b19
[ 569.574715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 569.574726] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 569.574738] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e3b19
[ 569.574746] RDX: 00007f775ad59000 RSI: 0000000000000000 RDI: 00007f775d83d0fb
[ 569.574754] RBP: 0000000000000000 R08: 00007f775ad58ff8 R09: ffffffffffffffff
[ 569.574761] R10: 00007f775ad58ffc R11: 0000000000000246 R12: 0000000020000000
[ 569.574769] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 569.574786]
[ 569.590636] FAT-fs (loop4): unable to read boot sector
[ 569.590801] FAULT_INJECTION: forcing a failure.
[ 569.590801] name failslab, interval 1, probability 0, space 0, times 0
[ 569.598803] No source specified
07:35:13 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 6)
[ 569.609045] CPU: 0 UID: 0 PID: 6730 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 569.609081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 569.609094] Call Trace:
[ 569.609102]
[ 569.609111] dump_stack_lvl+0xfa/0x120
[ 569.609145] should_fail_ex+0x4d7/0x5e0
[ 569.609189] ? __d_alloc+0x34/0x9c0
[ 569.609228] should_failslab+0xc2/0x120
[ 569.609256] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 569.609294] ? find_held_lock+0x2b/0x80
[ 569.609344] ? __d_alloc+0x34/0x9c0
[ 569.609370] __d_alloc+0x34/0x9c0
[ 569.609396] ? mpol_shared_policy_init+0x24f/0x390
[ 569.609442] d_alloc_pseudo+0x1d/0xc0
[ 569.609479] alloc_file_pseudo+0xbe/0x220
[ 569.609514] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 569.609546] ? __shmem_get_inode+0x684/0xe80
[ 569.609583] __shmem_file_setup+0x1a8/0x370
[ 569.609617] __do_sys_memfd_create+0x4cc/0xa90
[ 569.609659] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 569.609695] ? irqentry_exit+0xee/0x650
[ 569.609718] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 569.609750] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 569.609791] do_syscall_64+0xbf/0x420
[ 569.609821] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 569.609847] RIP: 0033:0x7f591fd23b19
[ 569.609867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 569.609890] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 569.609921] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f591fd23b19
[ 569.609938] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f591fd7d0fb
[ 569.609953] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 569.609968] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 569.609983] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 569.610022]
07:35:13 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 569.638984] FAT-fs (loop0): unable to read boot sector
[ 569.687762] FAULT_INJECTION: forcing a failure.
[ 569.687762] name failslab, interval 1, probability 0, space 0, times 0
[ 569.692006] CPU: 1 UID: 0 PID: 6735 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 569.692031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 569.692042] Call Trace:
[ 569.692049]
[ 569.692056] dump_stack_lvl+0xfa/0x120
[ 569.692084] should_fail_ex+0x4d7/0x5e0
[ 569.692116] ? security_inode_alloc+0x3e/0x130
[ 569.692144] should_failslab+0xc2/0x120
[ 569.692165] kmem_cache_alloc_noprof+0x80/0x760
[ 569.692190] ? __pfx_map_id_range_down+0x10/0x10
[ 569.692216] ? __create_object+0x59/0x80
[ 569.692243] ? security_inode_alloc+0x3e/0x130
[ 569.692270] security_inode_alloc+0x3e/0x130
[ 569.692299] inode_init_always_gfp+0xc9d/0xff0
[ 569.692323] alloc_inode+0x8d/0x250
[ 569.692347] new_inode+0x1e/0x160
[ 569.692372] __shmem_get_inode+0x17c/0xe80
[ 569.692398] __shmem_file_setup+0x108/0x370
[ 569.692421] __do_sys_memfd_create+0x4cc/0xa90
[ 569.692448] ? ksys_write+0x1a3/0x240
[ 569.692465] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 569.692491] ? irqentry_exit+0xee/0x650
[ 569.692507] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 569.692530] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 569.692560] do_syscall_64+0xbf/0x420
[ 569.692581] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 569.692600] RIP: 0033:0x7fe78a917b19
[ 569.692614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 569.692630] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 569.692648] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a917b19
[ 569.692660] RDX: 00007fe787e8d000 RSI: 0000000000000000 RDI: 00007fe78a9710fb
[ 569.692671] RBP: 0000000000000000 R08: 00007fe787e8cff8 R09: ffffffffffffffff
[ 569.692682] R10: 00007fe787e8cffc R11: 0000000000000246 R12: 0000000020000000
[ 569.692692] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 569.692715]
[ 569.738808] FAT-fs (loop7): unable to read boot sector
07:35:22 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 9)
07:35:22 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 9)
07:35:22 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 7)
07:35:22 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:22 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 43)
07:35:22 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:22 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:22 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 1)
[ 579.194633] FAT-fs (loop2): unable to read boot sector
[ 579.195834] FAT-fs (loop7): unable to read boot sector
[ 579.197274] FAULT_INJECTION: forcing a failure.
[ 579.197274] name failslab, interval 1, probability 0, space 0, times 0
[ 579.199325] CPU: 1 UID: 0 PID: 6751 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 579.199341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 579.199349] Call Trace:
[ 579.199354]
[ 579.199360] dump_stack_lvl+0xfa/0x120
[ 579.199383] should_fail_ex+0x4d7/0x5e0
[ 579.199411] ? __d_alloc+0x34/0x9c0
[ 579.199426] should_failslab+0xc2/0x120
[ 579.199443] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 579.199463] ? inode_set_ctime_current+0x251/0x740
[ 579.199493] ? __d_alloc+0x34/0x9c0
[ 579.199507] __d_alloc+0x34/0x9c0
[ 579.199520] ? __ns_ref_active_get+0x79/0x160
[ 579.199545] path_from_stashed+0x373/0x660
[ 579.199561] ? do_raw_spin_unlock+0x53/0x220
[ 579.199590] ns_get_path+0x64/0x90
[ 579.199614] proc_ns_get_link+0x10e/0x210
[ 579.199634] ? __pfx_proc_ns_get_link+0x10/0x10
[ 579.199652] ? try_to_unlazy+0x2d5/0x8f0
[ 579.199683] pick_link+0xc98/0x1320
[ 579.199703] ? __pfx_proc_ns_get_link+0x10/0x10
[ 579.199729] step_into_slowpath+0x972/0xec0
[ 579.199746] ? find_held_lock+0x2b/0x80
[ 579.199776] ? __pfx_step_into_slowpath+0x10/0x10
[ 579.199798] ? pid_revalidate+0x16e/0x2c0
[ 579.199820] ? lookup_fast+0x14f/0x5e0
[ 579.199847] path_openat+0xa6a/0x2d60
[ 579.199875] ? perf_trace_run_bpf_submit+0xef/0x180
[ 579.199897] ? __pfx_path_openat+0x10/0x10
[ 579.199916] ? perf_trace_run_bpf_submit+0xef/0x180
[ 579.199930] ? perf_trace_run_bpf_submit+0xef/0x180
[ 579.199959] do_file_open+0x209/0x460
[ 579.199973] ? __pfx_do_file_open+0x10/0x10
[ 579.200013] ? lock_release+0xc8/0x270
[ 579.200039] ? alloc_fd+0x2c1/0x560
[ 579.200069] do_sys_openat2+0xe7/0x210
[ 579.200088] ? __pfx_do_sys_openat2+0x10/0x10
[ 579.200110] ? __fget_files+0x20d/0x3b0
[ 579.200135] __x64_sys_openat+0x142/0x200
[ 579.200153] ? __pfx___x64_sys_openat+0x10/0x10
[ 579.200169] ? ksys_write+0x1a3/0x240
[ 579.200184] ? irqentry_exit+0xee/0x650
[ 579.200196] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 579.200213] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 579.200241] do_syscall_64+0xbf/0x420
[ 579.200259] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 579.200273] RIP: 0033:0x7f11d849aa04
[ 579.200284] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 579.200295] RSP: 002b:00007f11d5a5d060 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 579.200306] RAX: ffffffffffffffda RBX: 00007f11d85faf60 RCX: 00007f11d849aa04
[ 579.200314] RDX: 0000000000000000 RSI: 00007f11d5a5d0f0 RDI: 00000000ffffff9c
[ 579.200322] RBP: 00007f11d5a5d0f0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 579.200329] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
[ 579.200336] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 579.200368]
[ 579.241355] FAT-fs (loop4): unable to read boot sector
[ 579.241718] FAULT_INJECTION: forcing a failure.
[ 579.241718] name failslab, interval 1, probability 0, space 0, times 0
[ 579.246884] CPU: 1 UID: 0 PID: 6758 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 579.246905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 579.246912] Call Trace:
[ 579.246916]
[ 579.246920] dump_stack_lvl+0xfa/0x120
[ 579.246940] should_fail_ex+0x4d7/0x5e0
[ 579.246961] ? do_getname+0x2b/0x3d0
[ 579.246975] should_failslab+0xc2/0x120
[ 579.246988] kmem_cache_alloc_noprof+0x80/0x760
[ 579.247005] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 579.247025] ? do_getname+0x2b/0x3d0
[ 579.247039] do_getname+0x2b/0x3d0
[ 579.247056] __x64_sys_mkdir+0x5a/0xd0
[ 579.247069] do_syscall_64+0xbf/0x420
[ 579.247083] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 579.247095] RIP: 0033:0x7f1e78939c27
[ 579.247104] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 579.247116] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 579.247127] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 579.247135] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 579.247142] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 579.247149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 579.247156] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 579.247173]
07:35:23 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 10)
07:35:23 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 579.283435] FAT-fs (loop5): unable to read boot sector
[ 579.286367] FAT-fs (loop0): unable to read boot sector
07:35:23 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 579.302242] FAULT_INJECTION: forcing a failure.
[ 579.302242] name failslab, interval 1, probability 0, space 0, times 0
[ 579.303172] CPU: 1 UID: 0 PID: 6762 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 579.303187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 579.303193] Call Trace:
[ 579.303197]
[ 579.303202] dump_stack_lvl+0xfa/0x120
[ 579.303218] should_fail_ex+0x4d7/0x5e0
[ 579.303239] ? alloc_empty_file+0x58/0x1e0
[ 579.303254] should_failslab+0xc2/0x120
[ 579.303267] kmem_cache_alloc_noprof+0x80/0x760
[ 579.303284] ? d_instantiate+0x92/0xb0
[ 579.303302] ? alloc_empty_file+0x58/0x1e0
[ 579.303316] ? _raw_spin_unlock+0x1e/0x40
[ 579.303332] alloc_empty_file+0x58/0x1e0
[ 579.303348] alloc_file_pseudo+0x12b/0x220
[ 579.303364] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 579.303385] __shmem_file_setup+0x1a8/0x370
[ 579.303403] __do_sys_memfd_create+0x4cc/0xa90
[ 579.303422] ? ksys_write+0x1a3/0x240
[ 579.303433] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 579.303449] ? irqentry_exit+0xee/0x650
[ 579.303460] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 579.303475] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 579.303496] do_syscall_64+0xbf/0x420
[ 579.303510] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 579.303523] RIP: 0033:0x7f591fd23b19
[ 579.303532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 579.303543] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 579.303555] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f591fd23b19
[ 579.303563] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f591fd7d0fb
[ 579.303570] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 579.303577] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 579.303583] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 579.303601]
[ 579.333617] FAT-fs (loop7): unable to read boot sector
07:35:23 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 2)
07:35:23 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 8)
07:35:23 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 579.374373] FAULT_INJECTION: forcing a failure.
[ 579.374373] name failslab, interval 1, probability 0, space 0, times 0
[ 579.388051] CPU: 1 UID: 0 PID: 6769 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 579.388068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 579.388076] Call Trace:
[ 579.388080]
[ 579.388084] dump_stack_lvl+0xfa/0x120
[ 579.388103] should_fail_ex+0x4d7/0x5e0
[ 579.388123] ? __d_alloc+0x34/0x9c0
[ 579.388137] should_failslab+0xc2/0x120
[ 579.388151] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 579.388168] ? find_held_lock+0x2b/0x80
[ 579.388192] ? __d_alloc+0x34/0x9c0
[ 579.388204] __d_alloc+0x34/0x9c0
[ 579.388216] ? mpol_shared_policy_init+0x24f/0x390
[ 579.388238] d_alloc_pseudo+0x1d/0xc0
[ 579.388255] alloc_file_pseudo+0xbe/0x220
[ 579.388271] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 579.388286] ? __shmem_get_inode+0x684/0xe80
[ 579.388303] __shmem_file_setup+0x1a8/0x370
[ 579.388318] __do_sys_memfd_create+0x4cc/0xa90
[ 579.388339] ? ksys_write+0x1a3/0x240
[ 579.388351] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 579.388368] ? irqentry_exit+0xee/0x650
[ 579.388380] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 579.388396] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 579.388416] do_syscall_64+0xbf/0x420
[ 579.388430] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 579.388443] RIP: 0033:0x7fe78a917b19
[ 579.388452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 579.388463] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 579.388476] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a917b19
[ 579.388484] RDX: 00007fe787e8d000 RSI: 0000000000000000 RDI: 00007fe78a9710fb
[ 579.388491] RBP: 0000000000000000 R08: 00007fe787e8cff8 R09: ffffffffffffffff
[ 579.388498] R10: 00007fe787e8cffc R11: 0000000000000246 R12: 0000000020000000
[ 579.388506] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 579.388521]
07:35:23 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 10)
07:35:23 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 579.427425] No source specified
07:35:23 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 44)
07:35:23 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 11)
[ 579.491508] FAT-fs (loop0): unable to read boot sector
[ 579.511104] FAT-fs (loop7): unable to read boot sector
[ 579.526329] FAULT_INJECTION: forcing a failure.
[ 579.526329] name failslab, interval 1, probability 0, space 0, times 0
[ 579.527264] CPU: 1 UID: 0 PID: 6779 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 579.527290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 579.527297] Call Trace:
[ 579.527302]
[ 579.527306] dump_stack_lvl+0xfa/0x120
[ 579.527327] should_fail_ex+0x4d7/0x5e0
[ 579.527349] ? alloc_empty_file+0x58/0x1e0
[ 579.527365] should_failslab+0xc2/0x120
[ 579.527380] kmem_cache_alloc_noprof+0x80/0x760
[ 579.527398] ? d_instantiate+0x92/0xb0
[ 579.527416] ? alloc_empty_file+0x58/0x1e0
[ 579.527430] ? _raw_spin_unlock+0x1e/0x40
[ 579.527447] alloc_empty_file+0x58/0x1e0
[ 579.527462] alloc_file_pseudo+0x12b/0x220
[ 579.527478] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 579.527497] __shmem_file_setup+0x1a8/0x370
[ 579.527514] __do_sys_memfd_create+0x4cc/0xa90
[ 579.527534] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 579.527550] ? irqentry_exit+0xee/0x650
[ 579.527561] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 579.527577] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 579.527597] do_syscall_64+0xbf/0x420
[ 579.527612] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 579.527625] RIP: 0033:0x7f775d7e3b19
[ 579.527634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 579.527645] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 579.527657] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e3b19
[ 579.527665] RDX: 00007f775ad59000 RSI: 0000000000000000 RDI: 00007f775d83d0fb
[ 579.527673] RBP: 0000000000000000 R08: 00007f775ad58ff8 R09: ffffffffffffffff
[ 579.527680] R10: 00007f775ad58ffc R11: 0000000000000246 R12: 0000000020000000
[ 579.527687] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 579.527703]
[ 579.540469] FAT-fs (loop2): unable to read boot sector
07:35:32 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 3)
07:35:32 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:32 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:32 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 9)
07:35:32 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') (fail_nth: 45)
07:35:32 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 11)
07:35:32 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 12)
07:35:32 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 588.349094] FAULT_INJECTION: forcing a failure.
[ 588.349094] name failslab, interval 1, probability 0, space 0, times 0
[ 588.350937] CPU: 0 UID: 0 PID: 6791 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.350967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.350979] Call Trace:
[ 588.350987]
[ 588.350995] dump_stack_lvl+0xfa/0x120
[ 588.351027] should_fail_ex+0x4d7/0x5e0
[ 588.351066] ? security_file_alloc+0x35/0x130
[ 588.351090] should_failslab+0xc2/0x120
[ 588.351115] kmem_cache_alloc_noprof+0x80/0x760
[ 588.351145] ? __create_object+0x59/0x80
[ 588.351181] ? security_file_alloc+0x35/0x130
[ 588.351202] security_file_alloc+0x35/0x130
[ 588.351226] init_file+0x95/0x480
[ 588.351253] alloc_empty_file+0x76/0x1e0
[ 588.351282] alloc_file_pseudo+0x12b/0x220
[ 588.351311] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 588.351347] __shmem_file_setup+0x1a8/0x370
[ 588.351377] __do_sys_memfd_create+0x4cc/0xa90
[ 588.351412] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 588.351443] ? irqentry_exit+0xee/0x650
[ 588.351463] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 588.351491] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 588.351527] do_syscall_64+0xbf/0x420
[ 588.351553] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.351576] RIP: 0033:0x7f591fd23b19
[ 588.351594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 588.351614] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 588.351635] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f591fd23b19
[ 588.351649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f591fd7d0fb
[ 588.351662] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 588.351675] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 588.351688] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 588.351716]
07:35:32 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 13)
[ 588.453242] FAT-fs (loop0): unable to read boot sector
[ 588.454478] FAT-fs (loop4): unable to read boot sector
[ 588.456150] FAULT_INJECTION: forcing a failure.
[ 588.456150] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 588.457279] CPU: 1 UID: 0 PID: 6806 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.457311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.457319] Call Trace:
[ 588.457324]
[ 588.457329] dump_stack_lvl+0xfa/0x120
[ 588.457351] should_fail_ex+0x4d7/0x5e0
[ 588.457377] strncpy_from_user+0x3b/0x2f0
[ 588.457398] do_getname+0x70/0x3d0
[ 588.457419] __x64_sys_mkdir+0x5a/0xd0
[ 588.457446] do_syscall_64+0xbf/0x420
[ 588.457464] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.457479] RIP: 0033:0x7f1e78939c27
[ 588.457490] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 588.457502] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 588.457516] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 588.457525] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 588.457533] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 588.457541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 588.457550] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 588.457569]
[ 588.468461] FAT-fs (loop5): unable to read boot sector
[ 588.472390] FAULT_INJECTION: forcing a failure.
[ 588.472390] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 588.479043] CPU: 1 UID: 0 PID: 6803 Comm: syz-executor.1 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.479063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.479071] Call Trace:
[ 588.479076]
[ 588.479082] dump_stack_lvl+0xfa/0x120
[ 588.479105] should_fail_ex+0x4d7/0x5e0
[ 588.479136] _copy_to_user+0x32/0xd0
[ 588.479166] simple_read_from_buffer+0xe0/0x180
[ 588.479196] proc_fail_nth_read+0x18a/0x240
[ 588.479221] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 588.479244] ? security_file_permission+0x22/0x90
[ 588.479265] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 588.479287] vfs_read+0x1eb/0xc70
[ 588.479315] ? __pfx___mutex_lock+0x10/0x10
[ 588.479330] ? __fget_files+0x34/0x3b0
[ 588.479347] ? __pfx_vfs_read+0x10/0x10
[ 588.479374] ? lock_release+0xc8/0x270
[ 588.479403] ? __fget_files+0x20d/0x3b0
[ 588.479438] ksys_read+0x121/0x240
[ 588.479453] ? __pfx_ksys_read+0x10/0x10
[ 588.479485] do_syscall_64+0xbf/0x420
[ 588.479506] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.479521] RIP: 0033:0x7f11d849a69c
[ 588.479534] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 588.479546] RSP: 002b:00007f11d5a5d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 588.479559] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f11d849a69c
[ 588.479568] RDX: 000000000000000f RSI: 00007f11d5a5d1e0 RDI: 0000000000000004
[ 588.479576] RBP: 00007f11d5a5d1d0 R08: 0000000000000000 R09: 00007f11d5a5cf70
[ 588.479584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 588.479591] R13: 00007ffc9d01547f R14: 00007f11d5a5d300 R15: 0000000000022000
[ 588.479629]
[ 588.525726] FAT-fs (loop2): unable to read boot sector
07:35:32 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 10)
07:35:32 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 4)
07:35:32 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:32 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 14)
07:35:32 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 12)
07:35:32 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:32 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 588.642368] No source specified
[ 588.643218] FAULT_INJECTION: forcing a failure.
[ 588.643218] name failslab, interval 1, probability 0, space 0, times 0
[ 588.646632] FAULT_INJECTION: forcing a failure.
[ 588.646632] name failslab, interval 1, probability 0, space 0, times 0
[ 588.647579] CPU: 1 UID: 0 PID: 6812 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.647595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.647603] Call Trace:
[ 588.647608]
[ 588.647613] dump_stack_lvl+0xfa/0x120
[ 588.647634] should_fail_ex+0x4d7/0x5e0
[ 588.647657] ? do_getname+0x2b/0x3d0
[ 588.647674] should_failslab+0xc2/0x120
[ 588.647689] kmem_cache_alloc_noprof+0x80/0x760
[ 588.647709] ? vfs_write+0x169/0x1150
[ 588.647723] ? do_getname+0x2b/0x3d0
[ 588.647738] do_getname+0x2b/0x3d0
[ 588.647754] do_sys_openat2+0xa0/0x210
[ 588.647771] ? __pfx_do_sys_openat2+0x10/0x10
[ 588.647794] __x64_sys_openat+0x142/0x200
[ 588.647811] ? __pfx___x64_sys_openat+0x10/0x10
[ 588.647834] do_syscall_64+0xbf/0x420
[ 588.647849] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.647863] RIP: 0033:0x7f591fcd6a04
[ 588.647873] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 588.647885] RSP: 002b:00007f591d298ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 588.647897] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fcd6a04
[ 588.647910] RDX: 0000000000000002 RSI: 00007f591d299000 RDI: 00000000ffffff9c
[ 588.647918] RBP: 00007f591d299000 R08: 0000000000000000 R09: ffffffffffffffff
[ 588.647926] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 588.647933] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 588.647949]
[ 588.661947] CPU: 1 UID: 0 PID: 6815 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.661964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.661971] Call Trace:
[ 588.661975]
[ 588.661980] dump_stack_lvl+0xfa/0x120
[ 588.661995] should_fail_ex+0x4d7/0x5e0
[ 588.662018] ? security_file_alloc+0x35/0x130
[ 588.662033] should_failslab+0xc2/0x120
[ 588.662049] kmem_cache_alloc_noprof+0x80/0x760
[ 588.662066] ? __create_object+0x59/0x80
[ 588.662086] ? security_file_alloc+0x35/0x130
[ 588.662098] security_file_alloc+0x35/0x130
[ 588.662112] init_file+0x95/0x480
[ 588.662127] alloc_empty_file+0x76/0x1e0
[ 588.662143] alloc_file_pseudo+0x12b/0x220
[ 588.662160] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 588.662180] __shmem_file_setup+0x1a8/0x370
[ 588.662198] __do_sys_memfd_create+0x4cc/0xa90
[ 588.662218] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 588.662236] ? irqentry_exit+0xee/0x650
[ 588.662248] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 588.662265] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 588.662287] do_syscall_64+0xbf/0x420
[ 588.662301] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.662313] RIP: 0033:0x7f775d7e3b19
[ 588.662322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 588.662333] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 588.662345] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e3b19
[ 588.662353] RDX: 00007f775ad59000 RSI: 0000000000000000 RDI: 00007f775d83d0fb
[ 588.662361] RBP: 0000000000000000 R08: 00007f775ad58ff8 R09: ffffffffffffffff
[ 588.662368] R10: 00007f775ad58ffc R11: 0000000000000246 R12: 0000000020000000
[ 588.662375] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 588.662391]
[ 588.690752] FAULT_INJECTION: forcing a failure.
[ 588.690752] name failslab, interval 1, probability 0, space 0, times 0
[ 588.694995] CPU: 1 UID: 0 PID: 6821 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.695012] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.695019] Call Trace:
[ 588.695023]
[ 588.695027] dump_stack_lvl+0xfa/0x120
[ 588.695045] should_fail_ex+0x4d7/0x5e0
[ 588.695066] ? __d_alloc+0x34/0x9c0
[ 588.695080] should_failslab+0xc2/0x120
[ 588.695096] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 588.695116] ? __d_lookup+0x255/0x490
[ 588.695138] ? __d_alloc+0x34/0x9c0
[ 588.695150] __d_alloc+0x34/0x9c0
[ 588.695166] d_alloc+0x4a/0x1e0
[ 588.695181] lookup_one_qstr_excl+0x174/0x270
[ 588.695197] ? mnt_want_write+0x153/0x420
[ 588.695217] filename_create+0x1c1/0x400
[ 588.695236] ? __pfx_filename_create+0x10/0x10
[ 588.695254] ? __virt_addr_valid+0x2e8/0x5d0
[ 588.695275] filename_mkdirat+0xa6/0x430
[ 588.695290] ? __pfx_filename_mkdirat+0x10/0x10
[ 588.695304] ? strncpy_from_user+0x21b/0x2f0
[ 588.695325] __x64_sys_mkdir+0x6e/0xd0
[ 588.695338] do_syscall_64+0xbf/0x420
[ 588.695353] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.695366] RIP: 0033:0x7f1e78939c27
[ 588.695375] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 588.695386] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 588.695398] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 588.695406] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 588.695413] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 588.695420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 588.695427] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 588.695443]
07:35:32 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 588.709218] FAULT_INJECTION: forcing a failure.
[ 588.709218] name failslab, interval 1, probability 0, space 0, times 0
07:35:32 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 588.717680] FAT-fs (loop0): unable to read boot sector
[ 588.722561] CPU: 0 UID: 0 PID: 6822 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.722591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.722603] Call Trace:
[ 588.722610]
[ 588.722618] dump_stack_lvl+0xfa/0x120
[ 588.722651] should_fail_ex+0x4d7/0x5e0
[ 588.722691] ? alloc_empty_file+0x58/0x1e0
[ 588.722719] should_failslab+0xc2/0x120
[ 588.722744] kmem_cache_alloc_noprof+0x80/0x760
[ 588.722777] ? d_instantiate+0x92/0xb0
[ 588.722810] ? alloc_empty_file+0x58/0x1e0
[ 588.722836] ? _raw_spin_unlock+0x1e/0x40
07:35:32 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 588.722867] alloc_empty_file+0x58/0x1e0
[ 588.722896] alloc_file_pseudo+0x12b/0x220
[ 588.722935] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 588.722972] __shmem_file_setup+0x1a8/0x370
[ 588.723002] __do_sys_memfd_create+0x4cc/0xa90
[ 588.723040] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 588.723072] ? irqentry_exit+0xee/0x650
[ 588.723092] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 588.723122] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 588.723159] do_syscall_64+0xbf/0x420
[ 588.723186] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.723209] RIP: 0033:0x7fe78a917b19
[ 588.723225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 588.723246] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 588.723267] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a917b19
[ 588.723281] RDX: 00007fe787e8d000 RSI: 0000000000000000 RDI: 00007fe78a9710fb
[ 588.723295] RBP: 0000000000000000 R08: 00007fe787e8cff8 R09: ffffffffffffffff
[ 588.723308] R10: 00007fe787e8cffc R11: 0000000000000246 R12: 0000000020000000
[ 588.723322] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 588.723350]
07:35:32 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 15)
07:35:32 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 13)
07:35:32 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 5)
[ 588.820623] No source specified
07:35:32 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 588.827937] FAT-fs (loop2): unable to read boot sector
[ 588.832141] FAT-fs (loop5): unable to read boot sector
07:35:32 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:35:32 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 16)
[ 588.885431] No source specified
[ 588.926087] FAT-fs (loop0): unable to read boot sector
[ 588.928722] FAULT_INJECTION: forcing a failure.
[ 588.928722] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 588.929721] CPU: 1 UID: 0 PID: 6841 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 588.929737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 588.929745] Call Trace:
[ 588.929749]
[ 588.929754] dump_stack_lvl+0xfa/0x120
[ 588.929774] should_fail_ex+0x4d7/0x5e0
[ 588.929797] strncpy_from_user+0x3b/0x2f0
[ 588.929815] do_getname+0x70/0x3d0
[ 588.929833] do_sys_openat2+0xa0/0x210
[ 588.929849] ? __pfx_do_sys_openat2+0x10/0x10
[ 588.929871] __x64_sys_openat+0x142/0x200
[ 588.929887] ? __pfx___x64_sys_openat+0x10/0x10
[ 588.929913] do_syscall_64+0xbf/0x420
[ 588.929928] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 588.929941] RIP: 0033:0x7f591fcd6a04
[ 588.929950] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 588.929962] RSP: 002b:00007f591d298ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 588.929973] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fcd6a04
[ 588.929981] RDX: 0000000000000002 RSI: 00007f591d299000 RDI: 00000000ffffff9c
[ 588.929989] RBP: 00007f591d299000 R08: 0000000000000000 R09: ffffffffffffffff
[ 588.929996] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 588.930003] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 588.930018]
[ 588.940600] No source specified
07:35:41 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x2298, 0x0, 0x0, 0x5, 0x1000000, 0x0, 0x321}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x15, 0x0, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x44042, 0x0)
07:35:41 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:35:41 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 6)
07:35:41 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 14)
07:35:41 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 11)
07:35:41 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:41 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 17)
07:35:41 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 597.873231] FAULT_INJECTION: forcing a failure.
[ 597.873231] name failslab, interval 1, probability 0, space 0, times 0
[ 597.883955] CPU: 1 UID: 0 PID: 6854 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 597.883972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 597.883980] Call Trace:
[ 597.883984]
[ 597.883989] dump_stack_lvl+0xfa/0x120
[ 597.884008] should_fail_ex+0x4d7/0x5e0
[ 597.884030] ? do_getname+0x2b/0x3d0
[ 597.884044] should_failslab+0xc2/0x120
[ 597.884058] kmem_cache_alloc_noprof+0x80/0x760
[ 597.884075] ? lock_release+0xc8/0x270
[ 597.884094] ? do_getname+0x2b/0x3d0
[ 597.884107] do_getname+0x2b/0x3d0
[ 597.884123] do_sys_openat2+0xa0/0x210
[ 597.884139] ? __pfx_do_sys_openat2+0x10/0x10
[ 597.884153] ? perf_trace_run_bpf_submit+0xef/0x180
[ 597.884170] ? perf_trace_preemptirq_template+0x259/0x430
[ 597.884188] __x64_sys_openat+0x142/0x200
[ 597.884203] ? __pfx___x64_sys_openat+0x10/0x10
[ 597.884220] ? fput+0x92/0xd0
[ 597.884237] do_syscall_64+0xbf/0x420
[ 597.884252] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 597.884265] RIP: 0033:0x7f775d796a04
[ 597.884274] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 597.884285] RSP: 002b:00007f775ad58ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 597.884297] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d796a04
[ 597.884305] RDX: 0000000000000002 RSI: 00007f775ad59000 RDI: 00000000ffffff9c
[ 597.884312] RBP: 00007f775ad59000 R08: 0000000000000000 R09: ffffffffffffffff
[ 597.884319] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 597.884326] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 597.884340]
[ 597.894553] FAULT_INJECTION: forcing a failure.
[ 597.894553] name failslab, interval 1, probability 0, space 0, times 0
[ 597.917768] FAULT_INJECTION: forcing a failure.
[ 597.917768] name failslab, interval 1, probability 0, space 0, times 0
[ 597.918674] CPU: 1 UID: 0 PID: 6862 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 597.918696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 597.918704] Call Trace:
[ 597.918708]
[ 597.918713] dump_stack_lvl+0xfa/0x120
[ 597.918730] should_fail_ex+0x4d7/0x5e0
[ 597.918751] ? ext4_alloc_inode+0x28/0x640
[ 597.918768] should_failslab+0xc2/0x120
[ 597.918782] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 597.918803] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 597.918820] ? ext4_alloc_inode+0x28/0x640
[ 597.918835] ext4_alloc_inode+0x28/0x640
[ 597.918851] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 597.918866] alloc_inode+0x67/0x250
[ 597.918883] new_inode+0x1e/0x160
[ 597.918904] __ext4_new_inode+0x35d/0x4cd0
[ 597.918923] ? avc_has_perm_noaudit+0x141/0x390
[ 597.918941] ? __pfx___ext4_new_inode+0x10/0x10
[ 597.918956] ? __pfx_avc_has_perm+0x10/0x10
[ 597.918969] ? __pfx___dquot_initialize+0x10/0x10
[ 597.918994] ext4_mkdir+0x331/0xb30
[ 597.919017] ? __pfx_ext4_mkdir+0x10/0x10
[ 597.919033] ? security_inode_permission+0x72/0xe0
[ 597.919049] vfs_mkdir+0x6d8/0xc00
[ 597.919069] filename_mkdirat+0x118/0x430
[ 597.919084] ? __pfx_filename_mkdirat+0x10/0x10
[ 597.919097] ? strncpy_from_user+0x21b/0x2f0
[ 597.919117] __x64_sys_mkdir+0x6e/0xd0
[ 597.919134] do_syscall_64+0xbf/0x420
[ 597.919153] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 597.919166] RIP: 0033:0x7f1e78939c27
[ 597.919175] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 597.919186] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 597.919197] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 597.919205] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 597.919212] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 597.919219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 597.919226] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 597.919241]
[ 597.924865] CPU: 0 UID: 0 PID: 6860 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 597.924896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 597.924917] Call Trace:
[ 597.924924]
[ 597.924932] dump_stack_lvl+0xfa/0x120
[ 597.924963] should_fail_ex+0x4d7/0x5e0
[ 597.925001] ? alloc_empty_file+0x58/0x1e0
[ 597.925027] should_failslab+0xc2/0x120
[ 597.925052] kmem_cache_alloc_noprof+0x80/0x760
[ 597.925082] ? __is_insn_slot_addr+0x136/0x290
[ 597.925107] ? lock_release+0xc8/0x270
[ 597.925138] ? alloc_empty_file+0x58/0x1e0
[ 597.925163] alloc_empty_file+0x58/0x1e0
[ 597.925191] path_openat+0xee/0x2d60
[ 597.925214] ? __kernel_text_address+0xd/0x40
[ 597.925242] ? unwind_get_return_address+0x59/0xa0
[ 597.925265] ? __pfx_stack_trace_consume_entry+0x10/0x10
07:35:41 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 597.925295] ? arch_stack_walk+0x9c/0xf0
[ 597.925325] ? perf_trace_run_bpf_submit+0xef/0x180
[ 597.925351] ? __pfx_path_openat+0x10/0x10
[ 597.925375] ? __lock_acquire+0x451/0x2250
[ 597.925409] do_file_open+0x209/0x460
[ 597.925431] ? __pfx_do_file_open+0x10/0x10
[ 597.925465] ? find_held_lock+0x2b/0x80
[ 597.925498] ? alloc_fd+0x2c1/0x560
[ 597.925519] ? lock_release+0xc8/0x270
[ 597.925563] ? _raw_spin_unlock+0x1e/0x40
[ 597.925593] ? alloc_fd+0x2c1/0x560
[ 597.925623] do_sys_openat2+0xe7/0x210
07:35:41 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 597.925650] ? __pfx_do_sys_openat2+0x10/0x10
[ 597.925677] ? perf_trace_run_bpf_submit+0xef/0x180
[ 597.925705] ? perf_trace_preemptirq_template+0x259/0x430
[ 597.925738] __x64_sys_openat+0x142/0x200
[ 597.925766] ? __pfx___x64_sys_openat+0x10/0x10
[ 597.925807] do_syscall_64+0xbf/0x420
[ 597.925833] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 597.925855] RIP: 0033:0x7f591fcd6a04
[ 597.925872] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 597.925893] RSP: 002b:00007f591d298ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 597.925914] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fcd6a04
[ 597.925928] RDX: 0000000000000002 RSI: 00007f591d299000 RDI: 00000000ffffff9c
[ 597.925941] RBP: 00007f591d299000 R08: 0000000000000000 R09: ffffffffffffffff
[ 597.925955] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 597.925967] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 597.925995]
[ 597.937045] FAT-fs (loop0): unable to read boot sector
[ 597.970492] FAT-fs (loop4): unable to read boot sector
07:35:41 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 15)
07:35:41 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 18)
[ 598.078550] FAT-fs (loop2): unable to read boot sector
[ 598.089048] FAT-fs (loop5): unable to read boot sector
07:35:49 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 16)
07:35:49 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9)
add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0)
07:35:49 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:35:49 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:49 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 12)
07:35:49 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 7)
07:35:49 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 19)
07:35:49 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 606.061957] FAULT_INJECTION: forcing a failure.
[ 606.061957] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 606.065706] CPU: 1 UID: 0 PID: 6885 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 606.065726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 606.065734] Call Trace:
[ 606.065738]
[ 606.065743] dump_stack_lvl+0xfa/0x120
[ 606.065764] should_fail_ex+0x4d7/0x5e0
[ 606.065787] strncpy_from_user+0x3b/0x2f0
[ 606.065806] do_getname+0x70/0x3d0
[ 606.065825] do_sys_openat2+0xa0/0x210
[ 606.065844] ? __pfx_do_sys_openat2+0x10/0x10
[ 606.065861] ? perf_trace_run_bpf_submit+0xef/0x180
[ 606.065879] ? perf_trace_preemptirq_template+0x259/0x430
[ 606.065899] __x64_sys_openat+0x142/0x200
[ 606.065915] ? __pfx___x64_sys_openat+0x10/0x10
[ 606.065932] ? fput+0x92/0xd0
[ 606.065951] do_syscall_64+0xbf/0x420
[ 606.065966] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 606.065979] RIP: 0033:0x7f775d796a04
[ 606.065988] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 606.065999] RSP: 002b:00007f775ad58ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 606.066011] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d796a04
[ 606.066019] RDX: 0000000000000002 RSI: 00007f775ad59000 RDI: 00000000ffffff9c
[ 606.066027] RBP: 00007f775ad59000 R08: 0000000000000000 R09: ffffffffffffffff
[ 606.066034] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 606.066041] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 606.066058]
07:35:49 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 606.130658] FAULT_INJECTION: forcing a failure.
[ 606.130658] name failslab, interval 1, probability 0, space 0, times 0
[ 606.144754] No source specified
07:35:49 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 17)
[ 606.145784] CPU: 0 UID: 0 PID: 6890 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 606.145830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 606.145849] Call Trace:
[ 606.145859]
[ 606.145872] dump_stack_lvl+0xfa/0x120
[ 606.145928] should_fail_ex+0x4d7/0x5e0
[ 606.145992] ? security_file_alloc+0x35/0x130
[ 606.146031] should_failslab+0xc2/0x120
[ 606.146072] kmem_cache_alloc_noprof+0x80/0x760
[ 606.146125] ? __create_object+0x59/0x80
[ 606.146184] ? security_file_alloc+0x35/0x130
[ 606.146222] security_file_alloc+0x35/0x130
[ 606.146263] init_file+0x95/0x480
[ 606.146309] alloc_empty_file+0x76/0x1e0
[ 606.146358] path_openat+0xee/0x2d60
[ 606.146395] ? __kernel_text_address+0xd/0x40
[ 606.146444] ? unwind_get_return_address+0x59/0xa0
[ 606.146483] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 606.146534] ? arch_stack_walk+0x9c/0xf0
[ 606.146587] ? perf_trace_run_bpf_submit+0xef/0x180
[ 606.146628] ? __pfx_path_openat+0x10/0x10
[ 606.146670] ? __lock_acquire+0x451/0x2250
[ 606.146729] do_file_open+0x209/0x460
[ 606.146766] ? __pfx_do_file_open+0x10/0x10
[ 606.146825] ? find_held_lock+0x2b/0x80
[ 606.146883] ? alloc_fd+0x2c1/0x560
[ 606.146917] ? lock_release+0xc8/0x270
[ 606.146969] ? _raw_spin_unlock+0x1e/0x40
[ 606.147024] ? alloc_fd+0x2c1/0x560
[ 606.147075] do_sys_openat2+0xe7/0x210
[ 606.147122] ? __pfx_do_sys_openat2+0x10/0x10
[ 606.147167] ? perf_trace_run_bpf_submit+0xef/0x180
[ 606.147213] ? perf_trace_preemptirq_template+0x259/0x430
[ 606.147269] __x64_sys_openat+0x142/0x200
[ 606.147317] ? __pfx___x64_sys_openat+0x10/0x10
[ 606.147389] do_syscall_64+0xbf/0x420
[ 606.147433] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 606.147471] RIP: 0033:0x7f591fcd6a04
[ 606.147499] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 606.147534] RSP: 002b:00007f591d298ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 606.147567] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fcd6a04
[ 606.147591] RDX: 0000000000000002 RSI: 00007f591d299000 RDI: 00000000ffffff9c
[ 606.147613] RBP: 00007f591d299000 R08: 0000000000000000 R09: ffffffffffffffff
[ 606.147635] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 606.147656] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 606.147702]
[ 606.198326] FAULT_INJECTION: forcing a failure.
[ 606.198326] name failslab, interval 1, probability 0, space 0, times 0
[ 606.201391] FAULT_INJECTION: forcing a failure.
[ 606.201391] name failslab, interval 1, probability 0, space 0, times 0
[ 606.204965] CPU: 1 UID: 0 PID: 6901 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 606.204983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 606.204990] Call Trace:
[ 606.204994]
[ 606.204999] dump_stack_lvl+0xfa/0x120
[ 606.205019] should_fail_ex+0x4d7/0x5e0
[ 606.205040] ? alloc_empty_file+0x58/0x1e0
[ 606.205055] should_failslab+0xc2/0x120
[ 606.205069] kmem_cache_alloc_noprof+0x80/0x760
[ 606.205086] ? __is_insn_slot_addr+0x136/0x290
[ 606.205103] ? lock_release+0xc8/0x270
[ 606.205124] ? alloc_empty_file+0x58/0x1e0
[ 606.205138] alloc_empty_file+0x58/0x1e0
[ 606.205153] path_openat+0xee/0x2d60
[ 606.205166] ? __kernel_text_address+0xd/0x40
[ 606.205182] ? unwind_get_return_address+0x59/0xa0
[ 606.205195] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 606.205212] ? arch_stack_walk+0x9c/0xf0
[ 606.205229] ? perf_trace_run_bpf_submit+0xef/0x180
[ 606.205243] ? __pfx_path_openat+0x10/0x10
[ 606.205257] ? __lock_acquire+0x451/0x2250
[ 606.205275] do_file_open+0x209/0x460
[ 606.205287] ? __pfx_do_file_open+0x10/0x10
[ 606.205305] ? find_held_lock+0x2b/0x80
[ 606.205324] ? alloc_fd+0x2c1/0x560
[ 606.205336] ? lock_release+0xc8/0x270
[ 606.205352] ? _raw_spin_unlock+0x1e/0x40
[ 606.205369] ? alloc_fd+0x2c1/0x560
[ 606.205385] do_sys_openat2+0xe7/0x210
[ 606.205401] ? __pfx_do_sys_openat2+0x10/0x10
[ 606.205415] ? perf_trace_run_bpf_submit+0xef/0x180
[ 606.205430] ? perf_trace_preemptirq_template+0x259/0x430
[ 606.205448] __x64_sys_openat+0x142/0x200
[ 606.205464] ? __pfx___x64_sys_openat+0x10/0x10
[ 606.205481] ? fput+0x92/0xd0
[ 606.205497] do_syscall_64+0xbf/0x420
[ 606.205512] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 606.205524] RIP: 0033:0x7f775d796a04
[ 606.205534] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 606.205545] RSP: 002b:00007f775ad58ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 606.205557] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d796a04
[ 606.205565] RDX: 0000000000000002 RSI: 00007f775ad59000 RDI: 00000000ffffff9c
[ 606.205572] RBP: 00007f775ad59000 R08: 0000000000000000 R09: ffffffffffffffff
[ 606.205579] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 606.205586] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 606.205601]
[ 606.217717] No source specified
[ 606.227997] CPU: 0 UID: 0 PID: 6903 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 606.228029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 606.228042] Call Trace:
[ 606.228049]
[ 606.228058] dump_stack_lvl+0xfa/0x120
[ 606.228086] should_fail_ex+0x4d7/0x5e0
[ 606.228123] ? security_file_alloc+0x35/0x130
[ 606.228149] should_failslab+0xc2/0x120
[ 606.228173] kmem_cache_alloc_noprof+0x80/0x760
[ 606.228205] ? __create_object+0x59/0x80
[ 606.228242] ? security_file_alloc+0x35/0x130
[ 606.228265] security_file_alloc+0x35/0x130
[ 606.228291] init_file+0x95/0x480
[ 606.228318] alloc_empty_file+0x76/0x1e0
[ 606.228349] alloc_file_pseudo+0x12b/0x220
[ 606.228380] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 606.228419] __shmem_file_setup+0x1a8/0x370
[ 606.228450] __do_sys_memfd_create+0x4cc/0xa90
[ 606.228486] ? ksys_write+0x1a3/0x240
[ 606.228507] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 606.228540] ? irqentry_exit+0xee/0x650
[ 606.228561] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 606.228591] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 606.228628] do_syscall_64+0xbf/0x420
[ 606.228655] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 606.228678] RIP: 0033:0x7fe78a917b19
[ 606.228696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 606.228717] RSP: 002b:00007fe787e6bf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 606.228740] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a917b19
[ 606.228755] RDX: 00007fe787e6c000 RSI: 0000000000000000 RDI: 00007fe78a9710fb
[ 606.228769] RBP: 0000000000000000 R08: 00007fe787e6bff8 R09: ffffffffffffffff
[ 606.228783] R10: 00007fe787e6bffc R11: 0000000000000246 R12: 0000000020000000
[ 606.228797] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 606.228827]
07:35:59 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 20)
07:35:59 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 18)
07:35:59 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:35:59 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0xd6, 0xfe, 0x2, 0x40, 0x0, 0x8000, 0x24200, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x1, 0x3}, 0x100, 0x8001, 0x3, 0x7, 0x40000044e, 0x99, 0x0, 0x0, 0x100000, 0x0, 0x3}, r1, 0xb, r0, 0x1)
r2 = getpid()
prlimit64(r2, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r2, 0x3, r0, 0xa)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x8, 0x2, 0x9, 0x3c, 0x0, 0x8508, 0x4042, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x974d, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0xd030, 0x7ff, 0x8, 0x5, 0x3, 0x80000001, 0x1, 0x0, 0xfffffff8, 0x0, 0x59c}, r2, 0x6, 0xffffffffffffffff, 0x1)
perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4, 0xff, 0x8, 0x5, 0x0, 0x1, 0x51000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x8, 0x1}, 0x100, 0x2, 0xfff, 0x6, 0x2, 0x10000, 0x9, 0x0, 0x5, 0x0, 0x1}, r2, 0x4, 0xffffffffffffffff, 0x9)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
clone3(&(0x7f0000000600)={0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f00000003c0), {0x1f}, &(0x7f0000000400)=""/137, 0x89, &(0x7f00000004c0)=""/222, &(0x7f00000005c0)}, 0x58)
07:35:59 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:35:59 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 13)
07:35:59 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 8)
07:35:59 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 615.777427] FAT-fs (loop5): unable to read boot sector
[ 615.783449] FAT-fs (loop6): unable to read boot sector
[ 615.795715] No source specified
[ 615.800289] FAT-fs (loop2): unable to read boot sector
[ 615.800391] FAT-fs (loop4): unable to read boot sector
[ 615.840043] FAULT_INJECTION: forcing a failure.
[ 615.840043] name failslab, interval 1, probability 0, space 0, times 0
07:35:59 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 19)
[ 615.848775] CPU: 0 UID: 0 PID: 6925 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 615.848809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 615.848823] Call Trace:
[ 615.848830]
[ 615.848839] dump_stack_lvl+0xfa/0x120
[ 615.848872] should_fail_ex+0x4d7/0x5e0
[ 615.848921] ? security_inode_alloc+0x3e/0x130
[ 615.848956] should_failslab+0xc2/0x120
[ 615.848982] kmem_cache_alloc_noprof+0x80/0x760
[ 615.849014] ? __pfx_map_id_range_down+0x10/0x10
[ 615.849056] ? security_inode_alloc+0x3e/0x130
[ 615.849090] security_inode_alloc+0x3e/0x130
[ 615.849128] inode_init_always_gfp+0xc9d/0xff0
[ 615.849159] alloc_inode+0x8d/0x250
[ 615.849191] new_inode+0x1e/0x160
[ 615.849224] __ext4_new_inode+0x35d/0x4cd0
[ 615.849260] ? avc_has_perm_noaudit+0x141/0x390
[ 615.849293] ? __pfx___ext4_new_inode+0x10/0x10
[ 615.849323] ? __pfx_avc_has_perm+0x10/0x10
[ 615.849349] ? __pfx___dquot_initialize+0x10/0x10
[ 615.849397] ext4_mkdir+0x331/0xb30
[ 615.849441] ? __pfx_ext4_mkdir+0x10/0x10
[ 615.849472] ? security_inode_permission+0x72/0xe0
[ 615.849503] vfs_mkdir+0x6d8/0xc00
[ 615.849541] filename_mkdirat+0x118/0x430
[ 615.849570] ? __pfx_filename_mkdirat+0x10/0x10
[ 615.849597] ? strncpy_from_user+0x21b/0x2f0
[ 615.849636] __x64_sys_mkdir+0x6e/0xd0
[ 615.849661] do_syscall_64+0xbf/0x420
[ 615.849689] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 615.849713] RIP: 0033:0x7f1e78939c27
[ 615.849732] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 615.849769] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 615.849792] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 615.849807] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 615.849820] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 615.849834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 615.849847] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 615.849879]
07:35:59 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:35:59 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:35:59 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 21)
07:35:59 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 14)
[ 615.929036] FAULT_INJECTION: forcing a failure.
[ 615.929036] name failslab, interval 1, probability 0, space 0, times 0
[ 615.931549] FAT-fs (loop6): unable to read boot sector
[ 615.935347] No source specified
[ 615.935964] CPU: 1 UID: 0 PID: 6935 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 615.935982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 615.935990] Call Trace:
[ 615.935994]
[ 615.935999] dump_stack_lvl+0xfa/0x120
[ 615.936020] should_fail_ex+0x4d7/0x5e0
[ 615.936043] ? __kernfs_new_node+0xd3/0x940
[ 615.936061] should_failslab+0xc2/0x120
[ 615.936075] kmem_cache_alloc_noprof+0x80/0x760
[ 615.936095] ? __pfx_avc_has_perm+0x10/0x10
[ 615.936112] ? __kernfs_new_node+0xd3/0x940
[ 615.936128] __kernfs_new_node+0xd3/0x940
[ 615.936144] ? __lock_acquire+0x451/0x2250
[ 615.936162] ? __pfx___kernfs_new_node+0x10/0x10
[ 615.936182] ? lock_acquire+0x15e/0x2d0
[ 615.936196] ? kernfs_root+0x23/0x2a0
[ 615.936212] ? find_held_lock+0x2b/0x80
[ 615.936231] ? kernfs_root+0xee/0x2a0
[ 615.936248] ? lock_release+0xc8/0x270
[ 615.936261] ? lock_is_held_type+0x9e/0x120
[ 615.936276] kernfs_new_node+0x13c/0x1e0
[ 615.936299] kernfs_create_dir_ns+0x4d/0x1a0
[ 615.936312] internal_create_group+0x440/0xeb0
[ 615.936330] ? __pfx___mutex_unlock_slowpath+0x10/0x10
[ 615.936347] ? __pfx_internal_create_group+0x10/0x10
[ 615.936364] ? blk_validate_limits+0xe47/0x15d0
[ 615.936382] ? lock_is_held_type+0x9e/0x120
[ 615.936395] loop_configure+0xc46/0x15a0
[ 615.936426] ? __pfx_loop_configure+0x10/0x10
[ 615.936451] ? avc_has_extended_perms+0x107/0xf20
[ 615.936466] ? find_held_lock+0x2b/0x80
[ 615.936484] ? avc_has_extended_perms+0x23b/0xf20
[ 615.936498] ? lock_release+0xc8/0x270
[ 615.936514] lo_ioctl+0x674/0x1cb0
[ 615.936534] ? __pfx_lo_ioctl+0x10/0x10
[ 615.936549] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 615.936568] ? lock_acquire+0x15e/0x2d0
[ 615.936582] ? __virt_addr_valid+0x1c6/0x5d0
[ 615.936597] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 615.936615] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 615.936630] ? lock_release+0xc8/0x270
[ 615.936644] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 615.936664] ? blkdev_common_ioctl+0x1c3/0x2860
[ 615.936696] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 615.936715] ? __fget_files+0x34/0x3b0
[ 615.936727] ? find_held_lock+0x2b/0x80
[ 615.936746] ? __fget_files+0x203/0x3b0
[ 615.936758] ? __pfx_lo_ioctl+0x10/0x10
[ 615.936779] blkdev_ioctl+0x365/0x6d0
[ 615.936794] ? __pfx_blkdev_ioctl+0x10/0x10
[ 615.936810] ? selinux_file_ioctl+0xb9/0x280
[ 615.936830] ? __pfx_blkdev_ioctl+0x10/0x10
[ 615.936846] __x64_sys_ioctl+0x18f/0x210
[ 615.936866] do_syscall_64+0xbf/0x420
[ 615.936881] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 615.936893] RIP: 0033:0x7f591fd238d7
[ 615.936903] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 615.936914] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 615.936926] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fd238d7
[ 615.936934] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 615.936942] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 615.936949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 615.936955] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 615.936971]
[ 615.948411] FAULT_INJECTION: forcing a failure.
[ 615.948411] name failslab, interval 1, probability 0, space 0, times 0
[ 615.985208] FAT-fs (loop2): unable to read boot sector
[ 616.003985] CPU: 0 UID: 0 PID: 6931 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 616.004022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 616.004042] Call Trace:
[ 616.004049]
[ 616.004059] dump_stack_lvl+0xfa/0x120
[ 616.004092] should_fail_ex+0x4d7/0x5e0
[ 616.004133] ? security_file_alloc+0x35/0x130
[ 616.004157] should_failslab+0xc2/0x120
[ 616.004183] kmem_cache_alloc_noprof+0x80/0x760
[ 616.004217] ? __create_object+0x59/0x80
[ 616.004252] ? security_file_alloc+0x35/0x130
[ 616.004276] security_file_alloc+0x35/0x130
[ 616.004302] init_file+0x95/0x480
[ 616.004331] alloc_empty_file+0x76/0x1e0
[ 616.004361] path_openat+0xee/0x2d60
[ 616.004385] ? __kernel_text_address+0xd/0x40
[ 616.004416] ? unwind_get_return_address+0x59/0xa0
[ 616.004441] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 616.004472] ? arch_stack_walk+0x9c/0xf0
[ 616.004505] ? perf_trace_run_bpf_submit+0xef/0x180
[ 616.004532] ? __pfx_path_openat+0x10/0x10
[ 616.004558] ? __lock_acquire+0x451/0x2250
[ 616.004596] do_file_open+0x209/0x460
[ 616.004620] ? __pfx_do_file_open+0x10/0x10
[ 616.004656] ? find_held_lock+0x2b/0x80
[ 616.004692] ? alloc_fd+0x2c1/0x560
[ 616.004714] ? lock_release+0xc8/0x270
[ 616.004746] ? _raw_spin_unlock+0x1e/0x40
[ 616.004778] ? alloc_fd+0x2c1/0x560
[ 616.004810] do_sys_openat2+0xe7/0x210
[ 616.004840] ? __pfx_do_sys_openat2+0x10/0x10
[ 616.004868] ? perf_trace_run_bpf_submit+0xef/0x180
[ 616.004898] ? perf_trace_preemptirq_template+0x259/0x430
[ 616.004934] __x64_sys_openat+0x142/0x200
[ 616.004965] ? __pfx___x64_sys_openat+0x10/0x10
[ 616.004998] ? fput+0x92/0xd0
[ 616.005031] do_syscall_64+0xbf/0x420
[ 616.005058] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 616.005082] RIP: 0033:0x7f775d796a04
[ 616.005101] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 616.005123] RSP: 002b:00007f775ad58ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 616.005146] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d796a04
[ 616.005161] RDX: 0000000000000002 RSI: 00007f775ad59000 RDI: 00000000ffffff9c
[ 616.005175] RBP: 00007f775ad59000 R08: 0000000000000000 R09: ffffffffffffffff
[ 616.005190] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 616.005203] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 616.005233]
[ 616.085223] FAULT_INJECTION: forcing a failure.
[ 616.085223] name failslab, interval 1, probability 0, space 0, times 0
[ 616.086506] CPU: 1 UID: 0 PID: 6939 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 616.086527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 616.086537] Call Trace:
[ 616.086543]
[ 616.086549] dump_stack_lvl+0xfa/0x120
[ 616.086573] should_fail_ex+0x4d7/0x5e0
[ 616.086605] ? do_getname+0x2b/0x3d0
[ 616.086633] should_failslab+0xc2/0x120
[ 616.086659] kmem_cache_alloc_noprof+0x80/0x760
[ 616.086693] ? lock_release+0xc8/0x270
[ 616.086718] ? do_getname+0x2b/0x3d0
[ 616.086735] do_getname+0x2b/0x3d0
[ 616.086756] do_sys_openat2+0xa0/0x210
[ 616.086776] ? __pfx_do_sys_openat2+0x10/0x10
[ 616.086800] ? find_held_lock+0x2b/0x80
[ 616.086828] __x64_sys_openat+0x142/0x200
[ 616.086848] ? __pfx___x64_sys_openat+0x10/0x10
[ 616.086870] ? fput+0x92/0xd0
[ 616.086893] do_syscall_64+0xbf/0x420
[ 616.086919] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 616.086936] RIP: 0033:0x7fe78a8caa04
[ 616.086948] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 616.086963] RSP: 002b:00007fe787e8ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 616.086978] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a8caa04
[ 616.086988] RDX: 0000000000000002 RSI: 00007fe787e8d000 RDI: 00000000ffffff9c
[ 616.086997] RBP: 00007fe787e8d000 R08: 0000000000000000 R09: ffffffffffffffff
[ 616.087007] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 616.087016] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 616.087036]
07:36:08 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 1)
07:36:08 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:36:08 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 15)
07:36:08 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 20)
07:36:08 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 22)
07:36:08 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 9)
07:36:08 executing program 1:
ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000100)={0x1ff, 0x30, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:36:08 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
[ 624.628377] FAT-fs (loop4): unable to read boot sector
[ 624.632709] FAT-fs (loop2): unable to read boot sector
[ 624.636205] FAULT_INJECTION: forcing a failure.
[ 624.636205] name failslab, interval 1, probability 0, space 0, times 0
[ 624.641121] FAT-fs (loop6): unable to read boot sector
[ 624.649202] No source specified
[ 624.653139] CPU: 0 UID: 0 PID: 6958 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 624.653174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 624.653187] Call Trace:
[ 624.653195]
[ 624.653204] dump_stack_lvl+0xfa/0x120
[ 624.653237] should_fail_ex+0x4d7/0x5e0
[ 624.653277] ? __do_sys_memfd_create+0x1e5/0xa90
[ 624.653311] should_failslab+0xc2/0x120
[ 624.653336] __kmalloc_cache_noprof+0x80/0x730
[ 624.653378] ? __do_sys_memfd_create+0x1e5/0xa90
[ 624.653412] __do_sys_memfd_create+0x1e5/0xa90
[ 624.653449] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 624.653482] ? irqentry_exit+0xee/0x650
[ 624.653503] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 624.653533] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 624.653572] do_syscall_64+0xbf/0x420
[ 624.653599] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 624.653623] RIP: 0033:0x7fb40288db19
[ 624.653642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 624.653664] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 624.653686] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288db19
[ 624.653702] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb4028e70fb
[ 624.653715] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 624.653729] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 624.653743] R13: 0000000020000040 R14: 0000000000000007 R15: 0000000020000080
[ 624.653773]
07:36:08 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 16)
07:36:08 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 624.751471] FAULT_INJECTION: forcing a failure.
[ 624.751471] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 624.752413] CPU: 1 UID: 0 PID: 6966 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 624.752430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 624.752437] Call Trace:
[ 624.752442]
[ 624.752447] dump_stack_lvl+0xfa/0x120
[ 624.752467] should_fail_ex+0x4d7/0x5e0
[ 624.752491] strncpy_from_user+0x3b/0x2f0
[ 624.752509] do_getname+0x70/0x3d0
[ 624.752527] do_sys_openat2+0xa0/0x210
[ 624.752543] ? __pfx_do_sys_openat2+0x10/0x10
[ 624.752561] ? find_held_lock+0x2b/0x80
[ 624.752584] __x64_sys_openat+0x142/0x200
[ 624.752599] ? __pfx___x64_sys_openat+0x10/0x10
[ 624.752616] ? fput+0x92/0xd0
[ 624.752634] do_syscall_64+0xbf/0x420
[ 624.752649] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 624.752662] RIP: 0033:0x7fe78a8caa04
[ 624.752671] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 624.752682] RSP: 002b:00007fe787e8ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 624.752694] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a8caa04
[ 624.752702] RDX: 0000000000000002 RSI: 00007fe787e8d000 RDI: 00000000ffffff9c
[ 624.752710] RBP: 00007fe787e8d000 R08: 0000000000000000 R09: ffffffffffffffff
[ 624.752717] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
07:36:08 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 10)
[ 624.752724] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 624.752739]
[ 624.761166] FAT-fs (loop5): unable to read boot sector
07:36:08 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 2)
07:36:08 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 23)
07:36:08 executing program 1:
ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0)
r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x401, 0x7})
07:36:08 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 17)
[ 624.844255] FAULT_INJECTION: forcing a failure.
[ 624.844255] name failslab, interval 1, probability 0, space 0, times 0
[ 624.848268] CPU: 1 UID: 0 PID: 6973 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 624.848286] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 624.848293] Call Trace:
[ 624.848297]
[ 624.848302] dump_stack_lvl+0xfa/0x120
[ 624.848322] should_fail_ex+0x4d7/0x5e0
[ 624.848345] ? __kernfs_new_node+0xd3/0x940
[ 624.848363] should_failslab+0xc2/0x120
[ 624.848378] kmem_cache_alloc_noprof+0x80/0x760
[ 624.848400] ? __kernfs_new_node+0xd3/0x940
[ 624.848415] __kernfs_new_node+0xd3/0x940
[ 624.848430] ? __lock_acquire+0x451/0x2250
[ 624.848448] ? __pfx___kernfs_new_node+0x10/0x10
[ 624.848467] ? lock_acquire+0x15e/0x2d0
[ 624.848481] ? kernfs_root+0x23/0x2a0
[ 624.848496] ? find_held_lock+0x2b/0x80
[ 624.848516] ? kernfs_root+0xee/0x2a0
[ 624.848531] ? lock_release+0xc8/0x270
[ 624.848544] ? lock_is_held_type+0x9e/0x120
[ 624.848559] kernfs_new_node+0x13c/0x1e0
[ 624.848580] __kernfs_create_file+0x55/0x360
[ 624.848596] sysfs_add_file_mode_ns+0x21c/0x430
[ 624.848613] ? __pfx_dev_attr_store+0x10/0x10
[ 624.848634] internal_create_group+0x662/0xeb0
[ 624.848656] ? __pfx_internal_create_group+0x10/0x10
[ 624.848672] ? blk_validate_limits+0xe47/0x15d0
[ 624.848690] ? lock_is_held_type+0x9e/0x120
[ 624.848702] loop_configure+0xc46/0x15a0
[ 624.848732] ? __pfx_loop_configure+0x10/0x10
[ 624.848757] ? avc_has_extended_perms+0x107/0xf20
[ 624.848772] ? find_held_lock+0x2b/0x80
[ 624.848790] ? avc_has_extended_perms+0x23b/0xf20
[ 624.848804] ? lock_release+0xc8/0x270
[ 624.848820] lo_ioctl+0x674/0x1cb0
[ 624.848839] ? __pfx_lo_ioctl+0x10/0x10
[ 624.848855] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 624.848873] ? lock_acquire+0x15e/0x2d0
[ 624.848887] ? __virt_addr_valid+0x1c6/0x5d0
[ 624.848907] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 624.848925] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 624.848940] ? lock_release+0xc8/0x270
[ 624.848953] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 624.848973] ? blkdev_common_ioctl+0x1c3/0x2860
[ 624.849004] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 624.849022] ? __fget_files+0x34/0x3b0
[ 624.849035] ? find_held_lock+0x2b/0x80
[ 624.849053] ? __fget_files+0x203/0x3b0
[ 624.849065] ? __pfx_lo_ioctl+0x10/0x10
[ 624.849081] blkdev_ioctl+0x365/0x6d0
[ 624.849096] ? __pfx_blkdev_ioctl+0x10/0x10
[ 624.849111] ? selinux_file_ioctl+0xb9/0x280
[ 624.849130] ? __pfx_blkdev_ioctl+0x10/0x10
[ 624.849146] __x64_sys_ioctl+0x18f/0x210
[ 624.849165] do_syscall_64+0xbf/0x420
[ 624.849180] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 624.849192] RIP: 0033:0x7f591fd238d7
07:36:08 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 21)
[ 624.849201] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 624.849213] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 624.849224] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fd238d7
[ 624.849232] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 624.849239] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
07:36:08 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
[ 624.849246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 624.849253] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 624.849268]
[ 624.865697] FAULT_INJECTION: forcing a failure.
[ 624.865697] name failslab, interval 1, probability 0, space 0, times 0
[ 624.896625] FAT-fs (loop0): unable to read boot sector
[ 624.902185] FAULT_INJECTION: forcing a failure.
[ 624.902185] name failslab, interval 1, probability 0, space 0, times 0
[ 624.904945] CPU: 1 UID: 0 PID: 6980 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 624.904963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 624.904970] Call Trace:
[ 624.904975]
[ 624.904980] dump_stack_lvl+0xfa/0x120
[ 624.904997] should_fail_ex+0x4d7/0x5e0
[ 624.905018] ? alloc_empty_file+0x58/0x1e0
[ 624.905032] should_failslab+0xc2/0x120
[ 624.905046] kmem_cache_alloc_noprof+0x80/0x760
[ 624.905062] ? __is_insn_slot_addr+0x136/0x290
[ 624.905076] ? lock_release+0xc8/0x270
[ 624.905094] ? alloc_empty_file+0x58/0x1e0
[ 624.905107] alloc_empty_file+0x58/0x1e0
[ 624.905123] path_openat+0xee/0x2d60
[ 624.905136] ? __kernel_text_address+0xd/0x40
[ 624.905152] ? unwind_get_return_address+0x59/0xa0
[ 624.905165] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 624.905182] ? arch_stack_walk+0x9c/0xf0
[ 624.905201] ? __pfx_path_openat+0x10/0x10
[ 624.905215] ? __lock_acquire+0x451/0x2250
[ 624.905233] do_file_open+0x209/0x460
[ 624.905245] ? __pfx_do_file_open+0x10/0x10
[ 624.905263] ? find_held_lock+0x2b/0x80
[ 624.905281] ? alloc_fd+0x2c1/0x560
[ 624.905292] ? lock_release+0xc8/0x270
[ 624.905308] ? _raw_spin_unlock+0x1e/0x40
[ 624.905325] ? alloc_fd+0x2c1/0x560
[ 624.905341] do_sys_openat2+0xe7/0x210
[ 624.905357] ? __pfx_do_sys_openat2+0x10/0x10
[ 624.905375] ? find_held_lock+0x2b/0x80
[ 624.905395] __x64_sys_openat+0x142/0x200
[ 624.905411] ? __pfx___x64_sys_openat+0x10/0x10
[ 624.905427] ? fput+0x92/0xd0
[ 624.905444] do_syscall_64+0xbf/0x420
[ 624.905458] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 624.905470] RIP: 0033:0x7fe78a8caa04
[ 624.905479] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 624.905490] RSP: 002b:00007fe787e8ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 624.905502] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a8caa04
[ 624.905510] RDX: 0000000000000002 RSI: 00007fe787e8d000 RDI: 00000000ffffff9c
[ 624.905517] RBP: 00007fe787e8d000 R08: 0000000000000000 R09: ffffffffffffffff
[ 624.905524] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 624.905531] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 624.905546]
[ 624.927341] CPU: 0 UID: 0 PID: 6974 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 624.927378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 624.927393] Call Trace:
[ 624.927401]
[ 624.927411] dump_stack_lvl+0xfa/0x120
[ 624.927446] should_fail_ex+0x4d7/0x5e0
[ 624.927487] ? jbd2__journal_start+0x193/0x820
[ 624.927522] should_failslab+0xc2/0x120
[ 624.927549] kmem_cache_alloc_noprof+0x80/0x760
[ 624.927584] ? lock_is_held_type+0x9e/0x120
[ 624.927611] ? jbd2__journal_start+0x193/0x820
[ 624.927646] jbd2__journal_start+0x193/0x820
[ 624.927686] __ext4_journal_start_sb+0x325/0x580
[ 624.927721] __ext4_new_inode+0x2c81/0x4cd0
[ 624.927766] ? __pfx___ext4_new_inode+0x10/0x10
[ 624.927796] ? __pfx_avc_has_perm+0x10/0x10
[ 624.927824] ? __pfx___dquot_initialize+0x10/0x10
[ 624.927872] ext4_mkdir+0x331/0xb30
[ 624.927926] ? __pfx_ext4_mkdir+0x10/0x10
[ 624.927958] ? security_inode_permission+0x72/0xe0
[ 624.927990] vfs_mkdir+0x6d8/0xc00
[ 624.928029] filename_mkdirat+0x118/0x430
[ 624.928058] ? __pfx_filename_mkdirat+0x10/0x10
[ 624.928085] ? strncpy_from_user+0x21b/0x2f0
[ 624.928124] __x64_sys_mkdir+0x6e/0xd0
[ 624.928149] do_syscall_64+0xbf/0x420
[ 624.928177] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 624.928202] RIP: 0033:0x7f1e78939c27
[ 624.928221] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 624.928243] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 624.928266] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 624.928281] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 624.928295] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 624.928308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 624.928322] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 624.928354]
[ 624.938621] FAT-fs (loop2): unable to read boot sector
07:36:08 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 3)
[ 624.970688] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory
[ 624.984529] FAULT_INJECTION: forcing a failure.
[ 624.984529] name failslab, interval 1, probability 0, space 0, times 0
[ 624.991993] CPU: 0 UID: 0 PID: 6984 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 624.992026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 624.992039] Call Trace:
[ 624.992047]
[ 624.992056] dump_stack_lvl+0xfa/0x120
[ 624.992090] should_fail_ex+0x4d7/0x5e0
[ 624.992129] ? __kernfs_new_node+0xd3/0x940
[ 624.992161] should_failslab+0xc2/0x120
[ 624.992187] kmem_cache_alloc_noprof+0x80/0x760
[ 624.992223] ? __pfx_avc_has_perm+0x10/0x10
[ 624.992255] ? __kernfs_new_node+0xd3/0x940
[ 624.992286] __kernfs_new_node+0xd3/0x940
[ 624.992316] ? __lock_acquire+0x451/0x2250
[ 624.992350] ? __pfx___kernfs_new_node+0x10/0x10
[ 624.992387] ? lock_acquire+0x15e/0x2d0
[ 624.992415] ? kernfs_root+0x23/0x2a0
[ 624.992446] ? find_held_lock+0x2b/0x80
[ 624.992482] ? kernfs_root+0xee/0x2a0
[ 624.992513] ? lock_release+0xc8/0x270
[ 624.992539] ? lock_is_held_type+0x9e/0x120
[ 624.992569] kernfs_new_node+0x13c/0x1e0
[ 624.992611] kernfs_create_dir_ns+0x4d/0x1a0
[ 624.992636] internal_create_group+0x440/0xeb0
[ 624.992670] ? __pfx___mutex_unlock_slowpath+0x10/0x10
[ 624.992702] ? __pfx_internal_create_group+0x10/0x10
[ 624.992735] ? blk_validate_limits+0xe47/0x15d0
[ 624.992768] ? lock_is_held_type+0x9e/0x120
[ 624.992793] loop_configure+0xc46/0x15a0
[ 624.992851] ? __pfx_loop_configure+0x10/0x10
[ 624.992907] ? avc_has_extended_perms+0x107/0xf20
[ 624.992935] ? find_held_lock+0x2b/0x80
[ 624.992970] ? avc_has_extended_perms+0x23b/0xf20
[ 624.992997] ? lock_release+0xc8/0x270
[ 624.993029] lo_ioctl+0x674/0x1cb0
[ 624.993063] ? perf_tp_event+0x807/0xe70
[ 624.993086] ? __pfx_lo_ioctl+0x10/0x10
[ 624.993117] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 624.993148] ? __pfx_perf_tp_event+0x10/0x10
[ 624.993175] ? perf_trace_preemptirq_template+0x259/0x430
[ 624.993210] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 624.993243] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 624.993279] ? blkdev_common_ioctl+0x1c3/0x2860
[ 624.993340] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 624.993377] ? __fget_files+0x34/0x3b0
[ 624.993401] ? find_held_lock+0x2b/0x80
[ 624.993436] ? __fget_files+0x203/0x3b0
[ 624.993461] ? __pfx_lo_ioctl+0x10/0x10
[ 624.993493] blkdev_ioctl+0x365/0x6d0
[ 624.993521] ? __pfx_blkdev_ioctl+0x10/0x10
[ 624.993551] ? selinux_file_ioctl+0xb9/0x280
[ 624.993588] ? __pfx_blkdev_ioctl+0x10/0x10
[ 624.993619] __x64_sys_ioctl+0x18f/0x210
[ 624.993657] do_syscall_64+0xbf/0x420
[ 624.993684] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 624.993709] RIP: 0033:0x7f775d7e38d7
[ 624.993727] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 624.993749] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 624.993771] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 624.993787] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 624.993800] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 624.993814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 624.993828] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 624.993871]
[ 625.051461] FAULT_INJECTION: forcing a failure.
[ 625.051461] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 625.052424] CPU: 1 UID: 0 PID: 6986 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 625.052440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 625.052448] Call Trace:
[ 625.052452]
[ 625.052461] dump_stack_lvl+0xfa/0x120
[ 625.052482] should_fail_ex+0x4d7/0x5e0
[ 625.052506] strncpy_from_user+0x3b/0x2f0
[ 625.052524] __do_sys_memfd_create+0x21e/0xa90
[ 625.052546] ? ksys_write+0x1a3/0x240
[ 625.052559] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 625.052576] ? irqentry_exit+0xee/0x650
[ 625.052588] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 625.052605] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 625.052626] do_syscall_64+0xbf/0x420
[ 625.052644] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 625.052660] RIP: 0033:0x7fb40288db19
[ 625.052669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 625.052680] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 625.052693] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288db19
[ 625.052701] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb4028e70fb
[ 625.052708] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 625.052716] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 625.052723] R13: 0000000020000040 R14: 0000000000000007 R15: 0000000020000080
[ 625.052739]
[ 625.112104] FAT-fs (loop5): unable to read boot sector
07:36:17 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 24)
07:36:17 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 22)
07:36:17 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0)
07:36:17 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 4)
07:36:17 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 18)
07:36:17 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 11)
07:36:17 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:36:17 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x7, 0x3, 0x6, 0x0, 0x8001, 0xa8008, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xd5e, 0x1}, 0x40, 0xd11, 0x1, 0x6, 0x8, 0x5, 0x26, 0x0, 0x2a9, 0x0, 0xdb76}, 0x0, 0x0, 0xffffffffffffffff, 0x2)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 633.742878] FAULT_INJECTION: forcing a failure.
[ 633.742878] name failslab, interval 1, probability 0, space 0, times 0
[ 633.745144] CPU: 0 UID: 0 PID: 6998 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 633.745192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 633.745209] Call Trace:
[ 633.745219]
[ 633.745231] dump_stack_lvl+0xfa/0x120
[ 633.745270] should_fail_ex+0x4d7/0x5e0
[ 633.745321] ? shmem_alloc_inode+0x27/0x50
[ 633.745350] should_failslab+0xc2/0x120
[ 633.745382] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 633.745440] ? shmem_alloc_inode+0x27/0x50
[ 633.745467] shmem_alloc_inode+0x27/0x50
[ 633.745494] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 633.745521] alloc_inode+0x67/0x250
[ 633.745563] new_inode+0x1e/0x160
[ 633.745605] __shmem_get_inode+0x17c/0xe80
[ 633.745646] __shmem_file_setup+0x108/0x370
[ 633.745685] __do_sys_memfd_create+0x4cc/0xa90
[ 633.745734] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 633.745776] ? irqentry_exit+0xee/0x650
[ 633.745803] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 633.745841] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 633.745890] do_syscall_64+0xbf/0x420
[ 633.745935] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 633.745979] RIP: 0033:0x7fb40288db19
[ 633.746002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 633.746030] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 633.746058] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288db19
[ 633.746078] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb4028e70fb
[ 633.746095] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 633.746113] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 633.746131] R13: 0000000020000040 R14: 0000000000000007 R15: 0000000020000080
[ 633.746169]
[ 633.764503] FAT-fs (loop7): unable to read boot sector
07:36:17 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 1)
[ 633.799714] FAT-fs (loop4): unable to read boot sector
07:36:17 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
[ 633.842553] FAT-fs (loop2): unable to read boot sector
[ 633.845283] No source specified
[ 633.856103] FAT-fs (loop5): unable to read boot sector
[ 633.876402] FAT-fs (loop7): unable to read boot sector
[ 633.879044] FAULT_INJECTION: forcing a failure.
[ 633.879044] name failslab, interval 1, probability 0, space 0, times 0
[ 633.879872] CPU: 1 UID: 0 PID: 7014 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 633.879888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 633.879895] Call Trace:
[ 633.879904]
[ 633.879908] dump_stack_lvl+0xfa/0x120
[ 633.879930] should_fail_ex+0x4d7/0x5e0
[ 633.879953] ? __do_sys_memfd_create+0x1e5/0xa90
[ 633.879972] should_failslab+0xc2/0x120
[ 633.879986] __kmalloc_cache_noprof+0x80/0x730
[ 633.880008] ? __do_sys_memfd_create+0x1e5/0xa90
[ 633.880025] __do_sys_memfd_create+0x1e5/0xa90
[ 633.880043] ? ksys_write+0x1a3/0x240
[ 633.880055] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 633.880072] ? irqentry_exit+0xee/0x650
[ 633.880083] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 633.880100] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 633.880120] do_syscall_64+0xbf/0x420
[ 633.880135] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 633.880149] RIP: 0033:0x7f5a8d2b4b19
[ 633.880158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 633.880170] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 633.880182] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b4b19
[ 633.880190] RDX: 00007f5a8a82a000 RSI: 0000000000000000 RDI: 00007f5a8d30e0fb
[ 633.880198] RBP: 0000000000000000 R08: 00007f5a8a829ff8 R09: ffffffffffffffff
[ 633.880205] R10: 00007f5a8a829ffc R11: 0000000000000246 R12: 0000000020000000
[ 633.880212] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 633.880227]
07:36:17 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 5)
07:36:17 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080))
07:36:17 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 19)
[ 633.945651] FAT-fs (loop0): unable to read boot sector
07:36:17 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 25)
07:36:17 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 12)
07:36:17 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 2)
07:36:17 executing program 1:
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:36:17 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 23)
07:36:17 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 6)
[ 634.041838] FAT-fs (loop6): unable to read boot sector
[ 634.042153] FAULT_INJECTION: forcing a failure.
[ 634.042153] name failslab, interval 1, probability 0, space 0, times 0
[ 634.065712] FAULT_INJECTION: forcing a failure.
[ 634.065712] name failslab, interval 1, probability 0, space 0, times 0
[ 634.066609] CPU: 1 UID: 0 PID: 7030 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 634.066626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 634.066634] Call Trace:
[ 634.066639]
[ 634.066644] dump_stack_lvl+0xfa/0x120
[ 634.066668] should_fail_ex+0x4d7/0x5e0
[ 634.066693] ? security_inode_alloc+0x3e/0x130
[ 634.066713] should_failslab+0xc2/0x120
[ 634.066727] kmem_cache_alloc_noprof+0x80/0x760
[ 634.066745] ? __pfx_map_id_range_down+0x10/0x10
[ 634.066762] ? __create_object+0x59/0x80
[ 634.066781] ? security_inode_alloc+0x3e/0x130
[ 634.066799] security_inode_alloc+0x3e/0x130
[ 634.066818] inode_init_always_gfp+0xc9d/0xff0
[ 634.066835] alloc_inode+0x8d/0x250
[ 634.066853] new_inode+0x1e/0x160
[ 634.066869] __shmem_get_inode+0x17c/0xe80
[ 634.066887] __shmem_file_setup+0x108/0x370
[ 634.066906] __do_sys_memfd_create+0x4cc/0xa90
[ 634.066924] ? ksys_write+0x1a3/0x240
[ 634.066936] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 634.066953] ? irqentry_exit+0xee/0x650
[ 634.066964] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 634.066980] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 634.067000] do_syscall_64+0xbf/0x420
[ 634.067015] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 634.067029] RIP: 0033:0x7fb40288db19
[ 634.067038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 634.067050] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 634.067062] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288db19
[ 634.067070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb4028e70fb
[ 634.067078] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 634.067085] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 634.067092] R13: 0000000020000040 R14: 0000000000000007 R15: 0000000020000080
[ 634.067108]
[ 634.072479] CPU: 0 UID: 0 PID: 7024 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 634.072514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 634.072528] Call Trace:
[ 634.072536]
[ 634.072545] dump_stack_lvl+0xfa/0x120
[ 634.072579] should_fail_ex+0x4d7/0x5e0
[ 634.072620] ? security_file_alloc+0x35/0x130
[ 634.072646] should_failslab+0xc2/0x120
[ 634.072672] kmem_cache_alloc_noprof+0x80/0x760
[ 634.072706] ? __create_object+0x59/0x80
[ 634.072742] ? security_file_alloc+0x35/0x130
[ 634.072766] security_file_alloc+0x35/0x130
[ 634.072792] init_file+0x95/0x480
[ 634.072822] alloc_empty_file+0x76/0x1e0
[ 634.072853] path_openat+0xee/0x2d60
[ 634.072877] ? __kernel_text_address+0xd/0x40
[ 634.072918] ? unwind_get_return_address+0x59/0xa0
[ 634.072943] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 634.072975] ? arch_stack_walk+0x9c/0xf0
[ 634.073008] ? perf_trace_run_bpf_submit+0xef/0x180
[ 634.073036] ? __pfx_path_openat+0x10/0x10
[ 634.073062] ? __lock_acquire+0x451/0x2250
[ 634.073100] do_file_open+0x209/0x460
[ 634.073124] ? __pfx_do_file_open+0x10/0x10
[ 634.073160] ? find_held_lock+0x2b/0x80
[ 634.073196] ? alloc_fd+0x2c1/0x560
[ 634.073219] ? lock_release+0xc8/0x270
[ 634.073251] ? _raw_spin_unlock+0x1e/0x40
[ 634.073285] ? alloc_fd+0x2c1/0x560
[ 634.073316] do_sys_openat2+0xe7/0x210
[ 634.073346] ? __pfx_do_sys_openat2+0x10/0x10
[ 634.073374] ? perf_trace_run_bpf_submit+0xef/0x180
[ 634.073404] ? perf_trace_preemptirq_template+0x259/0x430
[ 634.073440] __x64_sys_openat+0x142/0x200
[ 634.073471] ? __pfx___x64_sys_openat+0x10/0x10
[ 634.073504] ? fput+0x92/0xd0
[ 634.073537] do_syscall_64+0xbf/0x420
[ 634.073565] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 634.073590] RIP: 0033:0x7fe78a8caa04
[ 634.073608] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 634.073631] RSP: 002b:00007fe787e8ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 634.073654] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a8caa04
[ 634.073670] RDX: 0000000000000002 RSI: 00007fe787e8d000 RDI: 00000000ffffff9c
[ 634.073684] RBP: 00007fe787e8d000 R08: 0000000000000000 R09: ffffffffffffffff
[ 634.073699] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 634.073713] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 634.073742]
[ 634.074556] FAULT_INJECTION: forcing a failure.
[ 634.074556] name failslab, interval 1, probability 0, space 0, times 0
[ 634.130613] FAULT_INJECTION: forcing a failure.
[ 634.130613] name failslab, interval 1, probability 0, space 0, times 0
[ 634.132475] CPU: 0 UID: 0 PID: 7035 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 634.132504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 634.132516] Call Trace:
[ 634.132523]
[ 634.132531] dump_stack_lvl+0xfa/0x120
[ 634.132556] should_fail_ex+0x4d7/0x5e0
[ 634.132591] ? __kernfs_new_node+0xd3/0x940
[ 634.132621] should_failslab+0xc2/0x120
[ 634.132644] kmem_cache_alloc_noprof+0x80/0x760
[ 634.132683] ? __kernfs_new_node+0xd3/0x940
[ 634.132712] __kernfs_new_node+0xd3/0x940
[ 634.132740] ? __lock_acquire+0x451/0x2250
[ 634.132770] ? __pfx___kernfs_new_node+0x10/0x10
[ 634.132805] ? lock_acquire+0x15e/0x2d0
[ 634.132831] ? kernfs_root+0x23/0x2a0
[ 634.132860] ? find_held_lock+0x2b/0x80
[ 634.132894] ? kernfs_root+0xee/0x2a0
[ 634.132931] ? lock_release+0xc8/0x270
[ 634.132956] ? lock_is_held_type+0x9e/0x120
[ 634.132982] kernfs_new_node+0x13c/0x1e0
[ 634.133021] __kernfs_create_file+0x55/0x360
[ 634.133049] sysfs_add_file_mode_ns+0x21c/0x430
[ 634.133081] ? __pfx_dev_attr_store+0x10/0x10
[ 634.133116] internal_create_group+0x662/0xeb0
[ 634.133157] ? __pfx_internal_create_group+0x10/0x10
[ 634.133188] ? blk_validate_limits+0xe47/0x15d0
[ 634.133218] ? lock_is_held_type+0x9e/0x120
[ 634.133242] loop_configure+0xc46/0x15a0
[ 634.133296] ? __pfx_loop_configure+0x10/0x10
[ 634.133342] ? avc_has_extended_perms+0x107/0xf20
[ 634.133369] ? find_held_lock+0x2b/0x80
[ 634.133402] ? avc_has_extended_perms+0x23b/0xf20
[ 634.133428] ? lock_release+0xc8/0x270
[ 634.133458] lo_ioctl+0x674/0x1cb0
[ 634.133490] ? perf_tp_event+0x807/0xe70
[ 634.133511] ? __pfx_lo_ioctl+0x10/0x10
[ 634.133540] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 634.133570] ? __pfx_perf_tp_event+0x10/0x10
[ 634.133595] ? perf_trace_preemptirq_template+0x259/0x430
[ 634.133628] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 634.133657] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 634.133692] ? blkdev_common_ioctl+0x1c3/0x2860
[ 634.133749] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 634.133784] ? __fget_files+0x34/0x3b0
[ 634.133805] ? find_held_lock+0x2b/0x80
[ 634.133838] ? __fget_files+0x203/0x3b0
[ 634.133861] ? __pfx_lo_ioctl+0x10/0x10
[ 634.133891] blkdev_ioctl+0x365/0x6d0
[ 634.133918] ? __pfx_blkdev_ioctl+0x10/0x10
[ 634.133965] ? selinux_file_ioctl+0xb9/0x280
[ 634.134000] ? __pfx_blkdev_ioctl+0x10/0x10
[ 634.134029] __x64_sys_ioctl+0x18f/0x210
[ 634.134063] do_syscall_64+0xbf/0x420
[ 634.134089] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 634.134111] RIP: 0033:0x7f775d7e38d7
[ 634.134127] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 634.134148] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 634.134169] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 634.134183] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 634.134196] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 634.134209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 634.134222] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 634.134251]
[ 634.153558] No source specified
[ 634.180826] CPU: 0 UID: 0 PID: 7033 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 634.180857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 634.180869] Call Trace:
[ 634.180876]
[ 634.180884] dump_stack_lvl+0xfa/0x120
[ 634.180918] should_fail_ex+0x4d7/0x5e0
[ 634.180953] ? __kernfs_new_node+0xd3/0x940
[ 634.180982] should_failslab+0xc2/0x120
[ 634.181005] kmem_cache_alloc_noprof+0x80/0x760
[ 634.181044] ? __kernfs_new_node+0xd3/0x940
[ 634.181073] __kernfs_new_node+0xd3/0x940
[ 634.181101] ? __lock_acquire+0x451/0x2250
[ 634.181132] ? __pfx___kernfs_new_node+0x10/0x10
[ 634.181166] ? lock_acquire+0x15e/0x2d0
[ 634.181192] ? kernfs_root+0x23/0x2a0
[ 634.181221] ? find_held_lock+0x2b/0x80
[ 634.181255] ? kernfs_root+0xee/0x2a0
[ 634.181284] ? lock_release+0xc8/0x270
[ 634.181309] ? lock_is_held_type+0x9e/0x120
[ 634.181335] kernfs_new_node+0x13c/0x1e0
[ 634.181374] __kernfs_create_file+0x55/0x360
[ 634.181402] sysfs_add_file_mode_ns+0x21c/0x430
[ 634.181434] ? __pfx_dev_attr_store+0x10/0x10
[ 634.181468] internal_create_group+0x662/0xeb0
[ 634.181508] ? __pfx_internal_create_group+0x10/0x10
[ 634.181539] ? blk_validate_limits+0xe47/0x15d0
[ 634.181568] ? lock_is_held_type+0x9e/0x120
[ 634.181592] loop_configure+0xc46/0x15a0
[ 634.181644] ? __pfx_loop_configure+0x10/0x10
[ 634.181690] ? avc_has_extended_perms+0x107/0xf20
[ 634.181715] ? find_held_lock+0x2b/0x80
[ 634.181749] ? avc_has_extended_perms+0x23b/0xf20
[ 634.181774] ? lock_release+0xc8/0x270
[ 634.181804] lo_ioctl+0x674/0x1cb0
[ 634.181836] ? perf_tp_event+0x807/0xe70
[ 634.181858] ? __pfx_lo_ioctl+0x10/0x10
[ 634.181886] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 634.181916] ? __pfx_perf_tp_event+0x10/0x10
[ 634.181941] ? perf_trace_preemptirq_template+0x259/0x430
[ 634.182003] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 634.182033] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 634.182067] ? blkdev_common_ioctl+0x1c3/0x2860
[ 634.182123] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 634.182156] ? __fget_files+0x34/0x3b0
[ 634.182178] ? find_held_lock+0x2b/0x80
[ 634.182211] ? __fget_files+0x203/0x3b0
[ 634.182235] ? __pfx_lo_ioctl+0x10/0x10
[ 634.182264] blkdev_ioctl+0x365/0x6d0
[ 634.182291] ? __pfx_blkdev_ioctl+0x10/0x10
[ 634.182319] ? selinux_file_ioctl+0xb9/0x280
[ 634.182353] ? __pfx_blkdev_ioctl+0x10/0x10
[ 634.182383] __x64_sys_ioctl+0x18f/0x210
[ 634.182416] do_syscall_64+0xbf/0x420
[ 634.182442] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 634.182464] RIP: 0033:0x7f591fd238d7
[ 634.182481] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 634.182502] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 634.182523] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fd238d7
[ 634.182537] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 634.182550] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 634.182564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 634.182576] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 634.182605]
[ 634.226939] FAT-fs (loop5): unable to read boot sector
[ 634.256140] FAT-fs (loop2): unable to read boot sector
07:36:26 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 26)
07:36:26 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 13)
07:36:26 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 7)
07:36:26 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 3)
07:36:26 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
prlimit64(r2, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r2, 0x3, r1, 0xa)
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x44, 0xe0, 0x33, 0xff, 0x0, 0x5, 0x2001, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xd7, 0x4, @perf_config_ext={0x9, 0xffffffff}, 0x850, 0x1, 0x5, 0x8, 0x8, 0x800, 0x401, 0x0, 0xf83e, 0x0, 0x4}, r2, 0x3, r0, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:36:26 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 20)
07:36:26 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 24)
[ 643.136856] FAULT_INJECTION: forcing a failure.
[ 643.136856] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 643.137818] CPU: 1 UID: 0 PID: 7045 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 643.137834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 643.137842] Call Trace:
[ 643.137846]
[ 643.137851] dump_stack_lvl+0xfa/0x120
[ 643.137870] should_fail_ex+0x4d7/0x5e0
[ 643.137898] strncpy_from_user+0x3b/0x2f0
[ 643.137916] __do_sys_memfd_create+0x21e/0xa90
[ 643.137937] ? ksys_write+0x1a3/0x240
[ 643.137949] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 643.137966] ? irqentry_exit+0xee/0x650
[ 643.137977] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 643.137993] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 643.138014] do_syscall_64+0xbf/0x420
[ 643.138029] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 643.138042] RIP: 0033:0x7f5a8d2b4b19
[ 643.138052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 643.138071] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 643.138083] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b4b19
[ 643.138091] RDX: 00007f5a8a82a000 RSI: 0000000000000000 RDI: 00007f5a8d30e0fb
[ 643.138099] RBP: 0000000000000000 R08: 00007f5a8a829ff8 R09: ffffffffffffffff
[ 643.138106] R10: 00007f5a8a829ffc R11: 0000000000000246 R12: 0000000020000000
[ 643.138114] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 643.138129]
[ 643.153191] FAT-fs (loop0): unable to read boot sector
07:36:26 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 8)
[ 643.198421] FAT-fs (loop4): unable to read boot sector
[ 643.206716] FAT-fs (loop5): unable to read boot sector
07:36:27 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 4)
[ 643.232697] No source specified
[ 643.237750] FAULT_INJECTION: forcing a failure.
[ 643.237750] name failslab, interval 1, probability 0, space 0, times 0
[ 643.239562] CPU: 0 UID: 0 PID: 7059 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 643.239602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 643.239616] Call Trace:
[ 643.239624]
[ 643.239633] dump_stack_lvl+0xfa/0x120
[ 643.239666] should_fail_ex+0x4d7/0x5e0
[ 643.239707] ? __d_alloc+0x34/0x9c0
[ 643.239734] should_failslab+0xc2/0x120
[ 643.239761] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 643.239797] ? find_held_lock+0x2b/0x80
[ 643.239844] ? __d_alloc+0x34/0x9c0
[ 643.239869] __d_alloc+0x34/0x9c0
[ 643.239894] ? mpol_shared_policy_init+0x24f/0x390
[ 643.239950] d_alloc_pseudo+0x1d/0xc0
[ 643.239984] alloc_file_pseudo+0xbe/0x220
[ 643.240016] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 643.240046] ? __shmem_get_inode+0x684/0xe80
[ 643.240080] __shmem_file_setup+0x1a8/0x370
[ 643.240110] __do_sys_memfd_create+0x4cc/0xa90
[ 643.240148] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 643.240181] ? irqentry_exit+0xee/0x650
[ 643.240202] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 643.240233] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 643.240270] do_syscall_64+0xbf/0x420
[ 643.240298] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 643.240322] RIP: 0033:0x7fb40288db19
[ 643.240341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 643.240363] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 643.240386] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288db19
[ 643.240402] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb4028e70fb
[ 643.240416] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 643.240430] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 643.240444] R13: 0000000020000040 R14: 0000000000000007 R15: 0000000020000080
[ 643.240475]
[ 643.275867] FAULT_INJECTION: forcing a failure.
[ 643.275867] name failslab, interval 1, probability 0, space 0, times 0
[ 643.276819] CPU: 1 UID: 0 PID: 7061 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 643.276836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 643.276844] Call Trace:
[ 643.276849]
[ 643.276854] dump_stack_lvl+0xfa/0x120
[ 643.276875] should_fail_ex+0x4d7/0x5e0
[ 643.276903] ? shmem_alloc_inode+0x27/0x50
[ 643.276916] should_failslab+0xc2/0x120
[ 643.276932] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 643.276956] ? shmem_alloc_inode+0x27/0x50
[ 643.276968] shmem_alloc_inode+0x27/0x50
[ 643.276979] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 643.276989] alloc_inode+0x67/0x250
[ 643.277007] new_inode+0x1e/0x160
[ 643.277024] __shmem_get_inode+0x17c/0xe80
[ 643.277041] __shmem_file_setup+0x108/0x370
[ 643.277057] __do_sys_memfd_create+0x4cc/0xa90
[ 643.277077] ? ksys_write+0x1a3/0x240
[ 643.277089] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 643.277106] ? irqentry_exit+0xee/0x650
[ 643.277118] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 643.277134] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 643.277155] do_syscall_64+0xbf/0x420
[ 643.277171] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 643.277185] RIP: 0033:0x7f5a8d2b4b19
[ 643.277194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 643.277206] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 643.277218] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b4b19
[ 643.277226] RDX: 00007f5a8a82a000 RSI: 0000000000000000 RDI: 00007f5a8d30e0fb
[ 643.277234] RBP: 0000000000000000 R08: 00007f5a8a829ff8 R09: ffffffffffffffff
[ 643.277241] R10: 00007f5a8a829ffc R11: 0000000000000246 R12: 0000000020000000
[ 643.277248] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 643.277263]
[ 643.293837] FAT-fs (loop2): unable to read boot sector
07:36:27 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
prlimit64(r1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r1, 0x3, r0, 0xa)
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7, 0x5, 0x3, 0x1f, 0x0, 0x480f8722, 0x4000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x29, 0x4, 0x800, 0x2, 0x5, 0x65de, 0x81, 0x0, 0x20a, 0x0, 0x7}, r1, 0x9, 0xffffffffffffffff, 0x8)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 643.341437] FAULT_INJECTION: forcing a failure.
[ 643.341437] name failslab, interval 1, probability 0, space 0, times 0
[ 643.349952] CPU: 1 UID: 0 PID: 7065 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 643.349971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 643.349980] Call Trace:
[ 643.349984]
[ 643.349989] dump_stack_lvl+0xfa/0x120
[ 643.350008] should_fail_ex+0x4d7/0x5e0
[ 643.350030] ? __kernfs_new_node+0xd3/0x940
[ 643.350046] should_failslab+0xc2/0x120
[ 643.350069] kmem_cache_alloc_noprof+0x80/0x760
[ 643.350088] ? __pfx_avc_has_perm+0x10/0x10
[ 643.350105] ? __kernfs_new_node+0xd3/0x940
[ 643.350121] __kernfs_new_node+0xd3/0x940
[ 643.350137] ? __lock_acquire+0x451/0x2250
[ 643.350154] ? __pfx___kernfs_new_node+0x10/0x10
[ 643.350173] ? lock_acquire+0x15e/0x2d0
[ 643.350187] ? kernfs_root+0x23/0x2a0
[ 643.350203] ? find_held_lock+0x2b/0x80
[ 643.350222] ? kernfs_root+0xee/0x2a0
[ 643.350238] ? lock_release+0xc8/0x270
[ 643.350251] ? lock_is_held_type+0x9e/0x120
[ 643.350266] kernfs_new_node+0x13c/0x1e0
[ 643.350288] kernfs_create_dir_ns+0x4d/0x1a0
[ 643.350301] internal_create_group+0x440/0xeb0
[ 643.350319] ? __pfx___mutex_unlock_slowpath+0x10/0x10
[ 643.350335] ? __pfx_internal_create_group+0x10/0x10
[ 643.350352] ? blk_validate_limits+0xe47/0x15d0
[ 643.350369] ? lock_is_held_type+0x9e/0x120
[ 643.350382] loop_configure+0xc46/0x15a0
[ 643.350413] ? __pfx_loop_configure+0x10/0x10
[ 643.350437] ? avc_has_extended_perms+0x107/0xf20
[ 643.350451] ? find_held_lock+0x2b/0x80
[ 643.350469] ? avc_has_extended_perms+0x23b/0xf20
[ 643.350483] ? lock_release+0xc8/0x270
[ 643.350499] lo_ioctl+0x674/0x1cb0
[ 643.350517] ? __pfx_lo_ioctl+0x10/0x10
[ 643.350533] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 643.350551] ? lock_acquire+0x15e/0x2d0
[ 643.350565] ? __virt_addr_valid+0x1c6/0x5d0
[ 643.350579] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 643.350597] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 643.350612] ? lock_release+0xc8/0x270
[ 643.350626] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 643.350645] ? blkdev_common_ioctl+0x1c3/0x2860
[ 643.350676] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 643.350695] ? __fget_files+0x34/0x3b0
[ 643.350707] ? find_held_lock+0x2b/0x80
[ 643.350725] ? __fget_files+0x203/0x3b0
[ 643.350738] ? __pfx_lo_ioctl+0x10/0x10
[ 643.350754] blkdev_ioctl+0x365/0x6d0
[ 643.350768] ? __pfx_blkdev_ioctl+0x10/0x10
[ 643.350783] ? selinux_file_ioctl+0xb9/0x280
[ 643.350803] ? __pfx_blkdev_ioctl+0x10/0x10
[ 643.350818] __x64_sys_ioctl+0x18f/0x210
[ 643.350838] do_syscall_64+0xbf/0x420
[ 643.350852] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 643.350865] RIP: 0033:0x7fe78a9178d7
[ 643.350874] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 643.350885] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 643.350902] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 643.350910] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 643.350917] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 643.350924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 643.350931] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 643.350947]
07:36:27 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 25)
07:36:27 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 21)
07:36:27 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 14)
[ 643.398855] FAT-fs (loop4): unable to read boot sector
[ 643.421073] FAULT_INJECTION: forcing a failure.
[ 643.421073] name failslab, interval 1, probability 0, space 0, times 0
[ 643.425442] FAULT_INJECTION: forcing a failure.
[ 643.425442] name failslab, interval 1, probability 0, space 0, times 0
[ 643.430747] CPU: 0 UID: 0 PID: 7069 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 643.430782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 643.430797] Call Trace:
[ 643.430805]
[ 643.430814] dump_stack_lvl+0xfa/0x120
[ 643.430848] should_fail_ex+0x4d7/0x5e0
[ 643.430890] ? __kernfs_new_node+0xd3/0x940
[ 643.430931] should_failslab+0xc2/0x120
[ 643.430957] kmem_cache_alloc_noprof+0x80/0x760
[ 643.431000] ? __kernfs_new_node+0xd3/0x940
[ 643.431031] __kernfs_new_node+0xd3/0x940
[ 643.431061] ? __lock_acquire+0x451/0x2250
[ 643.431096] ? __pfx___kernfs_new_node+0x10/0x10
[ 643.431134] ? lock_acquire+0x15e/0x2d0
[ 643.431161] ? kernfs_root+0x23/0x2a0
[ 643.431192] ? find_held_lock+0x2b/0x80
[ 643.431229] ? kernfs_root+0xee/0x2a0
[ 643.431266] ? lock_release+0xc8/0x270
[ 643.431292] ? lock_is_held_type+0x9e/0x120
[ 643.431321] kernfs_new_node+0x13c/0x1e0
[ 643.431362] __kernfs_create_file+0x55/0x360
[ 643.431393] sysfs_add_file_mode_ns+0x21c/0x430
[ 643.431428] ? __pfx_dev_attr_store+0x10/0x10
[ 643.431466] internal_create_group+0x662/0xeb0
[ 643.431508] ? __pfx_internal_create_group+0x10/0x10
[ 643.431542] ? blk_validate_limits+0xe47/0x15d0
[ 643.431575] ? lock_is_held_type+0x9e/0x120
[ 643.431600] loop_configure+0xc46/0x15a0
[ 643.431659] ? __pfx_loop_configure+0x10/0x10
[ 643.431707] ? avc_has_extended_perms+0x107/0xf20
[ 643.431736] ? find_held_lock+0x2b/0x80
[ 643.431772] ? avc_has_extended_perms+0x23b/0xf20
[ 643.431799] ? lock_release+0xc8/0x270
[ 643.431831] lo_ioctl+0x674/0x1cb0
[ 643.431865] ? perf_tp_event+0x807/0xe70
[ 643.431889] ? __pfx_lo_ioctl+0x10/0x10
[ 643.431920] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 643.431952] ? __pfx_perf_tp_event+0x10/0x10
[ 643.431978] ? perf_trace_preemptirq_template+0x259/0x430
[ 643.432015] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 643.432047] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 643.432084] ? blkdev_common_ioctl+0x1c3/0x2860
[ 643.432145] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 643.432182] ? __fget_files+0x34/0x3b0
[ 643.432206] ? find_held_lock+0x2b/0x80
[ 643.432242] ? __fget_files+0x203/0x3b0
[ 643.432267] ? __pfx_lo_ioctl+0x10/0x10
[ 643.432298] blkdev_ioctl+0x365/0x6d0
[ 643.432328] ? __pfx_blkdev_ioctl+0x10/0x10
[ 643.432358] ? selinux_file_ioctl+0xb9/0x280
[ 643.432396] ? __pfx_blkdev_ioctl+0x10/0x10
[ 643.432427] __x64_sys_ioctl+0x18f/0x210
[ 643.432465] do_syscall_64+0xbf/0x420
[ 643.432492] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 643.432516] RIP: 0033:0x7f775d7e38d7
[ 643.432535] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 643.432558] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 643.432581] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 643.432597] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 643.432611] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 643.432625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 643.432639] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 643.432669]
[ 643.432682] CPU: 1 UID: 0 PID: 7070 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 643.432701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 643.432709] Call Trace:
[ 643.432715]
[ 643.432720] dump_stack_lvl+0xfa/0x120
[ 643.432742] should_fail_ex+0x4d7/0x5e0
[ 643.432766] should_failslab+0xc2/0x120
[ 643.432782] __kmalloc_node_track_caller_noprof+0xd7/0x840
[ 643.432804] ? lock_acquire+0x15e/0x2d0
[ 643.432821] ? sidtab_sid2str_get+0x85/0x6f0
[ 643.432842] ? sidtab_sid2str_get+0x17e/0x6f0
[ 643.432865] ? kmemdup_noprof+0x2b/0x60
[ 643.432883] kmemdup_noprof+0x2b/0x60
[ 643.432904] sidtab_sid2str_get+0x17e/0x6f0
[ 643.432926] sidtab_entry_to_string+0x33/0x110
[ 643.432946] security_sid_to_context_core+0x350/0x620
[ 643.432966] selinux_inode_init_security+0x432/0x650
[ 643.432990] ? __pfx_selinux_inode_init_security+0x10/0x10
[ 643.433012] ? security_inode_init_security+0x113/0x370
[ 643.433033] security_inode_init_security+0x1bc/0x370
[ 643.433050] ? __pfx_ext4_initxattrs+0x10/0x10
[ 643.433070] ? __pfx_security_inode_init_security+0x10/0x10
[ 643.433086] ? _raw_spin_unlock+0x1e/0x40
[ 643.433103] ? insert_inode_locked+0x3fb/0x890
[ 643.433122] ? crc32c+0x1ae/0x350
[ 643.433140] __ext4_new_inode+0x38f7/0x4cd0
[ 643.433164] ? __pfx___ext4_new_inode+0x10/0x10
[ 643.433180] ? __pfx___dquot_initialize+0x10/0x10
[ 643.433206] ext4_mkdir+0x331/0xb30
[ 643.433229] ? __pfx_ext4_mkdir+0x10/0x10
[ 643.433245] ? security_inode_permission+0x72/0xe0
[ 643.433261] vfs_mkdir+0x6d8/0xc00
[ 643.433282] filename_mkdirat+0x118/0x430
[ 643.433297] ? __pfx_filename_mkdirat+0x10/0x10
[ 643.433311] ? strncpy_from_user+0x21b/0x2f0
[ 643.433331] __x64_sys_mkdir+0x6e/0xd0
[ 643.433344] do_syscall_64+0xbf/0x420
[ 643.433360] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 643.433373] RIP: 0033:0x7f1e78939c27
[ 643.433383] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 643.433394] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 643.433406] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 643.433414] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 643.433421] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 643.433428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 643.433435] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 643.433451]
[ 643.565274] FAT-fs (loop5): unable to read boot sector
07:36:35 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 5)
07:36:35 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 22)
07:36:35 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 26)
07:36:35 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
setns(r0, 0x0)
07:36:35 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 9)
07:36:35 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 1)
07:36:35 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 27)
07:36:35 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 15)
[ 651.906744] No source specified
[ 651.908212] FAT-fs (loop0): unable to read boot sector
[ 651.910726] FAT-fs (loop4): unable to read boot sector
[ 651.923269] FAULT_INJECTION: forcing a failure.
[ 651.923269] name failslab, interval 1, probability 0, space 0, times 0
[ 651.924174] CPU: 1 UID: 0 PID: 7089 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 651.924189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 651.924197] Call Trace:
[ 651.924201]
[ 651.924206] dump_stack_lvl+0xfa/0x120
[ 651.924227] should_fail_ex+0x4d7/0x5e0
[ 651.924250] ? __do_sys_memfd_create+0x1e5/0xa90
[ 651.924269] should_failslab+0xc2/0x120
[ 651.924282] __kmalloc_cache_noprof+0x80/0x730
[ 651.924307] ? __do_sys_memfd_create+0x1e5/0xa90
[ 651.924325] __do_sys_memfd_create+0x1e5/0xa90
[ 651.924342] ? ksys_write+0x1a3/0x240
[ 651.924354] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 651.924371] ? irqentry_exit+0xee/0x650
[ 651.924382] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 651.924398] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 651.924418] do_syscall_64+0xbf/0x420
[ 651.924433] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 651.924446] RIP: 0033:0x7f184d908b19
[ 651.924455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 651.924466] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 651.924479] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d908b19
[ 651.924487] RDX: 00007f184ae7e000 RSI: 0000000000000000 RDI: 00007f184d9620fb
[ 651.924494] RBP: 0000000000000000 R08: 00007f184ae7dff8 R09: ffffffffffffffff
[ 651.924502] R10: 00007f184ae7dffc R11: 0000000000000246 R12: 0000000020000000
[ 651.924509] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 651.924524]
[ 651.934448] FAULT_INJECTION: forcing a failure.
[ 651.934448] name failslab, interval 1, probability 0, space 0, times 0
[ 651.941076] FAT-fs (loop6): unable to read boot sector
[ 651.948255] FAT-fs (loop5): unable to read boot sector
[ 651.954813] CPU: 0 UID: 0 PID: 7091 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 651.954846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 651.954859] Call Trace:
[ 651.954867]
[ 651.954875] dump_stack_lvl+0xfa/0x120
[ 651.954916] should_fail_ex+0x4d7/0x5e0
[ 651.954956] ? __kernfs_new_node+0xd3/0x940
[ 651.954988] should_failslab+0xc2/0x120
[ 651.955014] kmem_cache_alloc_noprof+0x80/0x760
[ 651.955056] ? __kernfs_new_node+0xd3/0x940
[ 651.955087] __kernfs_new_node+0xd3/0x940
[ 651.955118] ? __lock_acquire+0x451/0x2250
[ 651.955151] ? __pfx___kernfs_new_node+0x10/0x10
[ 651.955189] ? lock_acquire+0x15e/0x2d0
[ 651.955216] ? kernfs_root+0x23/0x2a0
[ 651.955248] ? find_held_lock+0x2b/0x80
[ 651.955285] ? kernfs_root+0xee/0x2a0
[ 651.955316] ? lock_release+0xc8/0x270
[ 651.955344] ? lock_is_held_type+0x9e/0x120
[ 651.955373] kernfs_new_node+0x13c/0x1e0
[ 651.955415] __kernfs_create_file+0x55/0x360
[ 651.955446] sysfs_add_file_mode_ns+0x21c/0x430
[ 651.955480] ? __pfx_dev_attr_store+0x10/0x10
[ 651.955523] internal_create_group+0x662/0xeb0
[ 651.955567] ? __pfx_internal_create_group+0x10/0x10
[ 651.955600] ? blk_validate_limits+0xe47/0x15d0
[ 651.955633] ? lock_is_held_type+0x9e/0x120
[ 651.955658] loop_configure+0xc46/0x15a0
[ 651.955715] ? __pfx_loop_configure+0x10/0x10
[ 651.955764] ? avc_has_extended_perms+0x107/0xf20
[ 651.955793] ? find_held_lock+0x2b/0x80
[ 651.955828] ? avc_has_extended_perms+0x23b/0xf20
[ 651.955856] ? lock_release+0xc8/0x270
[ 651.955887] lo_ioctl+0x674/0x1cb0
[ 651.955921] ? perf_tp_event+0x807/0xe70
[ 651.955945] ? __pfx_lo_ioctl+0x10/0x10
[ 651.955976] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 651.956008] ? __pfx_perf_tp_event+0x10/0x10
[ 651.956035] ? find_held_lock+0x2b/0x80
[ 651.956075] ? __lock_acquire+0x451/0x2250
[ 651.956103] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 651.956140] ? blkdev_common_ioctl+0x1c3/0x2860
[ 651.956201] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 651.956237] ? __fget_files+0x34/0x3b0
[ 651.956261] ? find_held_lock+0x2b/0x80
[ 651.956297] ? __fget_files+0x203/0x3b0
[ 651.956322] ? __pfx_lo_ioctl+0x10/0x10
[ 651.956353] blkdev_ioctl+0x365/0x6d0
[ 651.956383] ? __pfx_blkdev_ioctl+0x10/0x10
[ 651.956413] ? selinux_file_ioctl+0xb9/0x280
[ 651.956450] ? __pfx_blkdev_ioctl+0x10/0x10
[ 651.956482] __x64_sys_ioctl+0x18f/0x210
[ 651.956520] do_syscall_64+0xbf/0x420
[ 651.956548] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 651.956572] RIP: 0033:0x7f591fd238d7
[ 651.956590] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 651.956612] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 651.956635] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fd238d7
[ 651.956651] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 651.956665] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 651.956679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 651.956693] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 651.956723]
07:36:35 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 23)
07:36:35 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 10)
07:36:35 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 2)
07:36:35 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 16)
[ 652.069239] FAT-fs (loop2): unable to read boot sector
[ 652.079527] FAULT_INJECTION: forcing a failure.
[ 652.079527] name failslab, interval 1, probability 0, space 0, times 0
[ 652.080422] CPU: 1 UID: 0 PID: 7098 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 652.080439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 652.080446] Call Trace:
[ 652.080452]
[ 652.080456] dump_stack_lvl+0xfa/0x120
[ 652.080480] should_fail_ex+0x4d7/0x5e0
[ 652.080504] ? alloc_empty_file+0x58/0x1e0
[ 652.080520] should_failslab+0xc2/0x120
[ 652.080534] kmem_cache_alloc_noprof+0x80/0x760
[ 652.080552] ? d_instantiate+0x92/0xb0
[ 652.080571] ? alloc_empty_file+0x58/0x1e0
[ 652.080584] ? _raw_spin_unlock+0x1e/0x40
[ 652.080601] alloc_empty_file+0x58/0x1e0
[ 652.080617] alloc_file_pseudo+0x12b/0x220
[ 652.080633] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 652.080653] __shmem_file_setup+0x1a8/0x370
[ 652.080670] __do_sys_memfd_create+0x4cc/0xa90
[ 652.080689] ? ksys_write+0x1a3/0x240
[ 652.080700] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 652.080717] ? irqentry_exit+0xee/0x650
[ 652.080728] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 652.080744] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 652.080765] do_syscall_64+0xbf/0x420
[ 652.080780] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 652.080793] RIP: 0033:0x7fb40288db19
[ 652.080802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 652.080814] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 652.080826] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288db19
[ 652.080834] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb4028e70fb
[ 652.080841] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 652.080849] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 652.080856] R13: 0000000020000040 R14: 0000000000000007 R15: 0000000020000080
[ 652.080871]
[ 652.097145] FAT-fs (loop4): unable to read boot sector
[ 652.100757] FAT-fs (loop7): unable to read boot sector
07:36:35 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 28)
07:36:35 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 27)
07:36:35 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 24)
07:36:35 executing program 1:
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100))
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 652.162679] FAULT_INJECTION: forcing a failure.
[ 652.162679] name failslab, interval 1, probability 0, space 0, times 0
07:36:35 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 6)
07:36:35 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 3)
[ 652.192609] FAULT_INJECTION: forcing a failure.
[ 652.192609] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 652.193572] CPU: 1 UID: 0 PID: 7108 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 652.193590] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 652.193598] Call Trace:
[ 652.193605]
[ 652.193611] dump_stack_lvl+0xfa/0x120
[ 652.193632] should_fail_ex+0x4d7/0x5e0
[ 652.193657] strncpy_from_user+0x3b/0x2f0
[ 652.193677] __do_sys_memfd_create+0x21e/0xa90
[ 652.193700] ? ksys_write+0x1a3/0x240
[ 652.193713] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 652.193732] ? irqentry_exit+0xee/0x650
[ 652.193745] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 652.193762] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 652.193785] do_syscall_64+0xbf/0x420
[ 652.193801] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 652.193816] RIP: 0033:0x7f184d908b19
[ 652.193826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 652.193838] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 652.193851] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d908b19
[ 652.193860] RDX: 00007f184ae7e000 RSI: 0000000000000000 RDI: 00007f184d9620fb
[ 652.193868] RBP: 0000000000000000 R08: 00007f184ae7dff8 R09: ffffffffffffffff
[ 652.193877] R10: 00007f184ae7dffc R11: 0000000000000246 R12: 0000000020000000
[ 652.193885] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 652.193906]
[ 652.194941] CPU: 0 UID: 0 PID: 7102 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 652.194974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 652.194986] Call Trace:
[ 652.194994]
[ 652.195003] dump_stack_lvl+0xfa/0x120
[ 652.195031] should_fail_ex+0x4d7/0x5e0
[ 652.195070] should_failslab+0xc2/0x120
[ 652.195096] __kmalloc_noprof+0xd6/0x830
[ 652.195126] ? perf_trace_run_bpf_submit+0xef/0x180
[ 652.195153] ? ext4_find_extent+0x7f5/0xa00
[ 652.195191] ? ext4_find_extent+0x7f5/0xa00
[ 652.195221] ext4_find_extent+0x7f5/0xa00
[ 652.195260] ext4_ext_map_blocks+0x1cc/0x6050
[ 652.195299] ? lock_is_held_type+0x9e/0x120
[ 652.195331] ? bdev_getblk+0xd6/0x660
[ 652.195365] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 652.195402] ? crc32c+0x1ae/0x350
[ 652.195436] ? look_up_lock_class+0x56/0x130
[ 652.195475] ? register_lock_class+0x3f/0x790
[ 652.195510] ? __lock_acquire+0x451/0x2250
[ 652.195550] ? lock_acquire+0x15e/0x2d0
[ 652.195577] ? ext4_map_blocks+0x4a8/0x1470
[ 652.195606] ext4_map_query_blocks+0x110/0x900
[ 652.195646] ? __pfx_ext4_map_query_blocks+0x10/0x10
[ 652.195679] ? do_raw_read_unlock+0x44/0xe0
[ 652.195714] ? __pfx_down_read+0x10/0x10
[ 652.195739] ? ext4_es_lookup_extent+0xcd/0xb50
[ 652.195770] ext4_map_blocks+0x4bc/0x1470
[ 652.195805] ? __pfx_ext4_map_blocks+0x10/0x10
[ 652.195828] ? __pfx_ext4_initxattrs+0x10/0x10
[ 652.195864] ? __pfx_security_inode_init_security+0x10/0x10
[ 652.195897] ? _raw_spin_unlock+0x1e/0x40
[ 652.195935] ? insert_inode_locked+0x3fb/0x890
[ 652.195970] ? crc32c+0x1ae/0x350
[ 652.196000] ? __brelse+0x86/0xa0
[ 652.196021] ? __ext4_new_inode+0x116/0x4cd0
[ 652.196054] ext4_append+0x1af/0x530
[ 652.196084] ? __pfx_ext4_append+0x10/0x10
[ 652.196114] ? __pfx___ext4_new_inode+0x10/0x10
[ 652.196151] ext4_init_new_dir+0x13c/0x240
[ 652.196184] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 652.196228] ext4_mkdir+0x3c5/0xb30
[ 652.196267] ? __pfx_ext4_mkdir+0x10/0x10
[ 652.196299] ? security_inode_permission+0x72/0xe0
[ 652.196331] vfs_mkdir+0x6d8/0xc00
[ 652.196370] filename_mkdirat+0x118/0x430
[ 652.196400] ? __pfx_filename_mkdirat+0x10/0x10
[ 652.196427] ? strncpy_from_user+0x21b/0x2f0
[ 652.196466] __x64_sys_mkdir+0x6e/0xd0
[ 652.196492] do_syscall_64+0xbf/0x420
[ 652.196520] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 652.196543] RIP: 0033:0x7f1e78939c27
[ 652.196561] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 652.196583] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 652.196606] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 652.196621] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 652.196635] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 652.196649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 652.196663] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 652.196696]
[ 652.236848] FAULT_INJECTION: forcing a failure.
[ 652.236848] name failslab, interval 1, probability 0, space 0, times 0
[ 652.238284] CPU: 1 UID: 0 PID: 7110 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 652.238301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 652.238308] Call Trace:
[ 652.238312]
[ 652.238316] dump_stack_lvl+0xfa/0x120
[ 652.238331] should_fail_ex+0x4d7/0x5e0
[ 652.238351] ? __kernfs_new_node+0xd3/0x940
[ 652.238367] should_failslab+0xc2/0x120
[ 652.238380] kmem_cache_alloc_noprof+0x80/0x760
[ 652.238401] ? __kernfs_new_node+0xd3/0x940
[ 652.238417] __kernfs_new_node+0xd3/0x940
[ 652.238432] ? __lock_acquire+0x451/0x2250
[ 652.238448] ? __pfx___kernfs_new_node+0x10/0x10
[ 652.238467] ? lock_acquire+0x15e/0x2d0
[ 652.238481] ? kernfs_root+0x23/0x2a0
[ 652.238497] ? find_held_lock+0x2b/0x80
[ 652.238517] ? kernfs_root+0xee/0x2a0
[ 652.238532] ? lock_release+0xc8/0x270
[ 652.238546] ? lock_is_held_type+0x9e/0x120
[ 652.238560] kernfs_new_node+0x13c/0x1e0
[ 652.238581] __kernfs_create_file+0x55/0x360
[ 652.238597] sysfs_add_file_mode_ns+0x21c/0x430
[ 652.238614] ? __pfx_dev_attr_store+0x10/0x10
[ 652.238634] internal_create_group+0x662/0xeb0
[ 652.238657] ? __pfx_internal_create_group+0x10/0x10
[ 652.238673] ? blk_validate_limits+0xe47/0x15d0
[ 652.238691] ? lock_is_held_type+0x9e/0x120
[ 652.238703] loop_configure+0xc46/0x15a0
[ 652.238733] ? __pfx_loop_configure+0x10/0x10
[ 652.238758] ? avc_has_extended_perms+0x107/0xf20
[ 652.238772] ? find_held_lock+0x2b/0x80
[ 652.238790] ? avc_has_extended_perms+0x23b/0xf20
[ 652.238804] ? lock_release+0xc8/0x270
[ 652.238820] lo_ioctl+0x674/0x1cb0
[ 652.238837] ? perf_tp_event+0x807/0xe70
[ 652.238849] ? __pfx_lo_ioctl+0x10/0x10
[ 652.238873] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 652.238891] ? __pfx_perf_tp_event+0x10/0x10
[ 652.238905] ? perf_trace_preemptirq_template+0x259/0x430
[ 652.238923] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 652.238939] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 652.238959] ? blkdev_common_ioctl+0x1c3/0x2860
[ 652.238989] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 652.239008] ? __fget_files+0x34/0x3b0
[ 652.239020] ? find_held_lock+0x2b/0x80
[ 652.239038] ? __fget_files+0x203/0x3b0
[ 652.239050] ? __pfx_lo_ioctl+0x10/0x10
[ 652.239066] blkdev_ioctl+0x365/0x6d0
[ 652.239080] ? __pfx_blkdev_ioctl+0x10/0x10
[ 652.239095] ? selinux_file_ioctl+0xb9/0x280
[ 652.239115] ? __pfx_blkdev_ioctl+0x10/0x10
[ 652.239130] __x64_sys_ioctl+0x18f/0x210
[ 652.239149] do_syscall_64+0xbf/0x420
[ 652.239163] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 652.239175] RIP: 0033:0x7f775d7e38d7
[ 652.239184] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 652.239195] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 652.239207] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 652.239215] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 652.239222] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 652.239229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 652.239235] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 652.239250]
[ 652.255089] FAT-fs (loop4): unable to read boot sector
[ 652.259124] FAULT_INJECTION: forcing a failure.
[ 652.259124] name failslab, interval 1, probability 0, space 0, times 0
[ 652.278673] FAT-fs (loop2): unable to read boot sector
[ 652.285716] CPU: 1 UID: 0 PID: 7112 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 652.285733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 652.285740] Call Trace:
[ 652.285743]
[ 652.285748] dump_stack_lvl+0xfa/0x120
[ 652.285769] should_fail_ex+0x4d7/0x5e0
[ 652.285789] ? security_inode_alloc+0x3e/0x130
[ 652.285808] should_failslab+0xc2/0x120
[ 652.285821] kmem_cache_alloc_noprof+0x80/0x760
[ 652.285838] ? __pfx_map_id_range_down+0x10/0x10
[ 652.285855] ? __create_object+0x59/0x80
[ 652.285872] ? security_inode_alloc+0x3e/0x130
[ 652.285890] security_inode_alloc+0x3e/0x130
[ 652.285909] inode_init_always_gfp+0xc9d/0xff0
[ 652.285924] alloc_inode+0x8d/0x250
[ 652.285940] new_inode+0x1e/0x160
[ 652.285956] __shmem_get_inode+0x17c/0xe80
[ 652.285973] __shmem_file_setup+0x108/0x370
[ 652.285989] __do_sys_memfd_create+0x4cc/0xa90
[ 652.286007] ? ksys_write+0x1a3/0x240
[ 652.286018] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 652.286035] ? irqentry_exit+0xee/0x650
[ 652.286046] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 652.286061] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 652.286080] do_syscall_64+0xbf/0x420
[ 652.286094] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 652.286106] RIP: 0033:0x7f5a8d2b4b19
[ 652.286115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 652.286127] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 652.286138] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b4b19
[ 652.286146] RDX: 00007f5a8a82a000 RSI: 0000000000000000 RDI: 00007f5a8d30e0fb
[ 652.286153] RBP: 0000000000000000 R08: 00007f5a8a829ff8 R09: ffffffffffffffff
[ 652.286170] R10: 00007f5a8a829ffc R11: 0000000000000246 R12: 0000000020000000
[ 652.286178] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 652.286193]
[ 652.301519] FAT-fs (loop5): unable to read boot sector
07:36:45 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 17)
07:36:45 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 25)
07:36:45 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x301800, 0x0)
open_by_handle_at(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0c0003bd3d04f7b476b5f1000086000000fdffffff1c000000000000b03789b56ee2446284ffa67844d514c7aaaece8d07210afb2063562dc0d03ac67ccf7294ac12e867d171d2d7f2c242861725abdcd14a4792013b459e5ca2953734a42bcc00ae01d9ddc8629187a416dc45b8e2eabde8a79949c3d702a3067260c979d1f4ecc40b34fd869ee15fdc0ab5beef1b86bce0acba7c37c9886b07da46210d0ed240817cf8ee44399e7283c726737d6e0994eab288b8e5604c06efeaac101e58f420dffac92e836cf8d318db012cbdf0f738"], 0x101400)
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
prlimit64(r2, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r2, 0x3, r1, 0xa)
r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
r5 = getpgrp(r2)
perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x6, 0x3, 0x8, 0xf3, 0x0, 0x1, 0x1000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0xa821, 0x3, 0x200, 0x5, 0x6, 0x1, 0x8, 0x0, 0x10000, 0x0, 0xfffffffffffffff9}, r5, 0x1, r3, 0x1d)
r6 = dup(r4)
connect$802154_dgram(r6, &(0x7f0000000000)={0x24, @long}, 0x11)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0xe8}}, './file0\x00'})
clone3(&(0x7f0000000400)={0x40200, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x2b}, &(0x7f0000000300)=""/181, 0xb5, &(0x7f00000001c0)=""/31, &(0x7f00000003c0)=[0xffffffffffffffff, r2, 0x0, 0xffffffffffffffff], 0x4, {r6}}, 0x58)
07:36:45 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 7)
07:36:45 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 29)
07:36:45 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 4)
07:36:45 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 28)
07:36:45 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 11)
[ 661.305466] FAULT_INJECTION: forcing a failure.
[ 661.305466] name failslab, interval 1, probability 0, space 0, times 0
[ 661.308054] FAULT_INJECTION: forcing a failure.
[ 661.308054] name failslab, interval 1, probability 0, space 0, times 0
[ 661.310280] FAT-fs (loop5): unable to read boot sector
[ 661.311737] CPU: 1 UID: 0 PID: 7130 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.311755] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.311762] Call Trace:
[ 661.311767]
[ 661.311771] dump_stack_lvl+0xfa/0x120
[ 661.311791] should_fail_ex+0x4d7/0x5e0
[ 661.311813] ? shmem_alloc_inode+0x27/0x50
[ 661.311826] should_failslab+0xc2/0x120
[ 661.311840] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 661.311863] ? shmem_alloc_inode+0x27/0x50
[ 661.311874] shmem_alloc_inode+0x27/0x50
[ 661.311885] ? __pfx_shmem_alloc_inode+0x10/0x10
[ 661.311900] alloc_inode+0x67/0x250
[ 661.311918] new_inode+0x1e/0x160
[ 661.311935] __shmem_get_inode+0x17c/0xe80
[ 661.311951] __shmem_file_setup+0x108/0x370
[ 661.311966] __do_sys_memfd_create+0x4cc/0xa90
[ 661.311985] ? ksys_write+0x1a3/0x240
[ 661.311997] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 661.312014] ? irqentry_exit+0xee/0x650
[ 661.312025] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 661.312041] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 661.312062] do_syscall_64+0xbf/0x420
[ 661.312077] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.312090] RIP: 0033:0x7f184d908b19
[ 661.312099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.312111] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 661.312122] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d908b19
[ 661.312130] RDX: 00007f184ae7e000 RSI: 0000000000000000 RDI: 00007f184d9620fb
[ 661.312138] RBP: 0000000000000000 R08: 00007f184ae7dff8 R09: ffffffffffffffff
[ 661.312145] R10: 00007f184ae7dffc R11: 0000000000000246 R12: 0000000020000000
[ 661.312153] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 661.312168]
[ 661.326789] CPU: 1 UID: 0 PID: 7131 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.326805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.326812] Call Trace:
[ 661.326816]
[ 661.326820] dump_stack_lvl+0xfa/0x120
[ 661.326834] should_fail_ex+0x4d7/0x5e0
[ 661.326854] ? __kernfs_new_node+0xd3/0x940
[ 661.326872] should_failslab+0xc2/0x120
[ 661.326884] kmem_cache_alloc_noprof+0x80/0x760
[ 661.326911] ? __kernfs_new_node+0xd3/0x940
[ 661.326927] __kernfs_new_node+0xd3/0x940
[ 661.326942] ? __lock_acquire+0x451/0x2250
[ 661.326958] ? __pfx___kernfs_new_node+0x10/0x10
[ 661.326977] ? lock_acquire+0x15e/0x2d0
[ 661.326991] ? kernfs_root+0x23/0x2a0
[ 661.327007] ? find_held_lock+0x2b/0x80
[ 661.327026] ? kernfs_root+0xee/0x2a0
[ 661.327043] ? lock_release+0xc8/0x270
[ 661.327056] ? lock_is_held_type+0x9e/0x120
[ 661.327070] kernfs_new_node+0x13c/0x1e0
[ 661.327092] __kernfs_create_file+0x55/0x360
[ 661.327107] sysfs_add_file_mode_ns+0x21c/0x430
[ 661.327124] ? __pfx_dev_attr_store+0x10/0x10
[ 661.327144] internal_create_group+0x662/0xeb0
[ 661.327167] ? __pfx_internal_create_group+0x10/0x10
[ 661.327184] ? blk_validate_limits+0xe47/0x15d0
[ 661.327201] ? lock_is_held_type+0x9e/0x120
[ 661.327214] loop_configure+0xc46/0x15a0
[ 661.327244] ? __pfx_loop_configure+0x10/0x10
[ 661.327268] ? avc_has_extended_perms+0x107/0xf20
[ 661.327283] ? find_held_lock+0x2b/0x80
[ 661.327301] ? avc_has_extended_perms+0x23b/0xf20
[ 661.327315] ? lock_release+0xc8/0x270
[ 661.327331] lo_ioctl+0x674/0x1cb0
[ 661.327350] ? __pfx_lo_ioctl+0x10/0x10
[ 661.327366] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 661.327385] ? lock_acquire+0x15e/0x2d0
[ 661.327399] ? __virt_addr_valid+0x1c6/0x5d0
[ 661.327413] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 661.327429] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 661.327444] ? lock_release+0xc8/0x270
[ 661.327458] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 661.327478] ? blkdev_common_ioctl+0x1c3/0x2860
[ 661.327509] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 661.327528] ? __fget_files+0x34/0x3b0
[ 661.327540] ? find_held_lock+0x2b/0x80
[ 661.327559] ? __fget_files+0x203/0x3b0
[ 661.327572] ? __pfx_lo_ioctl+0x10/0x10
[ 661.327587] blkdev_ioctl+0x365/0x6d0
[ 661.327602] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.327617] ? selinux_file_ioctl+0xb9/0x280
[ 661.327637] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.327653] __x64_sys_ioctl+0x18f/0x210
[ 661.327673] do_syscall_64+0xbf/0x420
[ 661.327686] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.327698] RIP: 0033:0x7f591fd238d7
[ 661.327707] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.327719] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 661.327730] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fd238d7
[ 661.327738] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 661.327745] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 661.327753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
07:36:45 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 29)
[ 661.327760] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 661.327775]
[ 661.343250] No source specified
[ 661.364685] FAT-fs (loop0): unable to read boot sector
[ 661.368202] FAULT_INJECTION: forcing a failure.
[ 661.368202] name failslab, interval 1, probability 0, space 0, times 0
[ 661.369201] CPU: 1 UID: 0 PID: 7133 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.369217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.369225] Call Trace:
[ 661.369229]
[ 661.369234] dump_stack_lvl+0xfa/0x120
[ 661.369251] should_fail_ex+0x4d7/0x5e0
[ 661.369272] ? __kernfs_new_node+0xd3/0x940
[ 661.369289] should_failslab+0xc2/0x120
[ 661.369302] kmem_cache_alloc_noprof+0x80/0x760
[ 661.369325] ? __kernfs_new_node+0xd3/0x940
[ 661.369341] __kernfs_new_node+0xd3/0x940
[ 661.369356] ? __lock_acquire+0x451/0x2250
[ 661.369374] ? __pfx___kernfs_new_node+0x10/0x10
[ 661.369393] ? lock_acquire+0x15e/0x2d0
[ 661.369407] ? kernfs_root+0x23/0x2a0
[ 661.369423] ? find_held_lock+0x2b/0x80
[ 661.369441] ? kernfs_root+0xee/0x2a0
[ 661.369457] ? lock_release+0xc8/0x270
[ 661.369471] ? lock_is_held_type+0x9e/0x120
[ 661.369486] kernfs_new_node+0x13c/0x1e0
[ 661.369508] __kernfs_create_file+0x55/0x360
[ 661.369523] sysfs_add_file_mode_ns+0x21c/0x430
[ 661.369541] ? __pfx_dev_attr_store+0x10/0x10
[ 661.369560] internal_create_group+0x662/0xeb0
[ 661.369583] ? __pfx_internal_create_group+0x10/0x10
[ 661.369600] ? blk_validate_limits+0xe47/0x15d0
[ 661.369617] ? lock_is_held_type+0x9e/0x120
[ 661.369630] loop_configure+0xc46/0x15a0
[ 661.369662] ? __pfx_loop_configure+0x10/0x10
[ 661.369688] ? avc_has_extended_perms+0x107/0xf20
[ 661.369703] ? find_held_lock+0x2b/0x80
[ 661.369722] ? avc_has_extended_perms+0x23b/0xf20
[ 661.369736] ? lock_release+0xc8/0x270
[ 661.369752] lo_ioctl+0x674/0x1cb0
[ 661.369772] ? __pfx_lo_ioctl+0x10/0x10
[ 661.369788] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 661.369803] ? __pfx_perf_trace_lock+0x10/0x10
[ 661.369822] ? lock_acquire+0x15e/0x2d0
[ 661.369836] ? __virt_addr_valid+0x1c6/0x5d0
[ 661.369851] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 661.369868] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 661.369883] ? lock_release+0xc8/0x270
[ 661.369902] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 661.369922] ? blkdev_common_ioctl+0x1c3/0x2860
[ 661.369956] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 661.369975] ? __fget_files+0x34/0x3b0
[ 661.369987] ? find_held_lock+0x2b/0x80
[ 661.370005] ? __fget_files+0x203/0x3b0
[ 661.370018] ? __pfx_lo_ioctl+0x10/0x10
[ 661.370034] blkdev_ioctl+0x365/0x6d0
[ 661.370049] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.370065] ? selinux_file_ioctl+0xb9/0x280
[ 661.370084] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.370100] __x64_sys_ioctl+0x18f/0x210
[ 661.370120] do_syscall_64+0xbf/0x420
[ 661.370134] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.370146] RIP: 0033:0x7fe78a9178d7
[ 661.370156] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.370167] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 661.370179] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 661.370187] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 661.370194] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 661.370201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 661.370208] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 661.370225]
[ 661.373058] FAT-fs (loop6): unable to read boot sector
[ 661.386500] FAT-fs (loop2): unable to read boot sector
[ 661.424258] FAT-fs (loop4): unable to read boot sector
[ 661.434068] FAULT_INJECTION: forcing a failure.
[ 661.434068] name failslab, interval 1, probability 0, space 0, times 0
07:36:45 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 5)
07:36:45 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 8)
[ 661.456985] CPU: 1 UID: 0 PID: 7140 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.457003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.457011] Call Trace:
[ 661.457016]
[ 661.457021] dump_stack_lvl+0xfa/0x120
[ 661.457041] should_fail_ex+0x4d7/0x5e0
[ 661.457064] ? __kernfs_new_node+0xd3/0x940
[ 661.457082] should_failslab+0xc2/0x120
[ 661.457097] kmem_cache_alloc_noprof+0x80/0x760
[ 661.457120] ? __kernfs_new_node+0xd3/0x940
[ 661.457136] __kernfs_new_node+0xd3/0x940
[ 661.457151] ? __lock_acquire+0x451/0x2250
[ 661.457170] ? __pfx___kernfs_new_node+0x10/0x10
[ 661.457190] ? lock_acquire+0x15e/0x2d0
[ 661.457204] ? kernfs_root+0x23/0x2a0
[ 661.457220] ? find_held_lock+0x2b/0x80
[ 661.457239] ? kernfs_root+0xee/0x2a0
[ 661.457255] ? lock_release+0xc8/0x270
[ 661.457268] ? lock_is_held_type+0x9e/0x120
[ 661.457284] kernfs_new_node+0x13c/0x1e0
[ 661.457306] __kernfs_create_file+0x55/0x360
[ 661.457322] sysfs_add_file_mode_ns+0x21c/0x430
[ 661.457340] ? __pfx_dev_attr_store+0x10/0x10
[ 661.457361] internal_create_group+0x662/0xeb0
[ 661.457384] ? __pfx_internal_create_group+0x10/0x10
[ 661.457401] ? blk_validate_limits+0xe47/0x15d0
[ 661.457419] ? lock_is_held_type+0x9e/0x120
[ 661.457432] loop_configure+0xc46/0x15a0
[ 661.457464] ? __pfx_loop_configure+0x10/0x10
[ 661.457491] ? avc_has_extended_perms+0x107/0xf20
[ 661.457507] ? find_held_lock+0x2b/0x80
[ 661.457525] ? avc_has_extended_perms+0x23b/0xf20
[ 661.457539] ? lock_release+0xc8/0x270
[ 661.457556] lo_ioctl+0x674/0x1cb0
[ 661.457574] ? perf_tp_event+0x807/0xe70
[ 661.457587] ? __pfx_lo_ioctl+0x10/0x10
[ 661.457603] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 661.457619] ? __pfx_perf_tp_event+0x10/0x10
[ 661.457633] ? perf_trace_preemptirq_template+0x259/0x430
[ 661.457653] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 661.457669] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 661.457689] ? blkdev_common_ioctl+0x1c3/0x2860
[ 661.457724] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 661.457742] ? __fget_files+0x34/0x3b0
[ 661.457755] ? find_held_lock+0x2b/0x80
[ 661.457773] ? __fget_files+0x203/0x3b0
[ 661.457786] ? __pfx_lo_ioctl+0x10/0x10
[ 661.457802] blkdev_ioctl+0x365/0x6d0
[ 661.457817] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.457833] ? selinux_file_ioctl+0xb9/0x280
[ 661.457852] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.457868] __x64_sys_ioctl+0x18f/0x210
[ 661.457889] do_syscall_64+0xbf/0x420
[ 661.457908] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.457921] RIP: 0033:0x7f775d7e38d7
[ 661.457930] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.457942] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 661.457954] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 661.457962] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 661.457969] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 661.457976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 661.457983] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 661.458000]
07:36:45 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 12)
07:36:45 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 18)
[ 661.523362] FAT-fs (loop5): unable to read boot sector
[ 661.533782] FAT-fs (loop7): unable to read boot sector
[ 661.536650] FAULT_INJECTION: forcing a failure.
[ 661.536650] name failslab, interval 1, probability 0, space 0, times 0
[ 661.537608] CPU: 1 UID: 0 PID: 7144 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.537626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.537636] Call Trace:
[ 661.537642]
[ 661.537649] dump_stack_lvl+0xfa/0x120
[ 661.537671] should_fail_ex+0x4d7/0x5e0
[ 661.537695] ? security_file_alloc+0x35/0x130
[ 661.537710] should_failslab+0xc2/0x120
[ 661.537725] kmem_cache_alloc_noprof+0x80/0x760
[ 661.537744] ? __create_object+0x59/0x80
[ 661.537768] ? security_file_alloc+0x35/0x130
[ 661.537782] security_file_alloc+0x35/0x130
[ 661.537797] init_file+0x95/0x480
[ 661.537814] alloc_empty_file+0x76/0x1e0
[ 661.537831] alloc_file_pseudo+0x12b/0x220
[ 661.537849] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 661.537874] __shmem_file_setup+0x1a8/0x370
[ 661.537894] __do_sys_memfd_create+0x4cc/0xa90
[ 661.537919] ? ksys_write+0x1a3/0x240
[ 661.537931] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 661.537949] ? irqentry_exit+0xee/0x650
[ 661.537961] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 661.537979] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 661.538001] do_syscall_64+0xbf/0x420
[ 661.538017] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.538031] RIP: 0033:0x7fb40288db19
[ 661.538041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.538054] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 661.538067] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288db19
[ 661.538076] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fb4028e70fb
[ 661.538084] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff
[ 661.538093] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000
[ 661.538101] R13: 0000000020000040 R14: 0000000000000007 R15: 0000000020000080
[ 661.538119]
07:36:45 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 26)
[ 661.564279] FAULT_INJECTION: forcing a failure.
[ 661.564279] name failslab, interval 1, probability 0, space 0, times 0
[ 661.566183] CPU: 0 UID: 0 PID: 7148 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.566212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.566227] Call Trace:
[ 661.566234]
[ 661.566243] dump_stack_lvl+0xfa/0x120
[ 661.566290] should_fail_ex+0x4d7/0x5e0
[ 661.566332] ? __es_insert_extent+0xed2/0x1370
[ 661.566366] should_failslab+0xc2/0x120
[ 661.566392] kmem_cache_alloc_noprof+0x80/0x760
[ 661.566437] ? __es_insert_extent+0xed2/0x1370
[ 661.566469] __es_insert_extent+0xed2/0x1370
[ 661.566506] ? __pfx_do_raw_write_lock+0x10/0x10
[ 661.566547] ? __es_tree_search.isra.0+0x1af/0x220
[ 661.566586] ext4_es_cache_extent+0x387/0x6f0
[ 661.566622] ? kasan_save_track+0x14/0x30
[ 661.566651] ? __pfx_ext4_es_cache_extent+0x10/0x10
[ 661.566686] ? lock_acquire+0x15e/0x2d0
[ 661.566714] ? ext4_es_find_extent_range+0x1b3/0x4b0
[ 661.566750] ? find_held_lock+0x2b/0x80
[ 661.566785] ? ext4_es_find_extent_range+0x1cf/0x4b0
[ 661.566821] ? lock_release+0xc8/0x270
[ 661.566851] ? do_raw_read_unlock+0x44/0xe0
[ 661.566892] ext4_ext_map_blocks+0x1714/0x6050
[ 661.566953] ? bdev_getblk+0xd6/0x660
[ 661.566988] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 661.567023] ? crc32c+0x1ae/0x350
[ 661.567051] ? look_up_lock_class+0x56/0x130
[ 661.567090] ? register_lock_class+0x3f/0x790
[ 661.567119] ? register_lock_class+0x3f/0x790
[ 661.567169] ? lock_acquire+0x15e/0x2d0
[ 661.567195] ? ext4_map_blocks+0x4a8/0x1470
[ 661.567224] ext4_map_query_blocks+0x110/0x900
[ 661.567262] ? __pfx_ext4_map_query_blocks+0x10/0x10
[ 661.567294] ? do_raw_read_unlock+0x44/0xe0
[ 661.567326] ? __pfx_down_read+0x10/0x10
[ 661.567350] ? ext4_es_lookup_extent+0xcd/0xb50
[ 661.567382] ext4_map_blocks+0x4bc/0x1470
[ 661.567414] ? __pfx_ext4_map_blocks+0x10/0x10
[ 661.567436] ? __pfx_ext4_initxattrs+0x10/0x10
[ 661.567470] ? __pfx_security_inode_init_security+0x10/0x10
[ 661.567502] ? _raw_spin_unlock+0x1e/0x40
[ 661.567532] ? insert_inode_locked+0x3fb/0x890
[ 661.567566] ? crc32c+0x1ae/0x350
[ 661.567594] ? __brelse+0x86/0xa0
[ 661.567615] ? __ext4_new_inode+0x116/0x4cd0
[ 661.567648] ext4_append+0x1af/0x530
[ 661.567678] ? __pfx_ext4_append+0x10/0x10
[ 661.567707] ? __pfx___ext4_new_inode+0x10/0x10
[ 661.567744] ext4_init_new_dir+0x13c/0x240
[ 661.567775] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 661.567819] ext4_mkdir+0x3c5/0xb30
[ 661.567858] ? __pfx_ext4_mkdir+0x10/0x10
[ 661.567888] ? security_inode_permission+0x72/0xe0
[ 661.567921] vfs_mkdir+0x6d8/0xc00
[ 661.567959] filename_mkdirat+0x118/0x430
[ 661.567988] ? __pfx_filename_mkdirat+0x10/0x10
[ 661.568014] ? strncpy_from_user+0x21b/0x2f0
[ 661.568054] __x64_sys_mkdir+0x6e/0xd0
[ 661.568079] do_syscall_64+0xbf/0x420
[ 661.568107] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.568130] RIP: 0033:0x7f1e78939c27
[ 661.568148] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.568170] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 661.568192] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 661.568206] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 661.568219] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 661.568233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 661.568246] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 661.568280]
[ 661.595544] FAT-fs (loop4): unable to read boot sector
[ 661.596334] FAULT_INJECTION: forcing a failure.
[ 661.596334] name failslab, interval 1, probability 0, space 0, times 0
[ 661.642856] CPU: 1 UID: 0 PID: 7147 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.642878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.642887] Call Trace:
[ 661.642892]
[ 661.642902] dump_stack_lvl+0xfa/0x120
[ 661.642924] should_fail_ex+0x4d7/0x5e0
[ 661.642949] ? __d_alloc+0x34/0x9c0
[ 661.642965] should_failslab+0xc2/0x120
[ 661.642981] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 661.643001] ? find_held_lock+0x2b/0x80
[ 661.643028] ? __d_alloc+0x34/0x9c0
[ 661.643041] __d_alloc+0x34/0x9c0
[ 661.643054] ? mpol_shared_policy_init+0x24f/0x390
[ 661.643079] d_alloc_pseudo+0x1d/0xc0
[ 661.643098] alloc_file_pseudo+0xbe/0x220
[ 661.643117] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 661.643133] ? __shmem_get_inode+0x684/0xe80
[ 661.643152] __shmem_file_setup+0x1a8/0x370
[ 661.643170] __do_sys_memfd_create+0x4cc/0xa90
[ 661.643192] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 661.643211] ? irqentry_exit+0xee/0x650
[ 661.643223] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 661.643240] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 661.643262] do_syscall_64+0xbf/0x420
[ 661.643278] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.643292] RIP: 0033:0x7f5a8d2b4b19
[ 661.643304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.643316] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 661.643330] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b4b19
[ 661.643338] RDX: 00007f5a8a82a000 RSI: 0000000000000000 RDI: 00007f5a8d30e0fb
[ 661.643347] RBP: 0000000000000000 R08: 00007f5a8a829ff8 R09: ffffffffffffffff
[ 661.643355] R10: 00007f5a8a829ffc R11: 0000000000000246 R12: 0000000020000000
[ 661.643363] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 661.643381]
[ 661.660637] No source specified
07:36:45 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 27)
07:36:45 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 13)
[ 661.717742] FAULT_INJECTION: forcing a failure.
[ 661.717742] name failslab, interval 1, probability 0, space 0, times 0
[ 661.719665] CPU: 0 UID: 0 PID: 7154 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 661.719698] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 661.719714] Call Trace:
[ 661.719723]
[ 661.719733] dump_stack_lvl+0xfa/0x120
[ 661.719771] should_fail_ex+0x4d7/0x5e0
[ 661.719818] ? __kernfs_new_node+0xd3/0x940
[ 661.719862] should_failslab+0xc2/0x120
[ 661.719896] kmem_cache_alloc_noprof+0x80/0x760
[ 661.719957] ? __kernfs_new_node+0xd3/0x940
[ 661.719994] __kernfs_new_node+0xd3/0x940
[ 661.720030] ? __lock_acquire+0x451/0x2250
[ 661.720071] ? __pfx___kernfs_new_node+0x10/0x10
[ 661.720117] ? lock_acquire+0x15e/0x2d0
[ 661.720157] ? kernfs_root+0x23/0x2a0
[ 661.720203] ? find_held_lock+0x2b/0x80
[ 661.720248] ? kernfs_root+0xee/0x2a0
[ 661.720282] ? lock_release+0xc8/0x270
[ 661.720310] ? lock_is_held_type+0x9e/0x120
[ 661.720341] kernfs_new_node+0x13c/0x1e0
[ 661.720386] __kernfs_create_file+0x55/0x360
[ 661.720419] sysfs_add_file_mode_ns+0x21c/0x430
[ 661.720456] ? __pfx_dev_attr_store+0x10/0x10
[ 661.720497] internal_create_group+0x662/0xeb0
[ 661.720544] ? __pfx_internal_create_group+0x10/0x10
[ 661.720579] ? blk_validate_limits+0xe47/0x15d0
[ 661.720615] ? lock_is_held_type+0x9e/0x120
[ 661.720642] loop_configure+0xc46/0x15a0
[ 661.720709] ? __pfx_loop_configure+0x10/0x10
[ 661.720762] ? avc_has_extended_perms+0x107/0xf20
[ 661.720793] ? find_held_lock+0x2b/0x80
[ 661.720832] ? avc_has_extended_perms+0x23b/0xf20
[ 661.720861] ? lock_release+0xc8/0x270
[ 661.720894] lo_ioctl+0x674/0x1cb0
[ 661.720931] ? perf_tp_event+0x807/0xe70
[ 661.720957] ? __pfx_lo_ioctl+0x10/0x10
[ 661.720990] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 661.721024] ? __pfx_perf_tp_event+0x10/0x10
[ 661.721053] ? perf_trace_preemptirq_template+0x259/0x430
[ 661.721092] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 661.721127] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 661.721168] ? blkdev_common_ioctl+0x1c3/0x2860
[ 661.721233] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 661.721279] ? __fget_files+0x34/0x3b0
[ 661.721310] ? find_held_lock+0x2b/0x80
[ 661.721348] ? __fget_files+0x203/0x3b0
[ 661.721375] ? __pfx_lo_ioctl+0x10/0x10
[ 661.721409] blkdev_ioctl+0x365/0x6d0
[ 661.721441] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.721473] ? selinux_file_ioctl+0xb9/0x280
[ 661.721514] ? __pfx_blkdev_ioctl+0x10/0x10
[ 661.721547] __x64_sys_ioctl+0x18f/0x210
[ 661.721588] do_syscall_64+0xbf/0x420
[ 661.721619] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 661.721646] RIP: 0033:0x7fe78a9178d7
[ 661.721666] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 661.721690] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 661.721716] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 661.721733] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 661.721748] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 661.721763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 661.721778] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 661.721811]
[ 661.722520] FAT-fs (loop0): unable to read boot sector
[ 661.732137] FAT-fs (loop4): unable to read boot sector
07:36:55 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 6)
07:36:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 30)
07:36:55 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
signalfd(r0, &(0x7f0000000100)={[0xfffffffffffffe01]}, 0x8)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x60e400, 0x14f)
setns(r1, 0x8000000)
07:36:55 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 28)
07:36:55 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 19)
07:36:55 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 9)
07:36:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 14)
07:36:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 30)
[ 671.929507] FAT-fs (loop5): unable to read boot sector
[ 671.932516] No source specified
07:36:55 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 20)
[ 671.995777] FAULT_INJECTION: forcing a failure.
[ 671.995777] name failslab, interval 1, probability 0, space 0, times 0
[ 671.998090] FAULT_INJECTION: forcing a failure.
[ 671.998090] name failslab, interval 1, probability 0, space 0, times 0
[ 672.001426] FAT-fs (loop2): unable to read boot sector
[ 672.002726] CPU: 1 UID: 0 PID: 7177 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.002754] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.002767] Call Trace:
[ 672.002774]
[ 672.002782] dump_stack_lvl+0xfa/0x120
[ 672.002811] should_fail_ex+0x4d7/0x5e0
[ 672.002847] ? do_getname+0x2b/0x3d0
[ 672.002872] should_failslab+0xc2/0x120
[ 672.002903] kmem_cache_alloc_noprof+0x80/0x760
[ 672.002934] ? vfs_write+0x169/0x1150
[ 672.002957] ? do_getname+0x2b/0x3d0
[ 672.002981] do_getname+0x2b/0x3d0
[ 672.003008] do_sys_openat2+0xa0/0x210
[ 672.003035] ? __pfx_do_sys_openat2+0x10/0x10
[ 672.003073] __x64_sys_openat+0x142/0x200
[ 672.003100] ? __pfx___x64_sys_openat+0x10/0x10
[ 672.003138] do_syscall_64+0xbf/0x420
[ 672.003162] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.003184] RIP: 0033:0x7fb402840a04
[ 672.003201] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 672.003220] RSP: 002b:00007fb3ffe02ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 672.003240] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb402840a04
[ 672.003254] RDX: 0000000000000002 RSI: 00007fb3ffe03000 RDI: 00000000ffffff9c
[ 672.003267] RBP: 00007fb3ffe03000 R08: 0000000000000000 R09: ffffffffffffffff
[ 672.003279] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 672.003291] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 672.003318]
[ 672.016398] FAT-fs (loop6): unable to read boot sector
[ 672.028102] CPU: 0 UID: 0 PID: 7175 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.028136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.028151] Call Trace:
[ 672.028159]
[ 672.028168] dump_stack_lvl+0xfa/0x120
[ 672.028203] should_fail_ex+0x4d7/0x5e0
[ 672.028242] ? security_inode_alloc+0x3e/0x130
[ 672.028277] should_failslab+0xc2/0x120
[ 672.028303] kmem_cache_alloc_noprof+0x80/0x760
[ 672.028334] ? __pfx_map_id_range_down+0x10/0x10
[ 672.028364] ? __create_object+0x59/0x80
[ 672.028398] ? security_inode_alloc+0x3e/0x130
[ 672.028433] security_inode_alloc+0x3e/0x130
[ 672.028468] inode_init_always_gfp+0xc9d/0xff0
[ 672.028499] alloc_inode+0x8d/0x250
[ 672.028529] new_inode+0x1e/0x160
[ 672.028561] __shmem_get_inode+0x17c/0xe80
[ 672.028592] __shmem_file_setup+0x108/0x370
[ 672.028623] __do_sys_memfd_create+0x4cc/0xa90
[ 672.028659] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 672.028692] ? irqentry_exit+0xee/0x650
[ 672.028713] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 672.028743] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 672.028779] do_syscall_64+0xbf/0x420
[ 672.028806] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.028830] RIP: 0033:0x7f184d908b19
[ 672.028850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 672.028873] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 672.028895] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d908b19
[ 672.028919] RDX: 00007f184ae7e000 RSI: 0000000000000000 RDI: 00007f184d9620fb
[ 672.028933] RBP: 0000000000000000 R08: 00007f184ae7dff8 R09: ffffffffffffffff
[ 672.028948] R10: 00007f184ae7dffc R11: 0000000000000246 R12: 0000000020000000
[ 672.028963] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 672.028993]
[ 672.064237] FAT-fs (loop4): unable to read boot sector
07:36:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 31)
07:36:55 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x9, 0x3, 0x7f, 0x0, 0x6, 0x3110, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x5, 0xc8fd, 0x9, 0x2, 0x1000, 0x4, 0x0, 0x3f, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xc)
07:36:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 31)
07:36:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 15)
[ 672.137190] FAULT_INJECTION: forcing a failure.
[ 672.137190] name failslab, interval 1, probability 0, space 0, times 0
[ 672.143864] FAULT_INJECTION: forcing a failure.
[ 672.143864] name failslab, interval 1, probability 0, space 0, times 0
07:36:55 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 7)
[ 672.158989] CPU: 0 UID: 0 PID: 7185 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.159022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.159035] Call Trace:
[ 672.159042]
[ 672.159051] dump_stack_lvl+0xfa/0x120
[ 672.159082] should_fail_ex+0x4d7/0x5e0
[ 672.159121] ? __kernfs_new_node+0xd3/0x940
[ 672.159151] should_failslab+0xc2/0x120
[ 672.159176] kmem_cache_alloc_noprof+0x80/0x760
[ 672.159215] ? __kernfs_new_node+0xd3/0x940
[ 672.159244] __kernfs_new_node+0xd3/0x940
[ 672.159273] ? __lock_acquire+0x451/0x2250
[ 672.159305] ? __pfx___kernfs_new_node+0x10/0x10
[ 672.159339] ? lock_acquire+0x15e/0x2d0
[ 672.159365] ? kernfs_root+0x23/0x2a0
[ 672.159394] ? find_held_lock+0x2b/0x80
[ 672.159428] ? kernfs_root+0xee/0x2a0
[ 672.159457] ? lock_release+0xc8/0x270
[ 672.159481] ? lock_is_held_type+0x9e/0x120
[ 672.159508] kernfs_new_node+0x13c/0x1e0
[ 672.159547] __kernfs_create_file+0x55/0x360
[ 672.159575] sysfs_add_file_mode_ns+0x21c/0x430
[ 672.159607] ? __pfx_dev_attr_store+0x10/0x10
[ 672.159643] internal_create_group+0x662/0xeb0
[ 672.159683] ? __pfx_internal_create_group+0x10/0x10
[ 672.159714] ? blk_validate_limits+0xe47/0x15d0
[ 672.159745] ? lock_is_held_type+0x9e/0x120
[ 672.159768] loop_configure+0xc46/0x15a0
[ 672.159822] ? __pfx_loop_configure+0x10/0x10
[ 672.159868] ? avc_has_extended_perms+0x107/0xf20
[ 672.159895] ? find_held_lock+0x2b/0x80
[ 672.159936] ? avc_has_extended_perms+0x23b/0xf20
[ 672.159962] ? lock_release+0xc8/0x270
[ 672.159992] lo_ioctl+0x674/0x1cb0
[ 672.160023] ? perf_tp_event+0x807/0xe70
[ 672.160046] ? __pfx_lo_ioctl+0x10/0x10
[ 672.160074] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 672.160104] ? __pfx_perf_tp_event+0x10/0x10
[ 672.160129] ? perf_trace_preemptirq_template+0x259/0x430
[ 672.160162] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 672.160193] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 672.160227] ? blkdev_common_ioctl+0x1c3/0x2860
[ 672.160283] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 672.160317] ? __fget_files+0x34/0x3b0
[ 672.160340] ? find_held_lock+0x2b/0x80
[ 672.160373] ? __fget_files+0x203/0x3b0
[ 672.160396] ? __pfx_lo_ioctl+0x10/0x10
[ 672.160426] blkdev_ioctl+0x365/0x6d0
[ 672.160453] ? __pfx_blkdev_ioctl+0x10/0x10
[ 672.160481] ? selinux_file_ioctl+0xb9/0x280
[ 672.160516] ? __pfx_blkdev_ioctl+0x10/0x10
[ 672.160545] __x64_sys_ioctl+0x18f/0x210
[ 672.160580] do_syscall_64+0xbf/0x420
[ 672.160606] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.160629] RIP: 0033:0x7f775d7e38d7
[ 672.160646] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 672.160668] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 672.160690] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 672.160704] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 672.160717] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 672.160731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 672.160743] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 672.160772]
[ 672.183112] FAULT_INJECTION: forcing a failure.
[ 672.183112] name failslab, interval 1, probability 0, space 0, times 0
[ 672.184116] CPU: 0 UID: 0 PID: 7186 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.184146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.184159] Call Trace:
[ 672.184166]
[ 672.184174] dump_stack_lvl+0xfa/0x120
[ 672.184199] should_fail_ex+0x4d7/0x5e0
[ 672.184235] should_failslab+0xc2/0x120
[ 672.184258] __kmalloc_noprof+0xd6/0x830
[ 672.184286] ? mark_held_locks+0x49/0x80
[ 672.184313] ? ext4_find_extent+0x7f5/0xa00
[ 672.184342] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 672.184375] ? ext4_find_extent+0x7f5/0xa00
[ 672.184403] ext4_find_extent+0x7f5/0xa00
[ 672.184439] ext4_ext_map_blocks+0x1cc/0x6050
[ 672.184495] ? bdev_getblk+0xd6/0x660
[ 672.184524] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 672.184555] ? __lock_acquire+0x451/0x2250
[ 672.184587] ? crc32c+0x1ae/0x350
[ 672.184619] ? lock_acquire+0x15e/0x2d0
[ 672.184645] ? ext4_map_blocks+0x564/0x1470
[ 672.184678] ? down_write+0x119/0x1f0
[ 672.184702] ? __pfx_down_write+0x10/0x10
[ 672.184734] ext4_map_blocks+0x62d/0x1470
[ 672.184760] ? __up_read+0x26f/0x710
[ 672.184790] ? __pfx_ext4_map_blocks+0x10/0x10
[ 672.184811] ? __pfx___up_read+0x10/0x10
[ 672.184843] ? lock_release+0xc8/0x270
[ 672.184875] ? ext4_map_blocks+0x1e9/0x1470
[ 672.184913] ext4_getblk+0x67d/0x8e0
[ 672.184936] ? __pfx_ext4_getblk+0x10/0x10
[ 672.184956] ? __pfx_security_inode_init_security+0x10/0x10
[ 672.184992] ? crc32c+0x1ae/0x350
[ 672.185025] ext4_bread+0x2e/0x1a0
[ 672.185048] ext4_append+0x21d/0x530
[ 672.185076] ? __pfx_ext4_append+0x10/0x10
[ 672.185104] ? __pfx___ext4_new_inode+0x10/0x10
[ 672.185139] ext4_init_new_dir+0x13c/0x240
[ 672.185170] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 672.185210] ext4_mkdir+0x3c5/0xb30
[ 672.185247] ? __pfx_ext4_mkdir+0x10/0x10
[ 672.185278] ? security_inode_permission+0x72/0xe0
[ 672.185307] vfs_mkdir+0x6d8/0xc00
[ 672.185343] filename_mkdirat+0x118/0x430
[ 672.185371] ? __pfx_filename_mkdirat+0x10/0x10
[ 672.185396] ? strncpy_from_user+0x21b/0x2f0
[ 672.185433] __x64_sys_mkdir+0x6e/0xd0
[ 672.185457] do_syscall_64+0xbf/0x420
[ 672.185482] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.185504] RIP: 0033:0x7f1e78939c27
[ 672.185521] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 672.185541] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 672.185562] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 672.185576] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 672.185589] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 672.185602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 672.185615] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 672.185646]
[ 672.234151] FAT-fs (loop5): unable to read boot sector
[ 672.255543] CPU: 0 UID: 0 PID: 7189 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.255574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.255586] Call Trace:
[ 672.255593]
[ 672.255601] dump_stack_lvl+0xfa/0x120
[ 672.255631] should_fail_ex+0x4d7/0x5e0
[ 672.255668] ? __kernfs_new_node+0xd3/0x940
[ 672.255698] should_failslab+0xc2/0x120
[ 672.255721] kmem_cache_alloc_noprof+0x80/0x760
[ 672.255761] ? __kernfs_new_node+0xd3/0x940
[ 672.255791] __kernfs_new_node+0xd3/0x940
07:36:56 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 10)
07:36:56 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 29)
[ 672.255820] ? __lock_acquire+0x451/0x2250
[ 672.255851] ? __pfx___kernfs_new_node+0x10/0x10
[ 672.255886] ? lock_acquire+0x15e/0x2d0
[ 672.255920] ? kernfs_root+0x23/0x2a0
[ 672.255949] ? find_held_lock+0x2b/0x80
[ 672.255983] ? kernfs_root+0xee/0x2a0
[ 672.256013] ? lock_release+0xc8/0x270
[ 672.256038] ? lock_is_held_type+0x9e/0x120
[ 672.256065] kernfs_new_node+0x13c/0x1e0
[ 672.256104] __kernfs_create_file+0x55/0x360
[ 672.256133] sysfs_add_file_mode_ns+0x21c/0x430
[ 672.256165] ? __pfx_dev_attr_store+0x10/0x10
[ 672.256200] internal_create_group+0x662/0xeb0
[ 672.256241] ? __pfx_internal_create_group+0x10/0x10
[ 672.256272] ? blk_validate_limits+0xe47/0x15d0
[ 672.256303] ? lock_is_held_type+0x9e/0x120
[ 672.256327] loop_configure+0xc46/0x15a0
[ 672.256381] ? __pfx_loop_configure+0x10/0x10
[ 672.256427] ? avc_has_extended_perms+0x107/0xf20
[ 672.256454] ? find_held_lock+0x2b/0x80
[ 672.256488] ? avc_has_extended_perms+0x23b/0xf20
[ 672.256514] ? lock_release+0xc8/0x270
[ 672.256544] lo_ioctl+0x674/0x1cb0
[ 672.256579] ? __pfx_lo_ioctl+0x10/0x10
[ 672.256608] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 672.256643] ? lock_acquire+0x15e/0x2d0
[ 672.256668] ? __virt_addr_valid+0x1c6/0x5d0
[ 672.256695] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 672.256726] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 672.256754] ? lock_release+0xc8/0x270
[ 672.256781] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 672.256816] ? blkdev_common_ioctl+0x1c3/0x2860
[ 672.256874] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 672.256909] ? __fget_files+0x34/0x3b0
[ 672.256931] ? find_held_lock+0x2b/0x80
[ 672.256965] ? __fget_files+0x203/0x3b0
[ 672.256989] ? __pfx_lo_ioctl+0x10/0x10
[ 672.257019] blkdev_ioctl+0x365/0x6d0
[ 672.257047] ? __pfx_blkdev_ioctl+0x10/0x10
[ 672.257075] ? selinux_file_ioctl+0xb9/0x280
[ 672.257111] ? __pfx_blkdev_ioctl+0x10/0x10
[ 672.257141] __x64_sys_ioctl+0x18f/0x210
[ 672.257176] do_syscall_64+0xbf/0x420
[ 672.257202] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.257224] RIP: 0033:0x7f591fd238d7
[ 672.257242] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 672.257263] RSP: 002b:00007f591d298f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 672.257291] RAX: ffffffffffffffda RBX: 00007f591fd6d970 RCX: 00007f591fd238d7
[ 672.257306] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 672.257320] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 672.257333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 672.257346] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 672.257376]
07:36:56 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 21)
[ 672.339296] FAULT_INJECTION: forcing a failure.
[ 672.339296] name failslab, interval 1, probability 0, space 0, times 0
[ 672.356998] CPU: 1 UID: 0 PID: 7196 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.357031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.357045] Call Trace:
[ 672.357054]
[ 672.357062] dump_stack_lvl+0xfa/0x120
[ 672.357097] should_fail_ex+0x4d7/0x5e0
[ 672.357139] ? __kernfs_new_node+0xd3/0x940
[ 672.357172] should_failslab+0xc2/0x120
[ 672.357198] kmem_cache_alloc_noprof+0x80/0x760
[ 672.357242] ? __kernfs_new_node+0xd3/0x940
[ 672.357281] __kernfs_new_node+0xd3/0x940
[ 672.357310] ? __lock_acquire+0x451/0x2250
[ 672.357346] ? __pfx___kernfs_new_node+0x10/0x10
[ 672.357384] ? lock_acquire+0x15e/0x2d0
[ 672.357412] ? kernfs_root+0x23/0x2a0
[ 672.357443] ? find_held_lock+0x2b/0x80
[ 672.357479] ? kernfs_root+0xee/0x2a0
[ 672.357510] ? lock_release+0xc8/0x270
[ 672.357535] ? lock_is_held_type+0x9e/0x120
[ 672.357566] kernfs_new_node+0x13c/0x1e0
[ 672.357608] __kernfs_create_file+0x55/0x360
[ 672.357639] sysfs_add_file_mode_ns+0x21c/0x430
[ 672.357674] ? __pfx_dev_attr_store+0x10/0x10
[ 672.357713] internal_create_group+0x662/0xeb0
[ 672.357758] ? __pfx_internal_create_group+0x10/0x10
[ 672.357790] ? blk_validate_limits+0xe47/0x15d0
[ 672.357825] ? lock_is_held_type+0x9e/0x120
[ 672.357851] loop_configure+0xc46/0x15a0
[ 672.357914] ? __pfx_loop_configure+0x10/0x10
[ 672.357966] ? avc_has_extended_perms+0x107/0xf20
[ 672.357995] ? find_held_lock+0x2b/0x80
[ 672.358030] ? avc_has_extended_perms+0x23b/0xf20
[ 672.358058] ? lock_release+0xc8/0x270
[ 672.358090] lo_ioctl+0x674/0x1cb0
[ 672.358128] ? __pfx_lo_ioctl+0x10/0x10
[ 672.358159] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 672.358189] ? __pfx_perf_trace_lock+0x10/0x10
[ 672.358225] ? lock_acquire+0x15e/0x2d0
[ 672.358252] ? __virt_addr_valid+0x1c6/0x5d0
[ 672.358281] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 672.358314] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 672.358344] ? lock_release+0xc8/0x270
[ 672.358371] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 672.358422] ? blkdev_common_ioctl+0x1c3/0x2860
[ 672.358488] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 672.358524] ? __fget_files+0x34/0x3b0
[ 672.358548] ? find_held_lock+0x2b/0x80
[ 672.358584] ? __fget_files+0x203/0x3b0
[ 672.358609] ? __pfx_lo_ioctl+0x10/0x10
[ 672.358640] blkdev_ioctl+0x365/0x6d0
[ 672.358669] ? __pfx_blkdev_ioctl+0x10/0x10
[ 672.358699] ? selinux_file_ioctl+0xb9/0x280
[ 672.358737] ? __pfx_blkdev_ioctl+0x10/0x10
[ 672.358768] __x64_sys_ioctl+0x18f/0x210
[ 672.358806] do_syscall_64+0xbf/0x420
[ 672.358834] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.358858] RIP: 0033:0x7fe78a9178d7
[ 672.358877] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 672.358899] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 672.358922] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 672.358937] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 672.358951] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 672.358965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 672.358978] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 672.359012]
[ 672.404253] FAULT_INJECTION: forcing a failure.
[ 672.404253] name failslab, interval 1, probability 0, space 0, times 0
[ 672.405828] CPU: 1 UID: 0 PID: 7197 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.405856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.405868] Call Trace:
[ 672.405875]
[ 672.405883] dump_stack_lvl+0xfa/0x120
[ 672.405921] should_fail_ex+0x4d7/0x5e0
[ 672.405961] ? alloc_empty_file+0x58/0x1e0
[ 672.405989] should_failslab+0xc2/0x120
[ 672.406014] kmem_cache_alloc_noprof+0x80/0x760
[ 672.406047] ? d_instantiate+0x92/0xb0
[ 672.406086] ? alloc_empty_file+0x58/0x1e0
[ 672.406112] ? _raw_spin_unlock+0x1e/0x40
[ 672.406143] alloc_empty_file+0x58/0x1e0
[ 672.406177] alloc_file_pseudo+0x12b/0x220
[ 672.406211] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 672.406259] __shmem_file_setup+0x1a8/0x370
[ 672.406296] __do_sys_memfd_create+0x4cc/0xa90
[ 672.406334] ? ksys_write+0x1a3/0x240
[ 672.406356] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 672.406400] ? irqentry_exit+0xee/0x650
[ 672.406422] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 672.406451] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 672.406494] do_syscall_64+0xbf/0x420
[ 672.406524] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.406547] RIP: 0033:0x7f5a8d2b4b19
[ 672.406565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 672.406586] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 672.406608] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b4b19
[ 672.406623] RDX: 00007f5a8a82a000 RSI: 0000000000000000 RDI: 00007f5a8d30e0fb
[ 672.406637] RBP: 0000000000000000 R08: 00007f5a8a829ff8 R09: ffffffffffffffff
[ 672.406652] R10: 00007f5a8a829ffc R11: 0000000000000246 R12: 0000000020000000
[ 672.406667] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 672.406710]
[ 672.431496] FAT-fs (loop7): unable to read boot sector
[ 672.434449] FAT-fs (loop0): unable to read boot sector
[ 672.439394] FAT-fs (loop2): unable to read boot sector
[ 672.447176] FAT-fs (loop4): unable to read boot sector
[ 672.473323] FAULT_INJECTION: forcing a failure.
[ 672.473323] name failslab, interval 1, probability 0, space 0, times 0
[ 672.475067] CPU: 0 UID: 0 PID: 7202 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 672.475098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 672.475111] Call Trace:
[ 672.475119]
[ 672.475128] dump_stack_lvl+0xfa/0x120
[ 672.475160] should_fail_ex+0x4d7/0x5e0
[ 672.475200] should_failslab+0xc2/0x120
[ 672.475227] __kmalloc_noprof+0xd6/0x830
[ 672.475256] ? mark_held_locks+0x49/0x80
[ 672.475285] ? ext4_find_extent+0x7f5/0xa00
[ 672.475314] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 672.475348] ? ext4_find_extent+0x7f5/0xa00
[ 672.475375] ext4_find_extent+0x7f5/0xa00
[ 672.475412] ext4_ext_map_blocks+0x1cc/0x6050
[ 672.475463] ? bdev_getblk+0xd6/0x660
[ 672.475493] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 672.475524] ? __lock_acquire+0x451/0x2250
[ 672.475555] ? crc32c+0x1ae/0x350
[ 672.475587] ? lock_acquire+0x15e/0x2d0
[ 672.475613] ? ext4_map_blocks+0x564/0x1470
[ 672.475646] ? down_write+0x119/0x1f0
[ 672.475670] ? __pfx_down_write+0x10/0x10
[ 672.475703] ext4_map_blocks+0x62d/0x1470
[ 672.475729] ? __up_read+0x26f/0x710
[ 672.475760] ? __pfx_ext4_map_blocks+0x10/0x10
[ 672.475781] ? __pfx___up_read+0x10/0x10
[ 672.475813] ? lock_release+0xc8/0x270
[ 672.475845] ? ext4_map_blocks+0x1e9/0x1470
[ 672.475875] ext4_getblk+0x67d/0x8e0
[ 672.475906] ? __pfx_ext4_getblk+0x10/0x10
[ 672.475927] ? __pfx_security_inode_init_security+0x10/0x10
[ 672.475963] ? crc32c+0x1ae/0x350
[ 672.475996] ext4_bread+0x2e/0x1a0
[ 672.476019] ext4_append+0x21d/0x530
[ 672.476048] ? __pfx_ext4_append+0x10/0x10
[ 672.476076] ? __pfx___ext4_new_inode+0x10/0x10
[ 672.476111] ext4_init_new_dir+0x13c/0x240
[ 672.476142] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 672.476183] ext4_mkdir+0x3c5/0xb30
[ 672.476219] ? __pfx_ext4_mkdir+0x10/0x10
[ 672.476249] ? security_inode_permission+0x72/0xe0
[ 672.476278] vfs_mkdir+0x6d8/0xc00
[ 672.476316] filename_mkdirat+0x118/0x430
[ 672.476343] ? __pfx_filename_mkdirat+0x10/0x10
[ 672.476369] ? strncpy_from_user+0x21b/0x2f0
[ 672.476405] __x64_sys_mkdir+0x6e/0xd0
[ 672.476429] do_syscall_64+0xbf/0x420
[ 672.476456] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 672.476479] RIP: 0033:0x7f1e78939c27
[ 672.476497] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 672.476517] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 672.476538] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 672.476553] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 672.476566] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 672.476579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 672.476592] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 672.476622]
07:37:06 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 16)
07:37:06 executing program 1:
r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0)
r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000040), &(0x7f00000001c0), 0x2, 0x3)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000202f66696c6530708aa03c241da3a398b45d61606fc9fb742d20fa40efebf0a0e79b61d5cbaaebbe40a0faf18cd71d650e6d719a02f0f0c78a86d09e3330916fb811fdb5f4ec85b76d9337696d5754e95629304dc9178ae56a837b45ff7d674769d85e2d69bc901fe123e1b27864ebd31e396d0d2d6896f339d2afdb8c9419b3aee561daee3ba3732aac"])
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2)
07:37:06 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 32)
07:37:06 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 11)
07:37:06 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 32)
07:37:06 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 8)
07:37:06 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 30)
07:37:06 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 22)
[ 682.696274] FAULT_INJECTION: forcing a failure.
[ 682.696274] name failslab, interval 1, probability 0, space 0, times 0
[ 682.697234] CPU: 1 UID: 0 PID: 7216 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 682.697250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 682.697258] Call Trace:
[ 682.697262]
[ 682.697267] dump_stack_lvl+0xfa/0x120
[ 682.697287] should_fail_ex+0x4d7/0x5e0
[ 682.697310] ? __d_alloc+0x34/0x9c0
[ 682.697324] should_failslab+0xc2/0x120
[ 682.697339] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 682.697358] ? find_held_lock+0x2b/0x80
[ 682.697382] ? __d_alloc+0x34/0x9c0
[ 682.697394] __d_alloc+0x34/0x9c0
[ 682.697406] ? mpol_shared_policy_init+0x24f/0x390
[ 682.697428] d_alloc_pseudo+0x1d/0xc0
[ 682.697445] alloc_file_pseudo+0xbe/0x220
[ 682.697462] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 682.697477] ? __shmem_get_inode+0x684/0xe80
[ 682.697495] __shmem_file_setup+0x1a8/0x370
[ 682.697510] __do_sys_memfd_create+0x4cc/0xa90
[ 682.697529] ? ksys_write+0x1a3/0x240
[ 682.697540] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 682.697557] ? irqentry_exit+0xee/0x650
[ 682.697568] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 682.697584] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 682.697603] do_syscall_64+0xbf/0x420
[ 682.697618] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 682.697632] RIP: 0033:0x7f184d908b19
[ 682.697641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 682.697653] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 682.697665] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d908b19
[ 682.697673] RDX: 00007f184ae7e000 RSI: 0000000000000000 RDI: 00007f184d9620fb
[ 682.697681] RBP: 0000000000000000 R08: 00007f184ae7dff8 R09: ffffffffffffffff
[ 682.697688] R10: 00007f184ae7dffc R11: 0000000000000246 R12: 0000000020000000
[ 682.697696] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 682.697711]
[ 682.713550] FAULT_INJECTION: forcing a failure.
[ 682.713550] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 682.714483] CPU: 1 UID: 0 PID: 7215 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 682.714498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 682.714514] Call Trace:
[ 682.714518]
[ 682.714523] dump_stack_lvl+0xfa/0x120
[ 682.714540] should_fail_ex+0x4d7/0x5e0
[ 682.714560] strncpy_from_user+0x3b/0x2f0
[ 682.714578] do_getname+0x70/0x3d0
[ 682.714596] do_sys_openat2+0xa0/0x210
[ 682.714611] ? __pfx_do_sys_openat2+0x10/0x10
[ 682.714633] __x64_sys_openat+0x142/0x200
[ 682.714649] ? __pfx___x64_sys_openat+0x10/0x10
[ 682.714672] do_syscall_64+0xbf/0x420
[ 682.714686] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 682.714698] RIP: 0033:0x7fb402840a04
[ 682.714707] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 682.714719] RSP: 002b:00007fb3ffe02ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 682.714731] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb402840a04
[ 682.714739] RDX: 0000000000000002 RSI: 00007fb3ffe03000 RDI: 00000000ffffff9c
[ 682.714746] RBP: 00007fb3ffe03000 R08: 0000000000000000 R09: ffffffffffffffff
[ 682.714753] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 682.714760] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 682.714776]
[ 682.743435] FAT-fs (loop2): unable to read boot sector
[ 682.751659] FAULT_INJECTION: forcing a failure.
[ 682.751659] name failslab, interval 1, probability 0, space 0, times 0
[ 682.756987] CPU: 0 UID: 0 PID: 7223 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 682.757026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 682.757049] Call Trace:
[ 682.757058]
07:37:06 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 9)
[ 682.757068] dump_stack_lvl+0xfa/0x120
[ 682.757104] should_fail_ex+0x4d7/0x5e0
[ 682.757150] ? ext4_mb_new_blocks+0x64e/0x44b0
[ 682.757178] should_failslab+0xc2/0x120
[ 682.757208] kmem_cache_alloc_noprof+0x80/0x760
[ 682.757256] ? ext4_mb_new_blocks+0x64e/0x44b0
[ 682.757283] ext4_mb_new_blocks+0x64e/0x44b0
[ 682.757322] ? __kasan_kmalloc+0x7f/0x90
[ 682.757354] ? __kmalloc_noprof+0x4b0/0x830
[ 682.757387] ? mark_held_locks+0x49/0x80
[ 682.757424] ? ext4_find_extent+0x7f5/0xa00
[ 682.757461] ? __pfx_ext4_mb_new_blocks+0x10/0x10
[ 682.757491] ? ext4_ext_search_right+0x2e8/0xbd0
[ 682.757524] ? ext4_inode_to_goal_block+0x323/0x430
[ 682.757562] ext4_ext_map_blocks+0x1bd2/0x6050
[ 682.757623] ? bdev_getblk+0xd6/0x660
[ 682.757658] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 682.757694] ? __lock_acquire+0x451/0x2250
[ 682.757732] ? crc32c+0x1ae/0x350
[ 682.757770] ? lock_acquire+0x15e/0x2d0
[ 682.757800] ? ext4_map_blocks+0x564/0x1470
[ 682.757843] ? __pfx_down_write+0x10/0x10
[ 682.757881] ext4_map_blocks+0x62d/0x1470
[ 682.757913] ? __up_read+0x26f/0x710
[ 682.757950] ? __pfx_ext4_map_blocks+0x10/0x10
[ 682.757974] ? __pfx___up_read+0x10/0x10
[ 682.758011] ? lock_release+0xc8/0x270
[ 682.758050] ? ext4_map_blocks+0x1e9/0x1470
[ 682.758085] ext4_getblk+0x67d/0x8e0
[ 682.758113] ? __pfx_ext4_getblk+0x10/0x10
[ 682.758137] ? __pfx_security_inode_init_security+0x10/0x10
[ 682.758180] ? crc32c+0x1ae/0x350
[ 682.758220] ext4_bread+0x2e/0x1a0
[ 682.758247] ext4_append+0x21d/0x530
[ 682.758281] ? __pfx_ext4_append+0x10/0x10
[ 682.758313] ? __pfx___ext4_new_inode+0x10/0x10
[ 682.758355] ext4_init_new_dir+0x13c/0x240
[ 682.758391] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 682.758440] ext4_mkdir+0x3c5/0xb30
[ 682.758483] ? __pfx_ext4_mkdir+0x10/0x10
[ 682.758535] ? security_inode_permission+0x72/0xe0
[ 682.758569] vfs_mkdir+0x6d8/0xc00
[ 682.758613] filename_mkdirat+0x118/0x430
[ 682.758646] ? __pfx_filename_mkdirat+0x10/0x10
[ 682.758676] ? strncpy_from_user+0x21b/0x2f0
[ 682.758719] __x64_sys_mkdir+0x6e/0xd0
[ 682.758748] do_syscall_64+0xbf/0x420
[ 682.758780] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 682.758806] RIP: 0033:0x7f1e78939c27
[ 682.758827] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 682.758852] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 682.758878] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 682.758895] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 682.758911] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 682.758927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 682.758942] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 682.758978]
[ 682.766007] FAT-fs (loop5): unable to read boot sector
[ 682.778097] FAT-fs (loop4): unable to read boot sector
[ 682.781213] FAT-fs (loop6): unable to read boot sector
07:37:06 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 17)
07:37:06 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 31)
07:37:06 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 33)
[ 682.864162] FAT-fs (loop2): unable to read boot sector
07:37:06 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 12)
07:37:06 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 34)
07:37:06 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 33)
[ 682.908876] FAT-fs (loop7): unable to read boot sector
[ 682.922032] FAULT_INJECTION: forcing a failure.
[ 682.922032] name failslab, interval 1, probability 0, space 0, times 0
[ 682.923875] CPU: 0 UID: 0 PID: 7232 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 682.923914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 682.923928] Call Trace:
[ 682.923936]
[ 682.923946] dump_stack_lvl+0xfa/0x120
[ 682.923980] should_fail_ex+0x4d7/0x5e0
[ 682.924022] ? alloc_empty_file+0x58/0x1e0
[ 682.924053] should_failslab+0xc2/0x120
[ 682.924080] kmem_cache_alloc_noprof+0x80/0x760
[ 682.924115] ? __is_insn_slot_addr+0x136/0x290
[ 682.924143] ? lock_release+0xc8/0x270
[ 682.924179] ? alloc_empty_file+0x58/0x1e0
[ 682.924207] alloc_empty_file+0x58/0x1e0
[ 682.924239] path_openat+0xee/0x2d60
[ 682.924265] ? __kernel_text_address+0xd/0x40
[ 682.924297] ? unwind_get_return_address+0x59/0xa0
[ 682.924324] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 682.924357] ? arch_stack_walk+0x9c/0xf0
[ 682.924391] ? perf_trace_run_bpf_submit+0xef/0x180
[ 682.924420] ? __pfx_path_openat+0x10/0x10
[ 682.924448] ? __lock_acquire+0x451/0x2250
[ 682.924486] do_file_open+0x209/0x460
[ 682.924512] ? __pfx_do_file_open+0x10/0x10
[ 682.924550] ? find_held_lock+0x2b/0x80
[ 682.924588] ? alloc_fd+0x2c1/0x560
[ 682.924611] ? lock_release+0xc8/0x270
[ 682.924645] ? _raw_spin_unlock+0x1e/0x40
[ 682.924679] ? alloc_fd+0x2c1/0x560
[ 682.924713] do_sys_openat2+0xe7/0x210
[ 682.924744] ? __pfx_do_sys_openat2+0x10/0x10
[ 682.924774] ? perf_trace_run_bpf_submit+0xef/0x180
[ 682.924806] ? perf_trace_preemptirq_template+0x259/0x430
[ 682.924843] __x64_sys_openat+0x142/0x200
[ 682.924876] ? __pfx___x64_sys_openat+0x10/0x10
[ 682.924922] do_syscall_64+0xbf/0x420
[ 682.924951] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 682.924977] RIP: 0033:0x7fb402840a04
[ 682.924996] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 682.925020] RSP: 002b:00007fb3ffe02ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 682.925044] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb402840a04
[ 682.925060] RDX: 0000000000000002 RSI: 00007fb3ffe03000 RDI: 00000000ffffff9c
[ 682.925076] RBP: 00007fb3ffe03000 R08: 0000000000000000 R09: ffffffffffffffff
[ 682.925091] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 682.925106] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 682.925138]
07:37:06 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 23)
[ 683.014286] FAULT_INJECTION: forcing a failure.
[ 683.014286] name failslab, interval 1, probability 0, space 0, times 0
[ 683.015263] CPU: 1 UID: 0 PID: 7237 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 683.015279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 683.015288] Call Trace:
[ 683.015293]
[ 683.015298] dump_stack_lvl+0xfa/0x120
[ 683.015319] should_fail_ex+0x4d7/0x5e0
[ 683.015343] ? __kernfs_new_node+0xd3/0x940
[ 683.015361] should_failslab+0xc2/0x120
[ 683.015376] kmem_cache_alloc_noprof+0x80/0x760
[ 683.015399] ? __kernfs_new_node+0xd3/0x940
[ 683.015415] __kernfs_new_node+0xd3/0x940
[ 683.015430] ? __lock_acquire+0x451/0x2250
[ 683.015449] ? __pfx___kernfs_new_node+0x10/0x10
[ 683.015467] ? lock_acquire+0x15e/0x2d0
[ 683.015482] ? kernfs_root+0x23/0x2a0
[ 683.015487] FAULT_INJECTION: forcing a failure.
[ 683.015487] name failslab, interval 1, probability 0, space 0, times 0
[ 683.015498] ? find_held_lock+0x2b/0x80
[ 683.015520] ? kernfs_root+0xee/0x2a0
[ 683.015537] ? lock_release+0xc8/0x270
[ 683.015552] ? lock_is_held_type+0x9e/0x120
[ 683.015568] kernfs_new_node+0x13c/0x1e0
[ 683.015590] __kernfs_create_file+0x55/0x360
[ 683.015606] sysfs_add_file_mode_ns+0x21c/0x430
[ 683.015624] ? __pfx_dev_attr_store+0x10/0x10
[ 683.015645] internal_create_group+0x662/0xeb0
[ 683.015668] ? __pfx_internal_create_group+0x10/0x10
[ 683.015685] ? blk_validate_limits+0xe47/0x15d0
[ 683.015703] ? lock_is_held_type+0x9e/0x120
[ 683.015717] loop_configure+0xc46/0x15a0
[ 683.015747] ? __pfx_loop_configure+0x10/0x10
[ 683.015771] ? avc_has_extended_perms+0x107/0xf20
[ 683.015788] ? find_held_lock+0x2b/0x80
[ 683.015806] ? avc_has_extended_perms+0x23b/0xf20
[ 683.015819] ? lock_release+0xc8/0x270
[ 683.015836] lo_ioctl+0x674/0x1cb0
[ 683.015854] ? __pfx_lo_ioctl+0x10/0x10
[ 683.015870] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 683.015886] ? __pfx___pmu_ctx_sched_in+0x10/0x10
[ 683.015909] ? kvm_sched_clock_read+0x16/0x30
[ 683.015929] ? find_held_lock+0x2b/0x80
[ 683.015949] ? __lock_acquire+0x451/0x2250
[ 683.015963] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 683.015983] ? blkdev_common_ioctl+0x1c3/0x2860
[ 683.016015] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 683.016034] ? __fget_files+0x34/0x3b0
[ 683.016046] ? find_held_lock+0x2b/0x80
[ 683.016064] ? __fget_files+0x203/0x3b0
[ 683.016077] ? __pfx_lo_ioctl+0x10/0x10
[ 683.016094] blkdev_ioctl+0x365/0x6d0
[ 683.016109] ? __pfx_blkdev_ioctl+0x10/0x10
[ 683.016124] ? selinux_file_ioctl+0xb9/0x280
[ 683.016144] ? __pfx_blkdev_ioctl+0x10/0x10
[ 683.016160] __x64_sys_ioctl+0x18f/0x210
[ 683.016180] do_syscall_64+0xbf/0x420
[ 683.016195] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 683.016208] RIP: 0033:0x7fe78a9178d7
[ 683.016218] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 683.016230] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 683.016242] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 683.016250] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 683.016258] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 683.016265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 683.016273] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 683.016288]
[ 683.021574] FAT-fs (loop4): unable to read boot sector
07:37:06 executing program 1:
r0 = getpgrp(0x0)
r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0})
kcmp$KCMP_EPOLL_TFD(r0, r3, 0x7, r2, &(0x7f0000000100)={r1, r2, 0x200})
07:37:06 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 683.074982] CPU: 0 UID: 0 PID: 7238 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 683.075019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 683.075033] Call Trace:
[ 683.075042]
[ 683.075052] dump_stack_lvl+0xfa/0x120
[ 683.075093] should_fail_ex+0x4d7/0x5e0
[ 683.075134] ? security_file_alloc+0x35/0x130
[ 683.075159] should_failslab+0xc2/0x120
[ 683.075186] kmem_cache_alloc_noprof+0x80/0x760
[ 683.075218] ? __create_object+0x59/0x80
[ 683.075256] ? security_file_alloc+0x35/0x130
[ 683.075279] security_file_alloc+0x35/0x130
[ 683.075305] init_file+0x95/0x480
[ 683.075335] alloc_empty_file+0x76/0x1e0
[ 683.075366] alloc_file_pseudo+0x12b/0x220
[ 683.075398] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 683.075437] __shmem_file_setup+0x1a8/0x370
[ 683.075469] __do_sys_memfd_create+0x4cc/0xa90
[ 683.075507] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 683.075541] ? irqentry_exit+0xee/0x650
[ 683.075563] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 683.075593] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 683.075633] do_syscall_64+0xbf/0x420
[ 683.075666] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 683.075691] RIP: 0033:0x7f5a8d2b4b19
[ 683.075710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 683.075733] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 683.075758] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b4b19
[ 683.075774] RDX: 00007f5a8a82a000 RSI: 0000000000000000 RDI: 00007f5a8d30e0fb
[ 683.075788] RBP: 0000000000000000 R08: 00007f5a8a829ff8 R09: ffffffffffffffff
[ 683.075803] R10: 00007f5a8a829ffc R11: 0000000000000246 R12: 0000000020000000
[ 683.075818] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 683.075849]
[ 683.111516] FAULT_INJECTION: forcing a failure.
[ 683.111516] name failslab, interval 1, probability 0, space 0, times 0
[ 683.113235] CPU: 0 UID: 0 PID: 7242 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 683.113265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 683.113279] Call Trace:
[ 683.113287]
[ 683.113295] dump_stack_lvl+0xfa/0x120
[ 683.113327] should_fail_ex+0x4d7/0x5e0
[ 683.113367] ? __kernfs_new_node+0xd3/0x940
[ 683.113399] should_failslab+0xc2/0x120
[ 683.113425] kmem_cache_alloc_noprof+0x80/0x760
[ 683.113466] ? __kernfs_new_node+0xd3/0x940
[ 683.113496] __kernfs_new_node+0xd3/0x940
[ 683.113526] ? __lock_acquire+0x451/0x2250
[ 683.113560] ? __pfx___kernfs_new_node+0x10/0x10
[ 683.113596] ? lock_acquire+0x15e/0x2d0
[ 683.113623] ? kernfs_root+0x23/0x2a0
[ 683.113654] ? find_held_lock+0x2b/0x80
[ 683.113690] ? kernfs_root+0xee/0x2a0
[ 683.113721] ? lock_release+0xc8/0x270
[ 683.113747] ? lock_is_held_type+0x9e/0x120
[ 683.113775] kernfs_new_node+0x13c/0x1e0
[ 683.113816] __kernfs_create_file+0x55/0x360
[ 683.113846] sysfs_add_file_mode_ns+0x21c/0x430
[ 683.113879] ? __pfx_dev_attr_store+0x10/0x10
[ 683.113924] internal_create_group+0x662/0xeb0
[ 683.113967] ? __pfx_internal_create_group+0x10/0x10
[ 683.114000] ? blk_validate_limits+0xe47/0x15d0
[ 683.114033] ? lock_is_held_type+0x9e/0x120
[ 683.114058] loop_configure+0xc46/0x15a0
[ 683.114117] ? __pfx_loop_configure+0x10/0x10
[ 683.114165] ? avc_has_extended_perms+0x107/0xf20
[ 683.114193] ? find_held_lock+0x2b/0x80
[ 683.114228] ? avc_has_extended_perms+0x23b/0xf20
[ 683.114254] ? lock_release+0xc8/0x270
[ 683.114285] lo_ioctl+0x674/0x1cb0
[ 683.114319] ? perf_tp_event+0x807/0xe70
[ 683.114342] ? __pfx_lo_ioctl+0x10/0x10
[ 683.114373] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 683.114404] ? __pfx_perf_tp_event+0x10/0x10
[ 683.114430] ? perf_trace_preemptirq_template+0x259/0x430
[ 683.114466] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 683.114497] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 683.114546] ? blkdev_common_ioctl+0x1c3/0x2860
[ 683.114605] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 683.114641] ? __fget_files+0x34/0x3b0
[ 683.114664] ? find_held_lock+0x2b/0x80
[ 683.114700] ? __fget_files+0x203/0x3b0
[ 683.114724] ? __pfx_lo_ioctl+0x10/0x10
[ 683.114755] blkdev_ioctl+0x365/0x6d0
[ 683.114783] ? __pfx_blkdev_ioctl+0x10/0x10
[ 683.114812] ? selinux_file_ioctl+0xb9/0x280
[ 683.114849] ? __pfx_blkdev_ioctl+0x10/0x10
[ 683.114879] __x64_sys_ioctl+0x18f/0x210
[ 683.114916] do_syscall_64+0xbf/0x420
[ 683.114944] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 683.114967] RIP: 0033:0x7f775d7e38d7
[ 683.114985] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 683.115006] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 683.115029] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 683.115045] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 683.115058] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 683.115072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 683.115086] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 683.115116]
[ 683.169693] No source specified
[ 683.200075] FAT-fs (loop2): unable to read boot sector
[ 683.235442] FAT-fs (loop5): unable to read boot sector
07:37:16 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 10)
07:37:16 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 32)
07:37:16 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 34)
07:37:16 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 24)
07:37:16 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 13)
07:37:16 executing program 1:
r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:37:16 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:37:16 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 18)
[ 692.656396] FAT-fs (loop5): unable to read boot sector
[ 692.705771] FAULT_INJECTION: forcing a failure.
[ 692.705771] name failslab, interval 1, probability 0, space 0, times 0
[ 692.707585] CPU: 0 UID: 0 PID: 7263 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 692.707616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 692.707630] Call Trace:
[ 692.707638]
[ 692.707647] dump_stack_lvl+0xfa/0x120
[ 692.707680] should_fail_ex+0x4d7/0x5e0
[ 692.707721] ? alloc_empty_file+0x58/0x1e0
[ 692.707749] should_failslab+0xc2/0x120
[ 692.707776] kmem_cache_alloc_noprof+0x80/0x760
[ 692.707810] ? d_instantiate+0x92/0xb0
[ 692.707844] ? alloc_empty_file+0x58/0x1e0
[ 692.707871] ? _raw_spin_unlock+0x1e/0x40
[ 692.707910] alloc_empty_file+0x58/0x1e0
[ 692.707941] alloc_file_pseudo+0x12b/0x220
[ 692.707972] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 692.708012] __shmem_file_setup+0x1a8/0x370
[ 692.708043] __do_sys_memfd_create+0x4cc/0xa90
[ 692.708081] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 692.708115] ? irqentry_exit+0xee/0x650
[ 692.708136] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 692.708166] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 692.708205] do_syscall_64+0xbf/0x420
[ 692.708233] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 692.708258] RIP: 0033:0x7f184d908b19
[ 692.708276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 692.708297] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 692.708320] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d908b19
[ 692.708336] RDX: 00007f184ae7e000 RSI: 0000000000000000 RDI: 00007f184d9620fb
[ 692.708350] RBP: 0000000000000000 R08: 00007f184ae7dff8 R09: ffffffffffffffff
[ 692.708365] R10: 00007f184ae7dffc R11: 0000000000000246 R12: 0000000020000000
[ 692.708379] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 692.708410]
[ 692.713387] FAULT_INJECTION: forcing a failure.
[ 692.713387] name failslab, interval 1, probability 0, space 0, times 0
[ 692.735315] FAT-fs (loop0): unable to read boot sector
[ 692.736641] FAT-fs (loop2): unable to read boot sector
[ 692.748576] FAT-fs (loop4): unable to read boot sector
07:37:16 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 35)
[ 692.764524] FAT-fs (loop6): unable to read boot sector
[ 692.768769] CPU: 0 UID: 0 PID: 7269 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 692.768811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 692.768826] Call Trace:
[ 692.768835]
[ 692.768844] dump_stack_lvl+0xfa/0x120
[ 692.768879] should_fail_ex+0x4d7/0x5e0
[ 692.768926] ? ext4_mb_new_blocks+0x23a0/0x44b0
[ 692.768952] should_failslab+0xc2/0x120
[ 692.768978] kmem_cache_alloc_noprof+0x80/0x760
[ 692.769021] ? ext4_mb_new_blocks+0x23a0/0x44b0
[ 692.769045] ext4_mb_new_blocks+0x23a0/0x44b0
[ 692.769081] ? __kasan_kmalloc+0x7f/0x90
[ 692.769109] ? __kmalloc_noprof+0x4b0/0x830
[ 692.769138] ? mark_held_locks+0x49/0x80
[ 692.769169] ? ext4_find_extent+0x7f5/0xa00
[ 692.769201] ? __pfx_ext4_mb_new_blocks+0x10/0x10
[ 692.769228] ? ext4_ext_search_right+0x2e8/0xbd0
[ 692.769258] ? ext4_inode_to_goal_block+0x323/0x430
[ 692.769292] ext4_ext_map_blocks+0x1bd2/0x6050
[ 692.769347] ? bdev_getblk+0xd6/0x660
[ 692.769378] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 692.769411] ? __lock_acquire+0x451/0x2250
[ 692.769444] ? crc32c+0x1ae/0x350
[ 692.769479] ? lock_acquire+0x15e/0x2d0
[ 692.769507] ? ext4_map_blocks+0x564/0x1470
[ 692.769544] ? __pfx_down_write+0x10/0x10
[ 692.769579] ext4_map_blocks+0x62d/0x1470
[ 692.769608] ? __up_read+0x26f/0x710
[ 692.769640] ? __pfx_ext4_map_blocks+0x10/0x10
[ 692.769663] ? __pfx___up_read+0x10/0x10
[ 692.769697] ? lock_release+0xc8/0x270
[ 692.769731] ? ext4_map_blocks+0x1e9/0x1470
[ 692.769762] ext4_getblk+0x67d/0x8e0
[ 692.769788] ? __pfx_ext4_getblk+0x10/0x10
[ 692.769809] ? __pfx_security_inode_init_security+0x10/0x10
[ 692.769848] ? crc32c+0x1ae/0x350
[ 692.769883] ext4_bread+0x2e/0x1a0
[ 692.769908] ext4_append+0x21d/0x530
[ 692.769938] ? __pfx_ext4_append+0x10/0x10
[ 692.769968] ? __pfx___ext4_new_inode+0x10/0x10
[ 692.770004] ext4_init_new_dir+0x13c/0x240
[ 692.770037] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 692.770081] ext4_mkdir+0x3c5/0xb30
[ 692.770120] ? __pfx_ext4_mkdir+0x10/0x10
[ 692.770152] ? security_inode_permission+0x72/0xe0
[ 692.770183] vfs_mkdir+0x6d8/0xc00
[ 692.770223] filename_mkdirat+0x118/0x430
[ 692.770252] ? __pfx_filename_mkdirat+0x10/0x10
[ 692.770279] ? strncpy_from_user+0x21b/0x2f0
[ 692.770318] __x64_sys_mkdir+0x6e/0xd0
[ 692.770344] do_syscall_64+0xbf/0x420
[ 692.770372] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 692.770397] RIP: 0033:0x7f1e78939c27
[ 692.770416] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 692.770439] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 692.770462] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 692.770478] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 692.770492] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 692.770506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 692.770520] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 692.770553]
[ 692.840972] FAT-fs (loop2): unable to read boot sector
07:37:16 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 33)
07:37:16 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 14)
[ 692.900776] FAULT_INJECTION: forcing a failure.
[ 692.900776] name failslab, interval 1, probability 0, space 0, times 0
[ 692.902589] CPU: 0 UID: 0 PID: 7277 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 692.902620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 692.902647] Call Trace:
[ 692.902655]
[ 692.902664] dump_stack_lvl+0xfa/0x120
[ 692.902699] should_fail_ex+0x4d7/0x5e0
[ 692.902740] ? __kernfs_new_node+0xd3/0x940
[ 692.902772] should_failslab+0xc2/0x120
[ 692.902798] kmem_cache_alloc_noprof+0x80/0x760
[ 692.902841] ? __kernfs_new_node+0xd3/0x940
[ 692.902872] __kernfs_new_node+0xd3/0x940
[ 692.902909] ? __lock_acquire+0x451/0x2250
[ 692.902944] ? __pfx___kernfs_new_node+0x10/0x10
[ 692.902981] ? lock_acquire+0x15e/0x2d0
[ 692.903008] ? kernfs_root+0x23/0x2a0
[ 692.903040] ? find_held_lock+0x2b/0x80
[ 692.903076] ? kernfs_root+0xee/0x2a0
[ 692.903107] ? lock_release+0xc8/0x270
[ 692.903134] ? lock_is_held_type+0x9e/0x120
[ 692.903162] kernfs_new_node+0x13c/0x1e0
[ 692.903204] __kernfs_create_file+0x55/0x360
[ 692.903235] sysfs_add_file_mode_ns+0x21c/0x430
[ 692.903268] ? __pfx_dev_attr_store+0x10/0x10
[ 692.903306] internal_create_group+0x662/0xeb0
[ 692.903349] ? __pfx_internal_create_group+0x10/0x10
[ 692.903382] ? blk_validate_limits+0xe47/0x15d0
[ 692.903415] ? lock_is_held_type+0x9e/0x120
[ 692.903440] loop_configure+0xc46/0x15a0
[ 692.903498] ? __pfx_loop_configure+0x10/0x10
[ 692.903547] ? avc_has_extended_perms+0x107/0xf20
[ 692.903575] ? find_held_lock+0x2b/0x80
[ 692.903611] ? avc_has_extended_perms+0x23b/0xf20
[ 692.903638] ? lock_release+0xc8/0x270
[ 692.903670] lo_ioctl+0x674/0x1cb0
[ 692.903704] ? perf_tp_event+0x807/0xe70
[ 692.903728] ? __pfx_lo_ioctl+0x10/0x10
[ 692.903759] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 692.903791] ? __pfx_perf_tp_event+0x10/0x10
[ 692.903818] ? perf_trace_preemptirq_template+0x259/0x430
[ 692.903854] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 692.903886] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 692.903923] ? blkdev_common_ioctl+0x1c3/0x2860
[ 692.903985] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 692.904021] ? __fget_files+0x34/0x3b0
[ 692.904046] ? find_held_lock+0x2b/0x80
[ 692.904081] ? __fget_files+0x203/0x3b0
[ 692.904106] ? __pfx_lo_ioctl+0x10/0x10
[ 692.904138] blkdev_ioctl+0x365/0x6d0
[ 692.904167] ? __pfx_blkdev_ioctl+0x10/0x10
[ 692.904197] ? selinux_file_ioctl+0xb9/0x280
[ 692.904235] ? __pfx_blkdev_ioctl+0x10/0x10
[ 692.904266] __x64_sys_ioctl+0x18f/0x210
[ 692.904303] do_syscall_64+0xbf/0x420
[ 692.904331] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 692.904356] RIP: 0033:0x7f775d7e38d7
[ 692.904374] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 692.904397] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 692.904420] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 692.904435] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 692.904449] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 692.904463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 692.904476] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 692.904507]
[ 692.955421] FAULT_INJECTION: forcing a failure.
[ 692.955421] name failslab, interval 1, probability 0, space 0, times 0
[ 692.956569] CPU: 1 UID: 0 PID: 7278 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 692.956589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 692.956599] Call Trace:
[ 692.956605]
[ 692.956611] dump_stack_lvl+0xfa/0x120
[ 692.956636] should_fail_ex+0x4d7/0x5e0
[ 692.956665] ? __kernfs_new_node+0xd3/0x940
[ 692.956688] should_failslab+0xc2/0x120
[ 692.956707] kmem_cache_alloc_noprof+0x80/0x760
[ 692.956734] ? __kernfs_new_node+0xd3/0x940
[ 692.956754] __kernfs_new_node+0xd3/0x940
[ 692.956773] ? __lock_acquire+0x451/0x2250
[ 692.956796] ? __pfx___kernfs_new_node+0x10/0x10
[ 692.956819] ? lock_acquire+0x15e/0x2d0
[ 692.956836] ? kernfs_root+0x23/0x2a0
[ 692.956856] ? find_held_lock+0x2b/0x80
[ 692.956880] ? kernfs_root+0xee/0x2a0
[ 692.956905] ? lock_release+0xc8/0x270
[ 692.956921] ? lock_is_held_type+0x9e/0x120
[ 692.956940] kernfs_new_node+0x13c/0x1e0
[ 692.956966] __kernfs_create_file+0x55/0x360
[ 692.956985] sysfs_add_file_mode_ns+0x21c/0x430
[ 692.957007] ? __pfx_dev_attr_store+0x10/0x10
[ 692.957032] internal_create_group+0x662/0xeb0
[ 692.957060] ? __pfx_internal_create_group+0x10/0x10
[ 692.957081] ? blk_validate_limits+0xe47/0x15d0
[ 692.957103] ? lock_is_held_type+0x9e/0x120
[ 692.957119] loop_configure+0xc46/0x15a0
[ 692.957156] ? __pfx_loop_configure+0x10/0x10
[ 692.957186] ? avc_has_extended_perms+0x107/0xf20
[ 692.957206] ? find_held_lock+0x2b/0x80
[ 692.957229] ? avc_has_extended_perms+0x23b/0xf20
[ 692.957246] ? lock_release+0xc8/0x270
[ 692.957266] lo_ioctl+0x674/0x1cb0
[ 692.957289] ? __pfx_lo_ioctl+0x10/0x10
[ 692.957308] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 692.957331] ? lock_acquire+0x15e/0x2d0
[ 692.957348] ? __virt_addr_valid+0x1c6/0x5d0
[ 692.957366] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 692.957387] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 692.957406] ? lock_release+0xc8/0x270
[ 692.957423] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 692.957447] ? blkdev_common_ioctl+0x1c3/0x2860
[ 692.957486] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 692.957509] ? __fget_files+0x34/0x3b0
[ 692.957525] ? find_held_lock+0x2b/0x80
[ 692.957547] ? __fget_files+0x203/0x3b0
[ 692.957563] ? __pfx_lo_ioctl+0x10/0x10
[ 692.957582] blkdev_ioctl+0x365/0x6d0
[ 692.957601] ? __pfx_blkdev_ioctl+0x10/0x10
[ 692.957619] ? selinux_file_ioctl+0xb9/0x280
[ 692.957644] ? __pfx_blkdev_ioctl+0x10/0x10
[ 692.957664] __x64_sys_ioctl+0x18f/0x210
[ 692.957688] do_syscall_64+0xbf/0x420
[ 692.957707] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 692.957723] RIP: 0033:0x7fe78a9178d7
[ 692.957735] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 692.957749] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 692.957764] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 692.957774] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 692.957783] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 692.957792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 692.957802] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 692.957821]
07:37:16 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 11)
07:37:16 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 19)
[ 693.025786] FAULT_INJECTION: forcing a failure.
[ 693.025786] name failslab, interval 1, probability 0, space 0, times 0
[ 693.027552] CPU: 0 UID: 0 PID: 7280 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 693.027583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 693.027597] Call Trace:
[ 693.027605]
[ 693.027614] dump_stack_lvl+0xfa/0x120
[ 693.027647] should_fail_ex+0x4d7/0x5e0
[ 693.027687] ? do_getname+0x2b/0x3d0
[ 693.027715] should_failslab+0xc2/0x120
[ 693.027742] kmem_cache_alloc_noprof+0x80/0x760
[ 693.027774] ? lock_release+0xc8/0x270
[ 693.027811] ? do_getname+0x2b/0x3d0
[ 693.027838] do_getname+0x2b/0x3d0
[ 693.027869] do_sys_openat2+0xa0/0x210
[ 693.027907] ? __pfx_do_sys_openat2+0x10/0x10
[ 693.027936] ? perf_trace_run_bpf_submit+0xef/0x180
[ 693.027968] ? perf_trace_preemptirq_template+0x259/0x430
[ 693.028004] __x64_sys_openat+0x142/0x200
[ 693.028035] ? __pfx___x64_sys_openat+0x10/0x10
[ 693.028068] ? fput+0x92/0xd0
[ 693.028102] do_syscall_64+0xbf/0x420
[ 693.028130] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 693.028154] RIP: 0033:0x7f5a8d267a04
[ 693.028173] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 693.028196] RSP: 002b:00007f5a8a829ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 693.028219] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d267a04
[ 693.028235] RDX: 0000000000000002 RSI: 00007f5a8a82a000 RDI: 00000000ffffff9c
[ 693.028250] RBP: 00007f5a8a82a000 R08: 0000000000000000 R09: ffffffffffffffff
[ 693.028264] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 693.028278] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 693.028309]
[ 693.039688] FAT-fs (loop4): unable to read boot sector
[ 693.066184] FAULT_INJECTION: forcing a failure.
[ 693.066184] name failslab, interval 1, probability 0, space 0, times 0
[ 693.068064] CPU: 1 UID: 0 PID: 7284 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 693.068085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 693.068095] Call Trace:
[ 693.068100]
[ 693.068106] dump_stack_lvl+0xfa/0x120
[ 693.068130] should_fail_ex+0x4d7/0x5e0
[ 693.068157] ? security_file_alloc+0x35/0x130
[ 693.068173] should_failslab+0xc2/0x120
[ 693.068191] kmem_cache_alloc_noprof+0x80/0x760
[ 693.068213] ? __create_object+0x59/0x80
[ 693.068236] ? security_file_alloc+0x35/0x130
[ 693.068252] security_file_alloc+0x35/0x130
[ 693.068272] init_file+0x95/0x480
[ 693.068291] alloc_empty_file+0x76/0x1e0
[ 693.068311] path_openat+0xee/0x2d60
[ 693.068326] ? __kernel_text_address+0xd/0x40
[ 693.068347] ? unwind_get_return_address+0x59/0xa0
[ 693.068363] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 693.068384] ? arch_stack_walk+0x9c/0xf0
[ 693.068408] ? __pfx_path_openat+0x10/0x10
[ 693.068425] ? __lock_acquire+0x451/0x2250
[ 693.068449] do_file_open+0x209/0x460
[ 693.068464] ? __pfx_do_file_open+0x10/0x10
[ 693.068487] ? find_held_lock+0x2b/0x80
[ 693.068510] ? alloc_fd+0x2c1/0x560
[ 693.068525] ? lock_release+0xc8/0x270
[ 693.068545] ? _raw_spin_unlock+0x1e/0x40
[ 693.068566] ? alloc_fd+0x2c1/0x560
[ 693.068586] do_sys_openat2+0xe7/0x210
[ 693.068605] ? __pfx_do_sys_openat2+0x10/0x10
[ 693.068632] __x64_sys_openat+0x142/0x200
[ 693.068651] ? __pfx___x64_sys_openat+0x10/0x10
[ 693.068678] do_syscall_64+0xbf/0x420
[ 693.068697] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 693.068713] RIP: 0033:0x7fb402840a04
[ 693.068726] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 693.068740] RSP: 002b:00007fb3ffe02ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 693.068754] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb402840a04
[ 693.068764] RDX: 0000000000000002 RSI: 00007fb3ffe03000 RDI: 00000000ffffff9c
[ 693.068774] RBP: 00007fb3ffe03000 R08: 0000000000000000 R09: ffffffffffffffff
[ 693.068783] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 693.068792] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 693.068811]
[ 693.076423] FAT-fs (loop5): unable to read boot sector
[ 693.120446] FAT-fs (loop7): unable to read boot sector
07:37:31 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 36)
07:37:31 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:37:31 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 12)
07:37:31 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 20)
07:37:31 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 25)
07:37:31 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3}, 0x2601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'})
open_by_handle_at(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="280000005e396d4e0000000c000000000000000300000003000000ffff000000"], 0x1)
07:37:31 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 34)
07:37:31 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 15)
[ 707.788603] FAT-fs (loop2): unable to read boot sector
[ 707.804645] FAT-fs (loop0): unable to read boot sector
[ 707.807450] FAT-fs (loop2): unable to read boot sector
[ 707.809590] FAT-fs (loop4): unable to read boot sector
[ 707.810207] FAULT_INJECTION: forcing a failure.
[ 707.810207] name failslab, interval 1, probability 0, space 0, times 0
[ 707.812204] CPU: 0 UID: 0 PID: 7300 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 707.812239] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 707.812256] Call Trace:
[ 707.812264]
[ 707.812275] dump_stack_lvl+0xfa/0x120
[ 707.812310] should_fail_ex+0x4d7/0x5e0
[ 707.812356] ? security_file_alloc+0x35/0x130
[ 707.812384] should_failslab+0xc2/0x120
[ 707.812414] kmem_cache_alloc_noprof+0x80/0x760
[ 707.812450] ? __create_object+0x59/0x80
[ 707.812491] ? security_file_alloc+0x35/0x130
[ 707.812517] security_file_alloc+0x35/0x130
[ 707.812546] init_file+0x95/0x480
[ 707.812578] alloc_empty_file+0x76/0x1e0
[ 707.812613] alloc_file_pseudo+0x12b/0x220
[ 707.812648] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 707.812692] __shmem_file_setup+0x1a8/0x370
[ 707.812728] __do_sys_memfd_create+0x4cc/0xa90
[ 707.812770] ? __pfx___do_sys_memfd_create+0x10/0x10
[ 707.812807] ? irqentry_exit+0xee/0x650
[ 707.812831] ? trace_hardirqs_on_prepare+0xe3/0x110
[ 707.812865] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 707.812917] do_syscall_64+0xbf/0x420
[ 707.812949] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 707.812976] RIP: 0033:0x7f184d908b19
[ 707.812997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 707.813023] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 707.813048] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d908b19
[ 707.813065] RDX: 00007f184ae7e000 RSI: 0000000000000000 RDI: 00007f184d9620fb
[ 707.813081] RBP: 0000000000000000 R08: 00007f184ae7dff8 R09: ffffffffffffffff
[ 707.813097] R10: 00007f184ae7dffc R11: 0000000000000246 R12: 0000000020000000
[ 707.813113] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020000080
[ 707.813147]
07:37:31 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:37:31 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 35)
07:37:31 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 21)
[ 707.910710] No source specified
[ 707.912842] FAT-fs (loop5): unable to read boot sector
[ 707.914050] FAT-fs (loop6): unable to read boot sector
[ 707.938859] FAULT_INJECTION: forcing a failure.
[ 707.938859] name failslab, interval 1, probability 0, space 0, times 0
[ 707.940015] CPU: 1 UID: 0 PID: 7314 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 707.940035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 707.940045] Call Trace:
[ 707.940051]
[ 707.940056] dump_stack_lvl+0xfa/0x120
[ 707.940080] should_fail_ex+0x4d7/0x5e0
[ 707.940107] ? __kernfs_new_node+0xd3/0x940
[ 707.940129] should_failslab+0xc2/0x120
[ 707.940146] kmem_cache_alloc_noprof+0x80/0x760
[ 707.940169] ? __pfx_avc_has_perm+0x10/0x10
[ 707.940190] ? __kernfs_new_node+0xd3/0x940
[ 707.940210] __kernfs_new_node+0xd3/0x940
[ 707.940229] ? __lock_acquire+0x451/0x2250
[ 707.940250] ? __pfx___kernfs_new_node+0x10/0x10
[ 707.940274] ? lock_acquire+0x15e/0x2d0
[ 707.940291] ? kernfs_root+0x23/0x2a0
[ 707.940310] ? find_held_lock+0x2b/0x80
[ 707.940333] ? kernfs_root+0xee/0x2a0
[ 707.940353] ? lock_release+0xc8/0x270
[ 707.940369] ? lock_is_held_type+0x9e/0x120
[ 707.940387] kernfs_new_node+0x13c/0x1e0
[ 707.940414] kernfs_create_dir_ns+0x4d/0x1a0
[ 707.940431] internal_create_group+0x440/0xeb0
[ 707.940453] ? __pfx___mutex_unlock_slowpath+0x10/0x10
[ 707.940473] ? __pfx_internal_create_group+0x10/0x10
[ 707.940493] ? blk_validate_limits+0xe47/0x15d0
[ 707.940515] ? lock_is_held_type+0x9e/0x120
[ 707.940530] loop_configure+0xc46/0x15a0
[ 707.940568] ? __pfx_loop_configure+0x10/0x10
[ 707.940598] ? avc_has_extended_perms+0x107/0xf20
[ 707.940615] ? find_held_lock+0x2b/0x80
[ 707.940637] ? avc_has_extended_perms+0x23b/0xf20
[ 707.940653] ? lock_release+0xc8/0x270
[ 707.940673] lo_ioctl+0x674/0x1cb0
[ 707.940696] ? __pfx_lo_ioctl+0x10/0x10
[ 707.940715] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 707.940737] ? lock_acquire+0x15e/0x2d0
[ 707.940754] ? __virt_addr_valid+0x1c6/0x5d0
[ 707.940772] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 707.940794] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 707.940813] ? lock_release+0xc8/0x270
[ 707.940830] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 707.940854] ? blkdev_common_ioctl+0x1c3/0x2860
[ 707.940899] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 707.940921] ? __fget_files+0x34/0x3b0
[ 707.940937] ? find_held_lock+0x2b/0x80
[ 707.940959] ? __fget_files+0x203/0x3b0
[ 707.940974] ? __pfx_lo_ioctl+0x10/0x10
[ 707.940993] blkdev_ioctl+0x365/0x6d0
[ 707.941012] ? __pfx_blkdev_ioctl+0x10/0x10
[ 707.941030] ? selinux_file_ioctl+0xb9/0x280
[ 707.941054] ? __pfx_blkdev_ioctl+0x10/0x10
[ 707.941073] __x64_sys_ioctl+0x18f/0x210
[ 707.941097] do_syscall_64+0xbf/0x420
[ 707.941115] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 707.941130] RIP: 0033:0x7fb40288d8d7
[ 707.941142] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 707.941156] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 707.941171] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 707.941181] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 707.941189] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 707.941199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 707.941208] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 707.941227]
07:37:31 executing program 1:
r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x2, 0xff)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x8)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 707.998578] FAT-fs (loop2): unable to read boot sector
[ 708.002107] FAT-fs (loop0): unable to read boot sector
[ 708.008636] FAULT_INJECTION: forcing a failure.
[ 708.008636] name failslab, interval 1, probability 0, space 0, times 0
[ 708.009655] CPU: 1 UID: 0 PID: 7315 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 708.009672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 708.009679] Call Trace:
[ 708.009684]
[ 708.009689] dump_stack_lvl+0xfa/0x120
[ 708.009706] should_fail_ex+0x4d7/0x5e0
[ 708.009728] ? kobject_uevent_env+0x23a/0xfd0
[ 708.009747] should_failslab+0xc2/0x120
[ 708.009762] __kmalloc_cache_noprof+0x80/0x730
[ 708.009780] ? set_capacity_and_notify+0xce/0x280
[ 708.009799] ? lock_release+0xc8/0x270
[ 708.009819] ? kobject_uevent_env+0x23a/0xfd0
[ 708.009839] kobject_uevent_env+0x23a/0xfd0
[ 708.009858] ? __pfx_dev_uevent_name+0x10/0x10
[ 708.009876] ? lock_is_held_type+0x9e/0x120
[ 708.009890] loop_configure+0xe3d/0x15a0
[ 708.009927] ? __pfx_loop_configure+0x10/0x10
[ 708.009956] ? avc_has_extended_perms+0x107/0xf20
[ 708.009972] ? find_held_lock+0x2b/0x80
[ 708.009993] ? avc_has_extended_perms+0x23b/0xf20
[ 708.010008] ? lock_release+0xc8/0x270
[ 708.010027] lo_ioctl+0x674/0x1cb0
[ 708.010048] ? __pfx_lo_ioctl+0x10/0x10
[ 708.010066] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 708.010087] ? lock_acquire+0x15e/0x2d0
[ 708.010103] ? __virt_addr_valid+0x1c6/0x5d0
[ 708.010118] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 708.010137] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 708.010154] ? lock_release+0xc8/0x270
[ 708.010170] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 708.010191] ? blkdev_common_ioctl+0x1c3/0x2860
[ 708.010226] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 708.010247] ? __fget_files+0x34/0x3b0
[ 708.010261] ? find_held_lock+0x2b/0x80
[ 708.010281] ? __fget_files+0x203/0x3b0
[ 708.010296] ? __pfx_lo_ioctl+0x10/0x10
[ 708.010314] blkdev_ioctl+0x365/0x6d0
[ 708.010331] ? __pfx_blkdev_ioctl+0x10/0x10
[ 708.010348] ? selinux_file_ioctl+0xb9/0x280
[ 708.010369] ? __pfx_blkdev_ioctl+0x10/0x10
[ 708.010388] __x64_sys_ioctl+0x18f/0x210
[ 708.010409] do_syscall_64+0xbf/0x420
[ 708.010425] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 708.010439] RIP: 0033:0x7fe78a9178d7
[ 708.010449] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 708.010462] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 708.010475] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 708.010485] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 708.010493] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 708.010501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 708.010509] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 708.010527]
07:37:31 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 37)
07:37:31 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 13)
07:37:31 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 26)
07:37:31 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 16)
07:37:31 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 708.102113] FAULT_INJECTION: forcing a failure.
[ 708.102113] name failslab, interval 1, probability 0, space 0, times 0
[ 708.103320] CPU: 1 UID: 0 PID: 7323 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 708.103337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 708.103345] Call Trace:
[ 708.103350]
[ 708.103355] dump_stack_lvl+0xfa/0x120
[ 708.103376] should_fail_ex+0x4d7/0x5e0
[ 708.103400] ? __es_insert_extent+0xed2/0x1370
[ 708.103421] should_failslab+0xc2/0x120
[ 708.103436] kmem_cache_alloc_noprof+0x80/0x760
[ 708.103460] ? __es_insert_extent+0xed2/0x1370
[ 708.103479] __es_insert_extent+0xed2/0x1370
[ 708.103507] ext4_es_insert_extent+0x43d/0x1060
[ 708.103531] ? crc32c+0x1ae/0x350
[ 708.103550] ? __pfx_ext4_es_insert_extent+0x10/0x10
[ 708.103570] ? lock_acquire+0x15e/0x2d0
[ 708.103587] ? ext4_map_blocks+0x564/0x1470
[ 708.103608] ? __pfx_down_write+0x10/0x10
[ 708.103628] ext4_map_blocks+0x808/0x1470
[ 708.103644] ? __up_read+0x26f/0x710
[ 708.103662] ? __pfx_ext4_map_blocks+0x10/0x10
[ 708.103674] ? __pfx___up_read+0x10/0x10
[ 708.103692] ? lock_release+0xc8/0x270
[ 708.103711] ? ext4_map_blocks+0x1e9/0x1470
[ 708.103728] ext4_getblk+0x67d/0x8e0
[ 708.103742] ? __pfx_ext4_getblk+0x10/0x10
[ 708.103754] ? __pfx_security_inode_init_security+0x10/0x10
[ 708.103776] ? crc32c+0x1ae/0x350
[ 708.103795] ext4_bread+0x2e/0x1a0
[ 708.103809] ext4_append+0x21d/0x530
[ 708.103826] ? __pfx_ext4_append+0x10/0x10
[ 708.103842] ? __pfx___ext4_new_inode+0x10/0x10
[ 708.103863] ext4_init_new_dir+0x13c/0x240
[ 708.103881] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 708.103909] ext4_mkdir+0x3c5/0xb30
[ 708.103930] ? __pfx_ext4_mkdir+0x10/0x10
[ 708.103948] ? security_inode_permission+0x72/0xe0
[ 708.103966] vfs_mkdir+0x6d8/0xc00
[ 708.103990] filename_mkdirat+0x118/0x430
[ 708.104006] ? __pfx_filename_mkdirat+0x10/0x10
[ 708.104021] ? strncpy_from_user+0x21b/0x2f0
[ 708.104043] __x64_sys_mkdir+0x6e/0xd0
[ 708.104057] do_syscall_64+0xbf/0x420
[ 708.104073] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 708.104087] RIP: 0033:0x7f1e78939c27
[ 708.104097] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 708.104110] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 708.104123] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 708.104131] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 708.104139] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 708.104147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 708.104155] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 708.104173]
07:37:31 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
prlimit64(r1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r1, 0x3, r0, 0xa)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0)
prlimit64(r2, 0x6, &(0x7f0000000200)={0xfff, 0x6}, &(0x7f0000000240))
r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000180)='.log\x00', 0x200000, 0x10)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x1f, 0x80, 0x44, 0x0, 0xbdf3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x10000, 0x1, 0x9, 0x2, 0x7fffffff, 0x3f, 0xc43, 0x0, 0xaf, 0x0, 0x5}, r1, 0x4, r3, 0x2)
[ 708.138880] FAT-fs (loop4): unable to read boot sector
[ 708.152394] FAT-fs (loop2): unable to read boot sector
[ 708.162717] FAT-fs (loop7): unable to read boot sector
07:37:31 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 22)
07:37:32 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 708.194550] No source specified
[ 708.201506] FAULT_INJECTION: forcing a failure.
[ 708.201506] name failslab, interval 1, probability 0, space 0, times 0
[ 708.209247] CPU: 0 UID: 0 PID: 7329 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 708.209283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 708.209299] Call Trace:
[ 708.209307]
[ 708.209316] dump_stack_lvl+0xfa/0x120
[ 708.209354] should_fail_ex+0x4d7/0x5e0
[ 708.209399] ? kobject_uevent_env+0x23a/0xfd0
[ 708.209434] should_failslab+0xc2/0x120
[ 708.209463] __kmalloc_cache_noprof+0x80/0x730
[ 708.209497] ? set_capacity_and_notify+0xce/0x280
[ 708.209532] ? lock_release+0xc8/0x270
[ 708.209570] ? kobject_uevent_env+0x23a/0xfd0
[ 708.209606] kobject_uevent_env+0x23a/0xfd0
[ 708.209641] ? __pfx_dev_uevent_name+0x10/0x10
[ 708.209674] ? lock_is_held_type+0x9e/0x120
[ 708.209702] loop_configure+0xe3d/0x15a0
[ 708.209763] ? __pfx_loop_configure+0x10/0x10
[ 708.209814] ? avc_has_extended_perms+0x107/0xf20
[ 708.209845] ? find_held_lock+0x2b/0x80
[ 708.209884] ? avc_has_extended_perms+0x23b/0xf20
[ 708.209922] ? lock_release+0xc8/0x270
[ 708.209956] lo_ioctl+0x674/0x1cb0
[ 708.209992] ? perf_tp_event+0x807/0xe70
[ 708.210018] ? __pfx_lo_ioctl+0x10/0x10
[ 708.210050] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 708.210084] ? __pfx_perf_tp_event+0x10/0x10
[ 708.210106] ? __pfx_perf_trace_lock+0x10/0x10
[ 708.210143] ? find_held_lock+0x2b/0x80
[ 708.210183] ? perf_trace_lock+0xbb/0x4f0
[ 708.210214] ? __lock_acquire+0x451/0x2250
[ 708.210244] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 708.210284] ? blkdev_common_ioctl+0x1c3/0x2860
[ 708.210347] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 708.210385] ? __fget_files+0x34/0x3b0
[ 708.210411] ? find_held_lock+0x2b/0x80
[ 708.210449] ? __fget_files+0x203/0x3b0
[ 708.210475] ? __pfx_lo_ioctl+0x10/0x10
[ 708.210509] blkdev_ioctl+0x365/0x6d0
[ 708.210539] ? __pfx_blkdev_ioctl+0x10/0x10
[ 708.210570] ? selinux_file_ioctl+0xb9/0x280
[ 708.210610] ? __pfx_blkdev_ioctl+0x10/0x10
[ 708.210643] __x64_sys_ioctl+0x18f/0x210
[ 708.210683] do_syscall_64+0xbf/0x420
[ 708.210712] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 708.210738] RIP: 0033:0x7f775d7e38d7
[ 708.210758] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 708.210782] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 708.210823] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 708.210839] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 708.210855] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 708.210870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 708.210885] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 708.210917]
[ 708.280530] FAT-fs (loop0): unable to read boot sector
[ 708.292599] FAULT_INJECTION: forcing a failure.
[ 708.292599] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 708.293604] CPU: 1 UID: 0 PID: 7336 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 708.293622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 708.293630] Call Trace:
[ 708.293635]
[ 708.293640] dump_stack_lvl+0xfa/0x120
[ 708.293661] should_fail_ex+0x4d7/0x5e0
[ 708.293684] strncpy_from_user+0x3b/0x2f0
[ 708.293702] do_getname+0x70/0x3d0
[ 708.293720] do_sys_openat2+0xa0/0x210
[ 708.293738] ? __pfx_do_sys_openat2+0x10/0x10
[ 708.293756] ? find_held_lock+0x2b/0x80
[ 708.293780] __x64_sys_openat+0x142/0x200
[ 708.293796] ? __pfx___x64_sys_openat+0x10/0x10
[ 708.293813] ? fput+0x92/0xd0
[ 708.293830] do_syscall_64+0xbf/0x420
[ 708.293845] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 708.293859] RIP: 0033:0x7f5a8d267a04
[ 708.293869] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 708.293881] RSP: 002b:00007f5a8a829ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 708.293898] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d267a04
[ 708.293906] RDX: 0000000000000002 RSI: 00007f5a8a82a000 RDI: 00000000ffffff9c
[ 708.293914] RBP: 00007f5a8a82a000 R08: 0000000000000000 R09: ffffffffffffffff
[ 708.293921] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 708.293929] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 708.293944]
[ 708.301319] FAT-fs (loop5): unable to read boot sector
[ 708.320202] FAT-fs (loop2): unable to read boot sector
07:37:41 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 14)
07:37:41 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb)
r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0)
pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000100)="7db8ba58aaed35a4ac2d42d8f357440628b39db6b69f458d985c20d577650a39a651fe1e7747742e01a205d590dbc4f395bdd799e0d2f98b0f8396a4b6d28d24300653ae20a7e3425863a1618d4b2f549204589866a8ced2809ad518bc7de54d519adba70973e06219e4152108b2a4e66c6dcc77d1fe455e933ce445f48b9412d4af91aa72a011d040fc7dcdc7373f7b3fb59a5d7d4953ce0c45e85ffe7c392808f924a7147a972c595a461db3b391e123", 0xb1}, {&(0x7f00000001c0)="76d6627881b88c2c4432deb0191e1e3adf71e2ed981d2f28cd3f675c4f62c818ac769b809b137aa0377466f1e82c413c00ff95680618c44756e2a37d5f5ed1609ce03f7896bec43fbedf519af54d3e3c1a24be94ad15e89b8523f7966c0c2d31a39c38178f524bf9edf1007743aa9362b0b1144e7d573760653f6cb023a95ac4e179dafc73a20eb64e48ca9bd615cc5225bbfe199d71710fa940972a618fb19fba98f3bc8b6cedd6c0d3b0430d8baa5ab105e6db3e9bd138bdfc512d65870e74da349cda0734a377f6cb982923f80ba08a545f1c9c8b27bbde3d35aa0b69e37069bc3afcfdfc38496a4d410f442dfae45e69689166e795751025", 0xfa}, {&(0x7f0000000000)="d18dd9c5ec5d318d937c3d04eddd63a1622f8976ec7181e36b8c5861397c4e94a5c79cc4e6ac62f0d1b5b99acb4480a9", 0x30}, {&(0x7f00000002c0)="1414d6e479260fe19ac51e92162fe126458cd42804877e8065357602a19815d134e45cb6b65cc7de70758216d3237cdd6bea537a3aef69c47bc83a2c0c983aae4dedbae07dd2fc598d84e6d658468a0b12dc63118b1fee8940fa79f5c35c5557c428365e4ace404c547a48b8993edef69c6d43ac25436276c7e0f214e31ce85c8def3c9feacd45e02e05d9d8f6aa4260f9f6937f375e71499ec736f87f64a586bc4f629e7d0d0a3352bbbe2de6fb92eb7383df6ea03330de8d6c6265b15f1804184cff925f9f5dc69599a1d3149dc5618c2c3be82b3c0051f3f67235b4", 0xdd}, {&(0x7f00000003c0)="4da54e7616a2b485f0a9d349d06ed90087bb4a04bec7b081e4f54c51fe254f3a3dd6b7ec5e6d9e7df1d9468436430bec2767e2e32961850e5ed3ed268b3ad6f6a1dcb92e824ba43233f7169ad9d3938ba8975ddd6f43890b104f269b34f15e5c4e4dd8ec9769183703e2258a8ed4b1e724e86d56f3f77233cef476ce0299828b0ba84569295066446ce377d95495bcf23804a0cd1c0e", 0x96}, {&(0x7f0000000040)="a5153e05d77af91a5a02f1c10edfe79abe765f21104d8bf8c506cbf135c733d12e7d1d83890cf2110e4511", 0x2b}], 0x6, 0x800, 0x0)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001940)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'})
ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r2)
r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000018c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0b07000000000000000001000000080001000000000008000300", @ANYRES32=0x0, @ANYBLOB="fdff3263e4f8d0f1dacee0a442b870232144f1ab3743770c6cbf2314575897f29f1c5451195fd96f4b6893d2ab62197b32a654d47e06bb01b0d1e263221345be9955117cdf5769aa7f5bf59a6c"], 0x24}}, 0x0)
sendmsg$nl_generic(r3, &(0x7f0000001880)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001840)={&(0x7f0000000540)={0x12f8, 0x22, 0x146b661301d9ab6, 0x70bd2d, 0x25dfdbfc, {0x16}, [@generic="fccbb2ecf750df82936992ac01f916da857995af4c99c6d9bc37e68d87e9bcc9db4458e3b532068cd02ba434ad29f624000dfb994f7efb1073b4393c79cb7855778c3ccd4735974f6ad2c3802a900fb7f7dacc65e885211cf94a75d52de717f44807fd3f563a24151a15c95c44ab46616f8f9cc8f05191364a7aff", @nested={0x1240, 0x4e, 0x0, 0x1, [@typed={0x8, 0x70, 0x0, 0x0, @ipv4=@private=0xa010102}, @generic="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", @generic="b1c5a093ef276a3467e13fe73b10f655bb993c824e0447c8227547e8633e5b3290ccbf6a218cb7b20701531143bd3a0db3c497ad5972987407337880af0eeab3345376f452a0ebf5551f519228bbd979d5eb5a91132c44b5c9da6013390c65e3d708ed606efcf8175c5b28064069050d997cf76e381e3784af3e3b97892d909cd641dd4c5909", @typed={0x8, 0x63, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x22, 0x0, 0x0, @fd=r1}, @generic="2d79abc43b8a07fc2041cf97ac283700a592c0b28ce86d67fe710f4671e93e3d6518ec4c46a2a6d687f71eaccf69c0a52ddc05a9aae039da3f446ef0f24c9fa8f7f4aae71b16f032c9189bc925a244a7280a66b707d393402cb2095a8470ef98b5fb7bcbece87cbafff31c9809359f54f36b2b5070ee6c11b714b06c7c5bd09d0d793610fdadcc986eb6091aff18e8500adf4888c66ed6089a7f44eb30fce007c54f45e86e88c6bb2777459d0e53fa3e8576005016d22f3226", @generic="1d87", @generic="5ae8ad4c1286f9f73817eef932fbfcc671a1d8f67c57bd9c92ed3dc81c39df174adaddcd895065497192b9e4f6fb748ccec35243b9761d454b3ed9dbe93524ec2bf79b17816cac17c49d91366acd9b74c9d48e779ee412ba4c09d44e889f65181d0068718bb77ad7818c15417f9848c9e19c179c13dfff20067f99bb8aa39e337839fee30d8105bedd22e2", @typed={0x58, 0x14, 0x0, 0x0, @binary="89979e55c859df17ae6d5fcac0a2344169fc29999a7e584209fa851ab2b062cbd1cd56a2e13cd2653c41dd40dafceae5beadc921c6966f6c5bf9d0d1d442e7e29f7307951843901d2a65a65f93cccf79abc9cef8"}]}, @generic="3a4c6ced18d98d35bd2fa567b6e78c27c884eebff65d5022cee8fd00a2d1118b6eb88ac3f882"]}, 0x12f8}}, 0x40800)
07:37:41 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 38)
07:37:41 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 17)
07:37:41 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:37:41 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 36)
07:37:41 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 27)
07:37:41 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 23)
[ 717.768615] FAULT_INJECTION: forcing a failure.
[ 717.768615] name failslab, interval 1, probability 0, space 0, times 0
[ 717.769584] CPU: 1 UID: 0 PID: 7354 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 717.769600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 717.769611] Call Trace:
[ 717.769616]
[ 717.769621] dump_stack_lvl+0xfa/0x120
[ 717.769642] should_fail_ex+0x4d7/0x5e0
[ 717.769665] ? __kernfs_new_node+0xd3/0x940
[ 717.769683] should_failslab+0xc2/0x120
[ 717.769697] kmem_cache_alloc_noprof+0x80/0x760
[ 717.769720] ? __kernfs_new_node+0xd3/0x940
[ 717.769736] __kernfs_new_node+0xd3/0x940
[ 717.769751] ? __lock_acquire+0x451/0x2250
[ 717.769769] ? __pfx___kernfs_new_node+0x10/0x10
[ 717.769789] ? lock_acquire+0x15e/0x2d0
[ 717.769802] ? kernfs_root+0x23/0x2a0
[ 717.769818] ? find_held_lock+0x2b/0x80
[ 717.769842] ? kernfs_root+0xee/0x2a0
[ 717.769858] ? lock_release+0xc8/0x270
[ 717.769871] ? lock_is_held_type+0x9e/0x120
[ 717.769886] kernfs_new_node+0x13c/0x1e0
[ 717.769908] __kernfs_create_file+0x55/0x360
[ 717.769924] sysfs_add_file_mode_ns+0x21c/0x430
[ 717.769941] ? __pfx_dev_attr_store+0x10/0x10
[ 717.769962] internal_create_group+0x662/0xeb0
[ 717.769984] ? __pfx_internal_create_group+0x10/0x10
[ 717.770001] ? blk_validate_limits+0xe47/0x15d0
[ 717.770018] ? lock_is_held_type+0x9e/0x120
[ 717.770031] loop_configure+0xc46/0x15a0
[ 717.770061] ? __pfx_loop_configure+0x10/0x10
[ 717.770086] ? avc_has_extended_perms+0x107/0xf20
[ 717.770101] ? find_held_lock+0x2b/0x80
[ 717.770119] ? avc_has_extended_perms+0x23b/0xf20
[ 717.770133] ? lock_release+0xc8/0x270
[ 717.770149] lo_ioctl+0x674/0x1cb0
[ 717.770168] ? __pfx_lo_ioctl+0x10/0x10
[ 717.770183] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 717.770200] ? __pfx___pmu_ctx_sched_in+0x10/0x10
[ 717.770217] ? kvm_sched_clock_read+0x16/0x30
[ 717.770236] ? find_held_lock+0x2b/0x80
[ 717.770257] ? __lock_acquire+0x451/0x2250
[ 717.770271] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 717.770291] ? blkdev_common_ioctl+0x1c3/0x2860
[ 717.770323] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 717.770341] ? __fget_files+0x34/0x3b0
[ 717.770354] ? find_held_lock+0x2b/0x80
[ 717.770372] ? __fget_files+0x203/0x3b0
[ 717.770385] ? __pfx_lo_ioctl+0x10/0x10
[ 717.770401] blkdev_ioctl+0x365/0x6d0
[ 717.770416] ? __pfx_blkdev_ioctl+0x10/0x10
[ 717.770431] ? selinux_file_ioctl+0xb9/0x280
[ 717.770451] ? __pfx_blkdev_ioctl+0x10/0x10
[ 717.770467] __x64_sys_ioctl+0x18f/0x210
[ 717.770487] do_syscall_64+0xbf/0x420
[ 717.770501] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 717.770514] RIP: 0033:0x7fb40288d8d7
[ 717.770524] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 717.770536] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 717.770547] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 717.770556] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 717.770563] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 717.770570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 717.770577] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 717.770593]
[ 717.796109] No source specified
[ 717.797135] FAT-fs (loop4): unable to read boot sector
[ 717.824848] FAT-fs (loop5): unable to read boot sector
[ 717.826221] FAULT_INJECTION: forcing a failure.
[ 717.826221] name failslab, interval 1, probability 0, space 0, times 0
[ 717.829961] FAULT_INJECTION: forcing a failure.
[ 717.829961] name failslab, interval 1, probability 0, space 0, times 0
[ 717.836119] CPU: 0 UID: 0 PID: 7356 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 717.836156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 717.836172] Call Trace:
[ 717.836180]
[ 717.836190] dump_stack_lvl+0xfa/0x120
[ 717.836226] should_fail_ex+0x4d7/0x5e0
[ 717.836272] ? do_getname+0x2b/0x3d0
[ 717.836303] should_failslab+0xc2/0x120
[ 717.836333] kmem_cache_alloc_noprof+0x80/0x760
[ 717.836385] ? lock_release+0xc8/0x270
[ 717.836430] ? do_getname+0x2b/0x3d0
[ 717.836459] do_getname+0x2b/0x3d0
[ 717.836495] do_sys_openat2+0xa0/0x210
[ 717.836528] ? __pfx_do_sys_openat2+0x10/0x10
[ 717.836560] ? perf_trace_run_bpf_submit+0xef/0x180
[ 717.836596] ? perf_trace_preemptirq_template+0x259/0x430
[ 717.836637] __x64_sys_openat+0x142/0x200
[ 717.836671] ? __pfx___x64_sys_openat+0x10/0x10
[ 717.836708] ? fput+0x92/0xd0
[ 717.836747] do_syscall_64+0xbf/0x420
[ 717.836778] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 717.836804] RIP: 0033:0x7f184d8bba04
[ 717.836825] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 717.836849] RSP: 002b:00007f184ae7ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 717.836874] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d8bba04
[ 717.836891] RDX: 0000000000000002 RSI: 00007f184ae7e000 RDI: 00000000ffffff9c
[ 717.836917] RBP: 00007f184ae7e000 R08: 0000000000000000 R09: ffffffffffffffff
[ 717.836933] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 717.836948] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 717.836986]
[ 717.845324] FAT-fs (loop0): unable to read boot sector
[ 717.848016] CPU: 0 UID: 0 PID: 7360 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 717.848052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 717.848067] Call Trace:
[ 717.848075]
07:37:41 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 28)
[ 717.848084] dump_stack_lvl+0xfa/0x120
[ 717.848116] should_fail_ex+0x4d7/0x5e0
[ 717.848159] ? alloc_empty_file+0x58/0x1e0
[ 717.848188] should_failslab+0xc2/0x120
[ 717.848215] kmem_cache_alloc_noprof+0x80/0x760
[ 717.848251] ? __is_insn_slot_addr+0x136/0x290
[ 717.848281] ? lock_release+0xc8/0x270
[ 717.848318] ? alloc_empty_file+0x58/0x1e0
[ 717.848348] alloc_empty_file+0x58/0x1e0
[ 717.848382] path_openat+0xee/0x2d60
[ 717.848408] ? __kernel_text_address+0xd/0x40
[ 717.848441] ? unwind_get_return_address+0x59/0xa0
[ 717.848469] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 717.848503] ? arch_stack_walk+0x9c/0xf0
[ 717.848540] ? perf_trace_run_bpf_submit+0xef/0x180
[ 717.848570] ? __pfx_path_openat+0x10/0x10
[ 717.848599] ? perf_trace_lock+0xbb/0x4f0
[ 717.848630] ? __lock_acquire+0x451/0x2250
[ 717.848672] do_file_open+0x209/0x460
[ 717.848699] ? __pfx_do_file_open+0x10/0x10
[ 717.848741] ? find_held_lock+0x2b/0x80
[ 717.848781] ? alloc_fd+0x2c1/0x560
[ 717.848806] ? lock_release+0xc8/0x270
[ 717.848843] ? _raw_spin_unlock+0x1e/0x40
[ 717.848879] ? alloc_fd+0x2c1/0x560
[ 717.848926] do_sys_openat2+0xe7/0x210
07:37:41 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 37)
[ 717.848971] ? __pfx_do_sys_openat2+0x10/0x10
[ 717.849003] ? perf_trace_run_bpf_submit+0xef/0x180
[ 717.849038] ? perf_trace_preemptirq_template+0x259/0x430
[ 717.849077] __x64_sys_openat+0x142/0x200
[ 717.849111] ? __pfx___x64_sys_openat+0x10/0x10
[ 717.849148] ? fput+0x92/0xd0
[ 717.849187] do_syscall_64+0xbf/0x420
[ 717.849218] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 717.849243] RIP: 0033:0x7f5a8d267a04
[ 717.849263] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 717.849288] RSP: 002b:00007f5a8a829ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 717.849312] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d267a04
[ 717.849329] RDX: 0000000000000002 RSI: 00007f5a8a82a000 RDI: 00000000ffffff9c
[ 717.849345] RBP: 00007f5a8a82a000 R08: 0000000000000000 R09: ffffffffffffffff
[ 717.849361] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 717.849376] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 717.849412]
[ 717.856370] FAT-fs (loop2): unable to read boot sector
[ 717.899061] FAULT_INJECTION: forcing a failure.
[ 717.899061] name failslab, interval 1, probability 0, space 0, times 0
[ 717.903794] CPU: 1 UID: 0 PID: 7364 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 717.903812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 717.903820] Call Trace:
[ 717.903824]
[ 717.903829] dump_stack_lvl+0xfa/0x120
[ 717.903850] should_fail_ex+0x4d7/0x5e0
[ 717.903874] ? jbd2_journal_add_journal_head+0x367/0x5d0
[ 717.903897] should_failslab+0xc2/0x120
[ 717.903912] kmem_cache_alloc_noprof+0x80/0x760
[ 717.903931] ? fs_reclaim_acquire+0xae/0x150
[ 717.903948] ? jbd2_journal_add_journal_head+0x367/0x5d0
[ 717.903965] jbd2_journal_add_journal_head+0x367/0x5d0
[ 717.903985] jbd2_journal_get_create_access+0x44/0x560
[ 717.903998] ? lock_is_held_type+0x9e/0x120
[ 717.904013] __ext4_journal_get_create_access+0x54/0x1b0
[ 717.904034] ext4_getblk+0x3c5/0x8e0
[ 717.904048] ? __pfx_ext4_getblk+0x10/0x10
[ 717.904059] ? __pfx_security_inode_init_security+0x10/0x10
[ 717.904081] ? crc32c+0x1ae/0x350
[ 717.904101] ext4_bread+0x2e/0x1a0
[ 717.904114] ext4_append+0x21d/0x530
[ 717.904131] ? __pfx_ext4_append+0x10/0x10
[ 717.904146] ? __pfx___ext4_new_inode+0x10/0x10
[ 717.904167] ext4_init_new_dir+0x13c/0x240
[ 717.904185] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 717.904208] ext4_mkdir+0x3c5/0xb30
[ 717.904228] ? __pfx_ext4_mkdir+0x10/0x10
[ 717.904245] ? security_inode_permission+0x72/0xe0
[ 717.904263] vfs_mkdir+0x6d8/0xc00
[ 717.904285] filename_mkdirat+0x118/0x430
[ 717.904301] ? __pfx_filename_mkdirat+0x10/0x10
[ 717.904315] ? strncpy_from_user+0x21b/0x2f0
[ 717.904338] __x64_sys_mkdir+0x6e/0xd0
[ 717.904351] do_syscall_64+0xbf/0x420
[ 717.904367] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 717.904380] RIP: 0033:0x7f1e78939c27
[ 717.904390] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 717.904402] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053
[ 717.904414] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e78939c27
[ 717.904422] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000040
[ 717.904430] RBP: 00007f1e75eb0040 R08: 0000000000000000 R09: 0000000000000000
[ 717.904437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000
[ 717.904445] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 717.904463]
[ 717.958522] FAT-fs (loop4): unable to read boot sector
[ 717.986985] ENOMEM in journal_alloc_journal_head, retrying.
[ 717.987812] No source specified
07:37:51 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 24)
07:37:51 executing program 1:
r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x4840, 0x0)
ioctl$CDROMREADMODE1(r0, 0x530d, &(0x7f0000000480)={0x0, 0x80})
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:37:51 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 38)
07:37:51 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 15)
07:37:51 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:37:51 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 29)
07:37:51 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 18)
07:37:51 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 39)
[ 727.936045] FAT-fs (loop6): unable to read boot sector
[ 727.989503] No source specified
[ 727.995968] FAT-fs (loop2): unable to read boot sector
[ 728.006186] FAT-fs (loop0): unable to read boot sector
[ 728.008678] FAULT_INJECTION: forcing a failure.
[ 728.008678] name failslab, interval 1, probability 0, space 0, times 0
[ 728.012400] FAT-fs (loop4): unable to read boot sector
[ 728.018022] CPU: 1 UID: 0 PID: 7390 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.018054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.018069] Call Trace:
[ 728.018076]
[ 728.018085] dump_stack_lvl+0xfa/0x120
[ 728.018118] should_fail_ex+0x4d7/0x5e0
[ 728.018159] should_failslab+0xc2/0x120
[ 728.018184] kmem_cache_alloc_node_noprof+0x87/0x730
[ 728.018219] ? __alloc_skb+0x159/0x440
[ 728.018254] ? __alloc_skb+0x159/0x440
[ 728.018279] __alloc_skb+0x159/0x440
[ 728.018304] ? __alloc_skb+0x37d/0x440
[ 728.018330] ? __pfx___alloc_skb+0x10/0x10
[ 728.018356] ? lock_acquire+0x15e/0x2d0
[ 728.018386] ? netlink_has_listeners+0x7f/0x430
[ 728.018432] ? netlink_has_listeners+0x20d/0x430
[ 728.018469] ? lock_release+0xc8/0x270
[ 728.018499] alloc_uevent_skb+0x7b/0x210
[ 728.018535] kobject_uevent_env+0xad2/0xfd0
[ 728.018571] ? lock_is_held_type+0x9e/0x120
[ 728.018596] loop_configure+0xe3d/0x15a0
[ 728.018650] ? __pfx_loop_configure+0x10/0x10
[ 728.018696] ? avc_has_extended_perms+0x107/0xf20
[ 728.018723] ? find_held_lock+0x2b/0x80
[ 728.018758] ? avc_has_extended_perms+0x23b/0xf20
[ 728.018784] ? lock_release+0xc8/0x270
[ 728.018814] lo_ioctl+0x674/0x1cb0
[ 728.018846] ? perf_tp_event+0x807/0xe70
[ 728.018869] ? __pfx_lo_ioctl+0x10/0x10
[ 728.018908] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 728.018938] ? __pfx_perf_tp_event+0x10/0x10
[ 728.018963] ? perf_trace_preemptirq_template+0x259/0x430
[ 728.018997] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 728.019068] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 728.019103] ? blkdev_common_ioctl+0x1c3/0x2860
[ 728.019161] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 728.019196] ? __fget_files+0x34/0x3b0
[ 728.019218] ? find_held_lock+0x2b/0x80
[ 728.019252] ? __fget_files+0x203/0x3b0
[ 728.019275] ? __pfx_lo_ioctl+0x10/0x10
[ 728.019305] blkdev_ioctl+0x365/0x6d0
[ 728.019333] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.019361] ? selinux_file_ioctl+0xb9/0x280
[ 728.019401] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.019447] __x64_sys_ioctl+0x18f/0x210
[ 728.019502] do_syscall_64+0xbf/0x420
[ 728.019529] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.019553] RIP: 0033:0x7f775d7e38d7
[ 728.019570] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 728.019592] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 728.019614] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 728.019629] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 728.019642] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 728.019655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 728.019668] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 728.019697]
[ 728.074556] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive.
07:37:51 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 19)
07:37:51 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 30)
[ 728.098447] FAT-fs (loop7): unable to read boot sector
[ 728.108347] FAT-fs (loop5): unable to read boot sector
07:37:51 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:37:51 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 39)
07:37:52 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 25)
[ 728.227971] FAULT_INJECTION: forcing a failure.
[ 728.227971] name failslab, interval 1, probability 0, space 0, times 0
07:37:52 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 40)
[ 728.248007] CPU: 0 UID: 0 PID: 7397 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.248038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.248051] Call Trace:
[ 728.248059]
[ 728.248067] dump_stack_lvl+0xfa/0x120
[ 728.248098] should_fail_ex+0x4d7/0x5e0
[ 728.248142] ? security_file_alloc+0x35/0x130
[ 728.248177] should_failslab+0xc2/0x120
[ 728.248208] kmem_cache_alloc_noprof+0x80/0x760
[ 728.248239] ? __create_object+0x59/0x80
[ 728.248272] ? security_file_alloc+0x35/0x130
[ 728.248294] security_file_alloc+0x35/0x130
[ 728.248318] init_file+0x95/0x480
[ 728.248346] alloc_empty_file+0x76/0x1e0
[ 728.248374] path_openat+0xee/0x2d60
[ 728.248397] ? __kernel_text_address+0xd/0x40
[ 728.248426] ? unwind_get_return_address+0x59/0xa0
[ 728.248449] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 728.248479] ? arch_stack_walk+0x9c/0xf0
[ 728.248510] ? perf_trace_run_bpf_submit+0xef/0x180
[ 728.248535] ? __pfx_path_openat+0x10/0x10
[ 728.248559] ? __lock_acquire+0x451/0x2250
[ 728.248594] do_file_open+0x209/0x460
[ 728.248617] ? __pfx_do_file_open+0x10/0x10
[ 728.248651] ? find_held_lock+0x2b/0x80
[ 728.248684] ? alloc_fd+0x2c1/0x560
[ 728.248705] ? lock_release+0xc8/0x270
[ 728.248735] ? _raw_spin_unlock+0x1e/0x40
[ 728.248766] ? alloc_fd+0x2c1/0x560
[ 728.248795] do_sys_openat2+0xe7/0x210
[ 728.248823] ? __pfx_do_sys_openat2+0x10/0x10
[ 728.248849] ? perf_trace_run_bpf_submit+0xef/0x180
[ 728.248879] ? perf_trace_preemptirq_template+0x259/0x430
[ 728.248922] __x64_sys_openat+0x142/0x200
[ 728.248951] ? __pfx___x64_sys_openat+0x10/0x10
[ 728.248982] ? fput+0x92/0xd0
[ 728.249013] do_syscall_64+0xbf/0x420
[ 728.249039] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.249061] RIP: 0033:0x7f5a8d267a04
[ 728.249078] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 728.249099] RSP: 002b:00007f5a8a829ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 728.249121] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d267a04
[ 728.249142] RDX: 0000000000000002 RSI: 00007f5a8a82a000 RDI: 00000000ffffff9c
[ 728.249162] RBP: 00007f5a8a82a000 R08: 0000000000000000 R09: ffffffffffffffff
[ 728.249182] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 728.249195] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 728.249224]
07:37:52 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 16)
[ 728.343272] FAULT_INJECTION: forcing a failure.
[ 728.343272] name failslab, interval 1, probability 0, space 0, times 0
[ 728.353128] FAT-fs (loop2): unable to read boot sector
[ 728.354025] FAULT_INJECTION: forcing a failure.
[ 728.354025] name failslab, interval 1, probability 0, space 0, times 0
[ 728.355991] CPU: 1 UID: 0 PID: 7404 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.356031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.356047] Call Trace:
[ 728.356058]
[ 728.356069] dump_stack_lvl+0xfa/0x120
[ 728.356111] should_fail_ex+0x4d7/0x5e0
[ 728.356166] should_failslab+0xc2/0x120
[ 728.356200] kmem_cache_alloc_node_noprof+0x87/0x730
[ 728.356248] ? __alloc_skb+0x159/0x440
[ 728.356294] ? __alloc_skb+0x159/0x440
[ 728.356327] __alloc_skb+0x159/0x440
[ 728.356364] ? __alloc_skb+0x37d/0x440
[ 728.356400] ? __pfx___alloc_skb+0x10/0x10
[ 728.356433] ? lock_acquire+0x15e/0x2d0
[ 728.356470] ? netlink_has_listeners+0x7f/0x430
[ 728.356512] ? netlink_has_listeners+0x20d/0x430
[ 728.356549] ? lock_release+0xc8/0x270
[ 728.356593] alloc_uevent_skb+0x7b/0x210
[ 728.356642] kobject_uevent_env+0xad2/0xfd0
[ 728.356692] ? lock_is_held_type+0x9e/0x120
[ 728.356725] loop_configure+0xe3d/0x15a0
[ 728.356799] ? __pfx_loop_configure+0x10/0x10
[ 728.356867] ? avc_has_extended_perms+0x107/0xf20
[ 728.356913] ? find_held_lock+0x2b/0x80
[ 728.356960] ? avc_has_extended_perms+0x23b/0xf20
[ 728.356993] ? lock_release+0xc8/0x270
[ 728.357033] lo_ioctl+0x674/0x1cb0
[ 728.357084] ? __pfx_lo_ioctl+0x10/0x10
[ 728.357122] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 728.357169] ? lock_acquire+0x15e/0x2d0
[ 728.357204] ? __virt_addr_valid+0x1c6/0x5d0
[ 728.357238] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 728.357282] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 728.357325] ? lock_release+0xc8/0x270
[ 728.357360] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 728.357407] ? blkdev_common_ioctl+0x1c3/0x2860
[ 728.357487] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 728.357533] ? __fget_files+0x34/0x3b0
[ 728.357568] ? find_held_lock+0x2b/0x80
[ 728.357620] ? __fget_files+0x203/0x3b0
[ 728.357652] ? __pfx_lo_ioctl+0x10/0x10
[ 728.357691] blkdev_ioctl+0x365/0x6d0
[ 728.357728] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.357766] ? selinux_file_ioctl+0xb9/0x280
[ 728.357822] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.357863] __x64_sys_ioctl+0x18f/0x210
[ 728.357911] do_syscall_64+0xbf/0x420
[ 728.357947] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.357977] RIP: 0033:0x7fe78a9178d7
[ 728.358000] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 728.358027] RSP: 002b:00007fe787e8cf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 728.358056] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 728.358077] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 728.358094] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 728.358112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 728.358129] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 728.358169]
[ 728.407801] CPU: 1 UID: 0 PID: 7406 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.407848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.407867] Call Trace:
[ 728.407877]
[ 728.407889] dump_stack_lvl+0xfa/0x120
[ 728.407939] should_fail_ex+0x4d7/0x5e0
[ 728.407998] ? __kernfs_new_node+0xd3/0x940
[ 728.408046] should_failslab+0xc2/0x120
[ 728.408083] kmem_cache_alloc_noprof+0x80/0x760
[ 728.408148] ? __kernfs_new_node+0xd3/0x940
[ 728.408196] __kernfs_new_node+0xd3/0x940
[ 728.408242] ? __lock_acquire+0x451/0x2250
[ 728.408291] ? __pfx___kernfs_new_node+0x10/0x10
[ 728.408349] ? lock_acquire+0x15e/0x2d0
[ 728.408390] ? kernfs_root+0x23/0x2a0
[ 728.408436] ? find_held_lock+0x2b/0x80
[ 728.408487] ? kernfs_root+0xee/0x2a0
[ 728.408534] ? lock_release+0xc8/0x270
[ 728.408574] ? lock_is_held_type+0x9e/0x120
[ 728.408617] kernfs_new_node+0x13c/0x1e0
[ 728.408681] __kernfs_create_file+0x55/0x360
[ 728.408729] sysfs_add_file_mode_ns+0x21c/0x430
[ 728.408782] ? __pfx_dev_attr_store+0x10/0x10
[ 728.408839] internal_create_group+0x662/0xeb0
[ 728.408906] ? __pfx_internal_create_group+0x10/0x10
[ 728.408957] ? blk_validate_limits+0xe47/0x15d0
[ 728.409007] ? lock_is_held_type+0x9e/0x120
[ 728.409045] loop_configure+0xc46/0x15a0
[ 728.409134] ? __pfx_loop_configure+0x10/0x10
[ 728.409212] ? avc_has_extended_perms+0x107/0xf20
[ 728.409253] ? find_held_lock+0x2b/0x80
[ 728.409308] ? avc_has_extended_perms+0x23b/0xf20
[ 728.409349] ? lock_release+0xc8/0x270
[ 728.409396] lo_ioctl+0x674/0x1cb0
[ 728.409452] ? __pfx_lo_ioctl+0x10/0x10
[ 728.409499] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 728.409560] ? lock_acquire+0x15e/0x2d0
[ 728.409601] ? __virt_addr_valid+0x1c6/0x5d0
[ 728.409642] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 728.409691] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 728.409736] ? lock_release+0xc8/0x270
[ 728.409778] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 728.409833] ? blkdev_common_ioctl+0x1c3/0x2860
[ 728.409929] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 728.409985] ? __fget_files+0x34/0x3b0
[ 728.410019] ? find_held_lock+0x2b/0x80
[ 728.410073] ? __fget_files+0x203/0x3b0
[ 728.410111] ? __pfx_lo_ioctl+0x10/0x10
[ 728.410159] blkdev_ioctl+0x365/0x6d0
[ 728.410202] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.410247] ? selinux_file_ioctl+0xb9/0x280
[ 728.410304] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.410351] __x64_sys_ioctl+0x18f/0x210
[ 728.410406] do_syscall_64+0xbf/0x420
[ 728.410446] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.410480] RIP: 0033:0x7fb40288d8d7
[ 728.410506] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 728.410539] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 728.410571] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 728.410594] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 728.410614] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 728.410635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 728.410655] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 728.410704]
[ 728.418031] FAT-fs (loop5): unable to read boot sector
[ 728.428773] FAT-fs (loop0): unable to read boot sector
[ 728.436541] FAT-fs (loop4): unable to read boot sector
[ 728.497830] FAULT_INJECTION: forcing a failure.
[ 728.497830] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 728.499606] CPU: 1 UID: 0 PID: 7410 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.499638] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.499652] Call Trace:
[ 728.499660]
[ 728.499668] dump_stack_lvl+0xfa/0x120
[ 728.499699] should_fail_ex+0x4d7/0x5e0
[ 728.499739] strncpy_from_user+0x3b/0x2f0
[ 728.499770] do_getname+0x70/0x3d0
[ 728.499801] do_sys_openat2+0xa0/0x210
[ 728.499830] ? __pfx_do_sys_openat2+0x10/0x10
[ 728.499864] ? find_held_lock+0x2b/0x80
[ 728.499911] __x64_sys_openat+0x142/0x200
[ 728.499940] ? __pfx___x64_sys_openat+0x10/0x10
[ 728.499972] ? fput+0x92/0xd0
[ 728.500003] do_syscall_64+0xbf/0x420
[ 728.500029] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.500052] RIP: 0033:0x7f184d8bba04
[ 728.500070] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 728.500092] RSP: 002b:00007f184ae7ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 728.500113] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d8bba04
[ 728.500128] RDX: 0000000000000002 RSI: 00007f184ae7e000 RDI: 00000000ffffff9c
[ 728.500142] RBP: 00007f184ae7e000 R08: 0000000000000000 R09: ffffffffffffffff
[ 728.500156] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 728.500169] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 728.500197]
07:37:52 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
ioctl$NS_GET_PARENT(r0, 0xb702, 0x0)
07:37:52 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 31)
07:37:52 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 20)
[ 728.586570] No source specified
07:37:52 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 17)
07:37:52 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 26)
07:37:52 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:37:52 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 41)
07:37:52 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 32)
[ 728.708543] FAULT_INJECTION: forcing a failure.
[ 728.708543] name failslab, interval 1, probability 0, space 0, times 0
[ 728.718031] CPU: 0 UID: 0 PID: 7419 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.718075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.718092] Call Trace:
[ 728.718103]
[ 728.718115] dump_stack_lvl+0xfa/0x120
[ 728.718157] should_fail_ex+0x4d7/0x5e0
[ 728.718214] ? alloc_empty_file+0x58/0x1e0
[ 728.718252] should_failslab+0xc2/0x120
[ 728.718290] kmem_cache_alloc_noprof+0x80/0x760
[ 728.718335] ? __is_insn_slot_addr+0x136/0x290
[ 728.718373] ? lock_release+0xc8/0x270
[ 728.718420] ? alloc_empty_file+0x58/0x1e0
[ 728.718459] alloc_empty_file+0x58/0x1e0
[ 728.718502] path_openat+0xee/0x2d60
[ 728.718535] ? __kernel_text_address+0xd/0x40
[ 728.718576] ? unwind_get_return_address+0x59/0xa0
[ 728.718610] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 728.718654] ? arch_stack_walk+0x9c/0xf0
[ 728.718699] ? perf_trace_run_bpf_submit+0xef/0x180
[ 728.718738] ? __pfx_path_openat+0x10/0x10
[ 728.718773] ? __lock_acquire+0x451/0x2250
[ 728.718824] do_file_open+0x209/0x460
[ 728.718858] ? __pfx_do_file_open+0x10/0x10
[ 728.718921] ? find_held_lock+0x2b/0x80
[ 728.718973] ? alloc_fd+0x2c1/0x560
[ 728.719003] ? lock_release+0xc8/0x270
[ 728.719061] ? _raw_spin_unlock+0x1e/0x40
[ 728.719106] ? alloc_fd+0x2c1/0x560
[ 728.719150] do_sys_openat2+0xe7/0x210
[ 728.719191] ? __pfx_do_sys_openat2+0x10/0x10
[ 728.719230] ? perf_trace_run_bpf_submit+0xef/0x180
[ 728.719274] ? perf_trace_preemptirq_template+0x259/0x430
[ 728.719323] __x64_sys_openat+0x142/0x200
[ 728.719366] ? __pfx___x64_sys_openat+0x10/0x10
[ 728.719414] ? fput+0x92/0xd0
[ 728.719462] do_syscall_64+0xbf/0x420
[ 728.719502] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.719533] RIP: 0033:0x7f184d8bba04
[ 728.719557] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 728.719588] RSP: 002b:00007f184ae7ded0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 728.719619] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d8bba04
[ 728.719642] RDX: 0000000000000002 RSI: 00007f184ae7e000 RDI: 00000000ffffff9c
[ 728.719662] RBP: 00007f184ae7e000 R08: 0000000000000000 R09: ffffffffffffffff
[ 728.719682] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 728.719702] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 728.719745]
[ 728.753477] FAT-fs (loop6): unable to read boot sector
[ 728.762330] FAT-fs (loop2): unable to read boot sector
[ 728.777454] FAULT_INJECTION: forcing a failure.
[ 728.777454] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 728.779246] CPU: 1 UID: 0 PID: 7425 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.779276] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.779289] Call Trace:
[ 728.779297]
[ 728.779306] dump_stack_lvl+0xfa/0x120
[ 728.779338] should_fail_ex+0x4d7/0x5e0
[ 728.779378] _copy_from_user+0x30/0xd0
[ 728.779414] memdup_user+0x7e/0xe0
[ 728.779447] strndup_user+0x78/0xe0
[ 728.779477] __x64_sys_mount+0x136/0x310
[ 728.779506] ? __pfx___x64_sys_mount+0x10/0x10
[ 728.779542] do_syscall_64+0xbf/0x420
[ 728.779568] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.779592] RIP: 0033:0x7f1e7893c04a
[ 728.779610] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 728.779631] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 728.779653] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 728.779667] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 728.779680] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 728.779693] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 728.779706] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 728.779735]
[ 728.790163] FAT-fs (loop0): unable to read boot sector
[ 728.869962] FAULT_INJECTION: forcing a failure.
[ 728.869962] name failslab, interval 1, probability 0, space 0, times 0
[ 728.881075] CPU: 1 UID: 0 PID: 7427 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 728.881106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 728.881120] Call Trace:
[ 728.881127]
[ 728.881135] dump_stack_lvl+0xfa/0x120
[ 728.881167] should_fail_ex+0x4d7/0x5e0
[ 728.881206] should_failslab+0xc2/0x120
[ 728.881230] kmem_cache_alloc_node_noprof+0x87/0x730
[ 728.881265] ? __alloc_skb+0x159/0x440
[ 728.881299] ? __alloc_skb+0x159/0x440
[ 728.881324] __alloc_skb+0x159/0x440
[ 728.881349] ? __alloc_skb+0x37d/0x440
[ 728.881375] ? __pfx___alloc_skb+0x10/0x10
[ 728.881407] ? lock_acquire+0x15e/0x2d0
[ 728.881448] ? netlink_has_listeners+0x7f/0x430
[ 728.881483] ? netlink_has_listeners+0x20d/0x430
[ 728.881511] ? lock_release+0xc8/0x270
[ 728.881541] alloc_uevent_skb+0x7b/0x210
[ 728.881576] kobject_uevent_env+0xad2/0xfd0
[ 728.881613] ? lock_is_held_type+0x9e/0x120
[ 728.881638] loop_configure+0xe3d/0x15a0
[ 728.881693] ? __pfx_loop_configure+0x10/0x10
[ 728.881739] ? avc_has_extended_perms+0x107/0xf20
[ 728.881766] ? find_held_lock+0x2b/0x80
[ 728.881801] ? avc_has_extended_perms+0x23b/0xf20
[ 728.881826] ? lock_release+0xc8/0x270
[ 728.881856] lo_ioctl+0x674/0x1cb0
[ 728.881888] ? perf_tp_event+0x807/0xe70
[ 728.881920] ? __pfx_lo_ioctl+0x10/0x10
[ 728.881949] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 728.881979] ? __pfx_perf_tp_event+0x10/0x10
[ 728.882003] ? perf_trace_preemptirq_template+0x259/0x430
[ 728.882037] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 728.882067] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 728.882102] ? blkdev_common_ioctl+0x1c3/0x2860
[ 728.882159] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 728.882193] ? __fget_files+0x34/0x3b0
[ 728.882216] ? find_held_lock+0x2b/0x80
[ 728.882250] ? __fget_files+0x203/0x3b0
[ 728.882275] ? __pfx_lo_ioctl+0x10/0x10
[ 728.882305] blkdev_ioctl+0x365/0x6d0
[ 728.882331] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.882360] ? selinux_file_ioctl+0xb9/0x280
[ 728.882398] ? __pfx_blkdev_ioctl+0x10/0x10
[ 728.882443] __x64_sys_ioctl+0x18f/0x210
[ 728.882496] do_syscall_64+0xbf/0x420
[ 728.882522] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 728.882545] RIP: 0033:0x7f775d7e38d7
[ 728.882562] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 728.882583] RSP: 002b:00007f775ad58f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 728.882605] RAX: ffffffffffffffda RBX: 00007f775d82d970 RCX: 00007f775d7e38d7
[ 728.882620] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 728.882633] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 728.882646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 728.882659] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 728.882688]
[ 728.937891] FAT-fs (loop5): unable to read boot sector
07:38:01 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 42)
07:38:01 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 40)
07:38:01 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 21)
07:38:01 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3, 0x6, 0x81, 0xff, 0x0, 0x8, 0x410, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000100), 0xf}, 0x15700, 0x8, 0x8, 0x0, 0x10000, 0x7fffffff, 0x3, 0x0, 0x7fff, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r0, 0x3)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6)
r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
setns(r2, 0x80)
r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0)
setns(r3, 0x20000)
07:38:01 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 27)
07:38:01 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:01 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 33)
07:38:01 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 18)
[ 737.989678] FAT-fs (loop2): unable to read boot sector
[ 737.993477] FAT-fs (loop4): unable to read boot sector
[ 737.994731] FAT-fs (loop7): unable to read boot sector
[ 738.010132] FAULT_INJECTION: forcing a failure.
[ 738.010132] name failslab, interval 1, probability 0, space 0, times 0
[ 738.013748] FAULT_INJECTION: forcing a failure.
[ 738.013748] name failslab, interval 1, probability 0, space 0, times 0
[ 738.015335] CPU: 0 UID: 0 PID: 7447 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 738.015363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 738.015377] Call Trace:
[ 738.015385]
[ 738.015393] dump_stack_lvl+0xfa/0x120
[ 738.015424] should_fail_ex+0x4d7/0x5e0
[ 738.015462] ? __kernfs_new_node+0xd3/0x940
[ 738.015492] should_failslab+0xc2/0x120
[ 738.015517] kmem_cache_alloc_noprof+0x80/0x760
07:38:01 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 19)
[ 738.015550] ? __pfx_avc_has_perm+0x10/0x10
[ 738.015580] ? __kernfs_new_node+0xd3/0x940
[ 738.015609] __kernfs_new_node+0xd3/0x940
07:38:01 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 41)
[ 738.015638] ? __lock_acquire+0x451/0x2250
[ 738.015669] ? __pfx___kernfs_new_node+0x10/0x10
[ 738.015704] ? lock_acquire+0x15e/0x2d0
[ 738.015729] ? kernfs_root+0x23/0x2a0
[ 738.015759] ? find_held_lock+0x2b/0x80
[ 738.015793] ? kernfs_root+0xee/0x2a0
[ 738.015822] ? lock_release+0xc8/0x270
[ 738.015846] ? lock_is_held_type+0x9e/0x120
[ 738.015873] kernfs_new_node+0x13c/0x1e0
[ 738.015920] kernfs_create_dir_ns+0x4d/0x1a0
[ 738.015943] internal_create_group+0x440/0xeb0
[ 738.015976] ? __pfx___mutex_unlock_slowpath+0x10/0x10
[ 738.016005] ? __pfx_internal_create_group+0x10/0x10
[ 738.016036] ? blk_validate_limits+0xe47/0x15d0
[ 738.016067] ? lock_is_held_type+0x9e/0x120
[ 738.016091] loop_configure+0xc46/0x15a0
[ 738.016144] ? __pfx_loop_configure+0x10/0x10
[ 738.016190] ? avc_has_extended_perms+0x107/0xf20
[ 738.016215] ? find_held_lock+0x2b/0x80
[ 738.016249] ? avc_has_extended_perms+0x23b/0xf20
[ 738.016274] ? lock_release+0xc8/0x270
[ 738.016304] lo_ioctl+0x674/0x1cb0
[ 738.016336] ? perf_tp_event+0x807/0xe70
[ 738.016359] ? __pfx_lo_ioctl+0x10/0x10
[ 738.016387] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 738.016417] ? __pfx_perf_tp_event+0x10/0x10
[ 738.016442] ? perf_trace_preemptirq_template+0x259/0x430
[ 738.016476] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 738.016506] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 738.016541] ? blkdev_common_ioctl+0x1c3/0x2860
[ 738.016598] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 738.016632] ? __fget_files+0x34/0x3b0
[ 738.016655] ? find_held_lock+0x2b/0x80
[ 738.016688] ? __fget_files+0x203/0x3b0
[ 738.016712] ? __pfx_lo_ioctl+0x10/0x10
[ 738.016741] blkdev_ioctl+0x365/0x6d0
[ 738.016768] ? __pfx_blkdev_ioctl+0x10/0x10
[ 738.016796] ? selinux_file_ioctl+0xb9/0x280
[ 738.016831] ? __pfx_blkdev_ioctl+0x10/0x10
[ 738.016861] __x64_sys_ioctl+0x18f/0x210
[ 738.016895] do_syscall_64+0xbf/0x420
[ 738.016921] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 738.016943] RIP: 0033:0x7f5a8d2b48d7
[ 738.016961] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 738.016982] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 738.017004] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 738.017018] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 738.017031] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 738.017045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 738.017057] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 738.017086]
07:38:01 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 738.062124] CPU: 0 UID: 0 PID: 7448 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 738.062157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 738.062170] Call Trace:
[ 738.062179]
[ 738.062187] dump_stack_lvl+0xfa/0x120
[ 738.062219] should_fail_ex+0x4d7/0x5e0
[ 738.062258] ? __kernfs_new_node+0xd3/0x940
[ 738.062288] should_failslab+0xc2/0x120
[ 738.062314] kmem_cache_alloc_noprof+0x80/0x760
[ 738.062354] ? __kernfs_new_node+0xd3/0x940
[ 738.062383] __kernfs_new_node+0xd3/0x940
[ 738.062412] ? __lock_acquire+0x451/0x2250
[ 738.062444] ? __pfx___kernfs_new_node+0x10/0x10
[ 738.062479] ? lock_acquire+0x15e/0x2d0
[ 738.062505] ? kernfs_root+0x23/0x2a0
[ 738.062534] ? find_held_lock+0x2b/0x80
[ 738.062568] ? kernfs_root+0xee/0x2a0
[ 738.062598] ? lock_release+0xc8/0x270
[ 738.062622] ? lock_is_held_type+0x9e/0x120
[ 738.062649] kernfs_new_node+0x13c/0x1e0
[ 738.062689] __kernfs_create_file+0x55/0x360
[ 738.062718] sysfs_add_file_mode_ns+0x21c/0x430
[ 738.062750] ? __pfx_dev_attr_store+0x10/0x10
[ 738.062786] internal_create_group+0x662/0xeb0
[ 738.062827] ? __pfx_internal_create_group+0x10/0x10
[ 738.062858] ? blk_validate_limits+0xe47/0x15d0
[ 738.062889] ? lock_is_held_type+0x9e/0x120
[ 738.062921] loop_configure+0xc46/0x15a0
[ 738.062975] ? __pfx_loop_configure+0x10/0x10
[ 738.063021] ? avc_has_extended_perms+0x107/0xf20
[ 738.063047] ? find_held_lock+0x2b/0x80
[ 738.063080] ? avc_has_extended_perms+0x23b/0xf20
[ 738.063106] ? lock_release+0xc8/0x270
[ 738.063135] lo_ioctl+0x674/0x1cb0
[ 738.063180] ? perf_tp_event+0x807/0xe70
[ 738.063202] ? __pfx_lo_ioctl+0x10/0x10
[ 738.063231] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 738.063261] ? __pfx_perf_tp_event+0x10/0x10
[ 738.063286] ? perf_trace_preemptirq_template+0x259/0x430
[ 738.063320] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 738.063350] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 738.063385] ? blkdev_common_ioctl+0x1c3/0x2860
[ 738.063441] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 738.063475] ? __fget_files+0x34/0x3b0
[ 738.063498] ? find_held_lock+0x2b/0x80
[ 738.063531] ? __fget_files+0x203/0x3b0
[ 738.063555] ? __pfx_lo_ioctl+0x10/0x10
[ 738.063584] blkdev_ioctl+0x365/0x6d0
[ 738.063611] ? __pfx_blkdev_ioctl+0x10/0x10
[ 738.063639] ? selinux_file_ioctl+0xb9/0x280
[ 738.063675] ? __pfx_blkdev_ioctl+0x10/0x10
[ 738.063704] __x64_sys_ioctl+0x18f/0x210
[ 738.063740] do_syscall_64+0xbf/0x420
[ 738.063766] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 738.063788] RIP: 0033:0x7fb40288d8d7
[ 738.063807] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 738.063829] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 738.063851] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 738.063865] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 738.063878] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 738.063892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 738.063905] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 738.063933]
[ 738.109971] FAULT_INJECTION: forcing a failure.
[ 738.109971] name failslab, interval 1, probability 0, space 0, times 0
[ 738.110895] CPU: 1 UID: 0 PID: 7459 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 738.110911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 738.110919] Call Trace:
[ 738.110924]
[ 738.110929] dump_stack_lvl+0xfa/0x120
[ 738.110950] should_fail_ex+0x4d7/0x5e0
[ 738.110974] should_failslab+0xc2/0x120
[ 738.110989] kmem_cache_alloc_node_noprof+0x87/0x730
[ 738.111009] ? __alloc_skb+0x159/0x440
[ 738.111029] ? __alloc_skb+0x159/0x440
[ 738.111043] __alloc_skb+0x159/0x440
[ 738.111056] ? __alloc_skb+0x37d/0x440
[ 738.111071] ? __pfx___alloc_skb+0x10/0x10
[ 738.111084] ? lock_acquire+0x15e/0x2d0
[ 738.111100] ? netlink_has_listeners+0x7f/0x430
[ 738.111118] ? netlink_has_listeners+0x20d/0x430
[ 738.111133] ? lock_release+0xc8/0x270
[ 738.111157] alloc_uevent_skb+0x7b/0x210
[ 738.111176] kobject_uevent_env+0xad2/0xfd0
[ 738.111196] ? lock_is_held_type+0x9e/0x120
[ 738.111210] loop_configure+0xe3d/0x15a0
[ 738.111240] ? __pfx_loop_configure+0x10/0x10
[ 738.111265] ? avc_has_extended_perms+0x107/0xf20
[ 738.111281] ? find_held_lock+0x2b/0x80
[ 738.111300] ? avc_has_extended_perms+0x23b/0xf20
[ 738.111314] ? lock_release+0xc8/0x270
[ 738.111330] lo_ioctl+0x674/0x1cb0
[ 738.111349] ? __pfx_lo_ioctl+0x10/0x10
[ 738.111365] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 738.111383] ? lock_acquire+0x15e/0x2d0
[ 738.111397] ? __virt_addr_valid+0x1c6/0x5d0
[ 738.111412] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 738.111430] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 738.111445] ? lock_release+0xc8/0x270
[ 738.111459] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 738.111478] ? blkdev_common_ioctl+0x1c3/0x2860
[ 738.111511] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 738.111530] ? __fget_files+0x34/0x3b0
[ 738.111543] ? find_held_lock+0x2b/0x80
[ 738.111561] ? __fget_files+0x203/0x3b0
[ 738.111574] ? __pfx_lo_ioctl+0x10/0x10
[ 738.111590] blkdev_ioctl+0x365/0x6d0
[ 738.111605] ? __pfx_blkdev_ioctl+0x10/0x10
[ 738.111620] ? selinux_file_ioctl+0xb9/0x280
[ 738.111640] ? __pfx_blkdev_ioctl+0x10/0x10
[ 738.111656] __x64_sys_ioctl+0x18f/0x210
[ 738.111675] do_syscall_64+0xbf/0x420
[ 738.111690] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 738.111703] RIP: 0033:0x7fe78a9178d7
[ 738.111713] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 738.111724] RSP: 002b:00007fe787e6bf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 738.111736] RAX: ffffffffffffffda RBX: 00007fe78a961970 RCX: 00007fe78a9178d7
[ 738.111744] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 738.111752] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 738.111759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 738.111767] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 738.111783]
[ 738.134153] FAULT_INJECTION: forcing a failure.
[ 738.134153] name failslab, interval 1, probability 0, space 0, times 0
[ 738.135048] CPU: 1 UID: 0 PID: 7457 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 738.135063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 738.135070] Call Trace:
[ 738.135074]
[ 738.135078] dump_stack_lvl+0xfa/0x120
[ 738.135091] should_fail_ex+0x4d7/0x5e0
[ 738.135111] ? copy_mount_options+0x55/0x180
[ 738.135127] should_failslab+0xc2/0x120
[ 738.135146] __kmalloc_cache_noprof+0x80/0x730
[ 738.135161] ? __might_fault+0xe0/0x190
[ 738.135179] ? copy_mount_options+0x55/0x180
[ 738.135194] ? memdup_user+0x95/0xe0
[ 738.135210] copy_mount_options+0x55/0x180
[ 738.135228] __x64_sys_mount+0x1ab/0x310
[ 738.135244] ? __pfx___x64_sys_mount+0x10/0x10
[ 738.135263] do_syscall_64+0xbf/0x420
[ 738.135277] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 738.135288] RIP: 0033:0x7f1e7893c04a
[ 738.135297] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 738.135309] RSP: 002b:00007f1e75e8efa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
[ 738.135320] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 738.135328] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 738.135336] RBP: 00007f1e75e8f040 R08: 00007f1e75e8f040 R09: 0000000020000000
[ 738.135343] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000
[ 738.135350] R13: 0000000020000040 R14: 00007f1e75e8f000 R15: 0000000020000080
[ 738.135366]
[ 738.136815] FAULT_INJECTION: forcing a failure.
[ 738.136815] name failslab, interval 1, probability 0, space 0, times 0
[ 738.144748] FAT-fs (loop4): unable to read boot sector
[ 738.150701] FAT-fs (loop6): unable to read boot sector
[ 738.167772] FAT-fs (loop5): unable to read boot sector
[ 738.169735] FAT-fs (loop0): unable to read boot sector
07:38:01 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 34)
[ 738.185130] FAT-fs (loop2): unable to read boot sector
[ 738.188104] CPU: 1 UID: 0 PID: 7458 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 738.188126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 738.188134] Call Trace:
[ 738.188139]
[ 738.188145] dump_stack_lvl+0xfa/0x120
[ 738.188166] should_fail_ex+0x4d7/0x5e0
[ 738.188189] ? security_file_alloc+0x35/0x130
[ 738.188204] should_failslab+0xc2/0x120
[ 738.188218] kmem_cache_alloc_noprof+0x80/0x760
[ 738.188237] ? __create_object+0x59/0x80
[ 738.188259] ? security_file_alloc+0x35/0x130
[ 738.188272] security_file_alloc+0x35/0x130
[ 738.188287] init_file+0x95/0x480
[ 738.188304] alloc_empty_file+0x76/0x1e0
[ 738.188321] path_openat+0xee/0x2d60
[ 738.188335] ? __kernel_text_address+0xd/0x40
[ 738.188353] ? unwind_get_return_address+0x59/0xa0
[ 738.188367] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 738.188386] ? arch_stack_walk+0x9c/0xf0
[ 738.188408] ? __pfx_path_openat+0x10/0x10
[ 738.188423] ? __lock_acquire+0x451/0x2250
[ 738.188445] do_file_open+0x209/0x460
[ 738.188459] ? __pfx_do_file_open+0x10/0x10
[ 738.188481] ? find_held_lock+0x2b/0x80
[ 738.188502] ? alloc_fd+0x2c1/0x560
[ 738.188514] ? lock_release+0xc8/0x270
[ 738.188533] ? _raw_spin_unlock+0x1e/0x40
[ 738.188551] ? alloc_fd+0x2c1/0x560
[ 738.188569] do_sys_openat2+0xe7/0x210
[ 738.188587] ? __pfx_do_sys_openat2+0x10/0x10
[ 738.188607] ? find_held_lock+0x2b/0x80
[ 738.188630] __x64_sys_openat+0x142/0x200
[ 738.188647] ? __pfx___x64_sys_openat+0x10/0x10
[ 738.188666] ? fput+0x92/0xd0
[ 738.188686] do_syscall_64+0xbf/0x420
[ 738.188702] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 738.188715] RIP: 0033:0x7f184d8bba04
[ 738.188726] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44
[ 738.188738] RSP: 002b:00007f184ae5ced0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 738.188751] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d8bba04
[ 738.188759] RDX: 0000000000000002 RSI: 00007f184ae5d000 RDI: 00000000ffffff9c
[ 738.188767] RBP: 00007f184ae5d000 R08: 0000000000000000 R09: ffffffffffffffff
[ 738.188775] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 738.188783] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 738.188801]
07:38:02 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 42)
07:38:02 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 43)
[ 738.286757] FAT-fs (loop4): unable to read boot sector
[ 738.338434] No source specified
[ 738.342740] FAT-fs (loop5): unable to read boot sector
07:38:10 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 44)
07:38:10 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 28)
07:38:10 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 35)
07:38:10 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 22)
07:38:10 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x50, r0, 0xfcbba000)
openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/usb_storage', 0x42, 0xa1)
07:38:10 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:10 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 20)
07:38:10 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 43)
[ 746.875090] FAT-fs (loop5): unable to read boot sector
[ 746.877424] FAT-fs (loop7): unable to read boot sector
[ 746.912695] FAT-fs (loop2): unable to read boot sector
[ 746.916111] FAULT_INJECTION: forcing a failure.
[ 746.916111] name failslab, interval 1, probability 0, space 0, times 0
[ 746.918008] CPU: 0 UID: 0 PID: 7488 Comm: syz-executor.4 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 746.918041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 746.918056] Call Trace:
[ 746.918064]
[ 746.918074] dump_stack_lvl+0xfa/0x120
[ 746.918109] should_fail_ex+0x4d7/0x5e0
[ 746.918155] ? do_getname+0x2b/0x3d0
[ 746.918186] should_failslab+0xc2/0x120
[ 746.918214] kmem_cache_alloc_noprof+0x80/0x760
[ 746.918251] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 746.918295] ? do_getname+0x2b/0x3d0
[ 746.918325] do_getname+0x2b/0x3d0
[ 746.918359] __x64_sys_mkdir+0x5a/0xd0
[ 746.918388] do_syscall_64+0xbf/0x420
[ 746.918419] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 746.918446] RIP: 0033:0x7fe78a916c27
[ 746.918471] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 746.918495] RSP: 002b:00007fe787e8cfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 746.918519] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fe78a916c27
[ 746.918536] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 746.918551] RBP: 00007fe787e8d040 R08: 0000000000000000 R09: ffffffffffffffff
[ 746.918567] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 746.918582] R13: 0000000020000040 R14: 00007fe787e8d000 R15: 0000000020000080
[ 746.918617]
[ 746.935328] FAULT_INJECTION: forcing a failure.
[ 746.935328] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 746.955132] CPU: 1 UID: 0 PID: 7491 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 746.955150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 746.955158] Call Trace:
[ 746.955163]
[ 746.955168] dump_stack_lvl+0xfa/0x120
[ 746.955188] should_fail_ex+0x4d7/0x5e0
[ 746.955211] _copy_from_user+0x30/0xd0
[ 746.955232] copy_mount_options+0x76/0x180
[ 746.955265] __x64_sys_mount+0x1ab/0x310
[ 746.955281] ? __pfx___x64_sys_mount+0x10/0x10
[ 746.955301] do_syscall_64+0xbf/0x420
[ 746.955317] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 746.955330] RIP: 0033:0x7f1e7893c04a
[ 746.955344] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 746.955356] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 746.955369] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 746.955378] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 746.955385] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 746.955393] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 746.955401] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 746.955418]
[ 746.959343] FAT-fs (loop6): unable to read boot sector
[ 746.990640] No source specified
[ 747.013663] FAT-fs (loop0): unable to read boot sector
07:38:19 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:38:19 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 21)
07:38:19 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 29)
07:38:19 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:19 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 45)
07:38:19 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 44)
07:38:19 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 36)
07:38:19 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 23)
[ 755.859503] FAT-fs (loop5): unable to read boot sector
[ 755.861030] FAULT_INJECTION: forcing a failure.
[ 755.861030] name failslab, interval 1, probability 0, space 0, times 0
[ 755.862467] FAT-fs (loop4): unable to read boot sector
[ 755.864948] CPU: 1 UID: 0 PID: 7507 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 755.864964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 755.864972] Call Trace:
[ 755.864976]
[ 755.864981] dump_stack_lvl+0xfa/0x120
[ 755.865001] should_fail_ex+0x4d7/0x5e0
[ 755.865024] ? __kernfs_new_node+0xd3/0x940
[ 755.865042] should_failslab+0xc2/0x120
[ 755.865056] kmem_cache_alloc_noprof+0x80/0x760
[ 755.865075] ? __pfx_avc_has_perm+0x10/0x10
[ 755.865093] ? __kernfs_new_node+0xd3/0x940
[ 755.865108] __kernfs_new_node+0xd3/0x940
[ 755.865124] ? __lock_acquire+0x451/0x2250
[ 755.865142] ? __pfx___kernfs_new_node+0x10/0x10
[ 755.865162] ? lock_acquire+0x15e/0x2d0
[ 755.865175] ? kernfs_root+0x23/0x2a0
[ 755.865191] ? find_held_lock+0x2b/0x80
[ 755.865210] ? kernfs_root+0xee/0x2a0
[ 755.865226] ? lock_release+0xc8/0x270
[ 755.865240] ? lock_is_held_type+0x9e/0x120
[ 755.865255] kernfs_new_node+0x13c/0x1e0
[ 755.865276] kernfs_create_dir_ns+0x4d/0x1a0
[ 755.865290] internal_create_group+0x440/0xeb0
[ 755.865307] ? __pfx___mutex_unlock_slowpath+0x10/0x10
[ 755.865324] ? __pfx_internal_create_group+0x10/0x10
[ 755.865341] ? blk_validate_limits+0xe47/0x15d0
[ 755.865363] ? lock_is_held_type+0x9e/0x120
[ 755.865376] loop_configure+0xc46/0x15a0
[ 755.865406] ? __pfx_loop_configure+0x10/0x10
[ 755.865431] ? avc_has_extended_perms+0x107/0xf20
[ 755.865445] ? find_held_lock+0x2b/0x80
[ 755.865463] ? avc_has_extended_perms+0x23b/0xf20
[ 755.865477] ? lock_release+0xc8/0x270
[ 755.865493] lo_ioctl+0x674/0x1cb0
[ 755.865512] ? __pfx_lo_ioctl+0x10/0x10
[ 755.865528] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 755.865547] ? lock_acquire+0x15e/0x2d0
[ 755.865561] ? __virt_addr_valid+0x1c6/0x5d0
[ 755.865576] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 755.865594] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 755.865609] ? lock_release+0xc8/0x270
[ 755.865624] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 755.865643] ? blkdev_common_ioctl+0x1c3/0x2860
[ 755.865675] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 755.865693] ? __fget_files+0x34/0x3b0
[ 755.865706] ? find_held_lock+0x2b/0x80
[ 755.865724] ? __fget_files+0x203/0x3b0
[ 755.865737] ? __pfx_lo_ioctl+0x10/0x10
[ 755.865753] blkdev_ioctl+0x365/0x6d0
[ 755.865768] ? __pfx_blkdev_ioctl+0x10/0x10
[ 755.865783] ? selinux_file_ioctl+0xb9/0x280
[ 755.865803] ? __pfx_blkdev_ioctl+0x10/0x10
[ 755.865818] __x64_sys_ioctl+0x18f/0x210
[ 755.865838] do_syscall_64+0xbf/0x420
[ 755.865853] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 755.865866] RIP: 0033:0x7f184d9088d7
[ 755.865875] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 755.865887] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 755.865899] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 755.865908] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 755.865915] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 755.865923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 755.865929] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 755.865945]
[ 755.900511] FAT-fs (loop7): unable to read boot sector
[ 755.913821] FAULT_INJECTION: forcing a failure.
[ 755.913821] name failslab, interval 1, probability 0, space 0, times 0
[ 755.914705] CPU: 1 UID: 0 PID: 7512 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 755.914720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 755.914727] Call Trace:
[ 755.914731]
[ 755.914736] dump_stack_lvl+0xfa/0x120
[ 755.914752] should_fail_ex+0x4d7/0x5e0
[ 755.914773] ? __kernfs_new_node+0xd3/0x940
[ 755.914789] should_failslab+0xc2/0x120
[ 755.914803] kmem_cache_alloc_noprof+0x80/0x760
[ 755.914825] ? __kernfs_new_node+0xd3/0x940
[ 755.914841] __kernfs_new_node+0xd3/0x940
[ 755.914857] ? __lock_acquire+0x451/0x2250
[ 755.914874] ? __pfx___kernfs_new_node+0x10/0x10
[ 755.914898] ? lock_acquire+0x15e/0x2d0
[ 755.914912] ? kernfs_root+0x23/0x2a0
[ 755.914928] ? find_held_lock+0x2b/0x80
[ 755.914946] ? kernfs_root+0xee/0x2a0
[ 755.914962] ? lock_release+0xc8/0x270
[ 755.914975] ? lock_is_held_type+0x9e/0x120
[ 755.914991] kernfs_new_node+0x13c/0x1e0
[ 755.915012] __kernfs_create_file+0x55/0x360
[ 755.915028] sysfs_add_file_mode_ns+0x21c/0x430
[ 755.915046] ? __pfx_dev_attr_store+0x10/0x10
[ 755.915067] internal_create_group+0x662/0xeb0
[ 755.915090] ? __pfx_internal_create_group+0x10/0x10
[ 755.915107] ? blk_validate_limits+0xe47/0x15d0
[ 755.915124] ? lock_is_held_type+0x9e/0x120
[ 755.915137] loop_configure+0xc46/0x15a0
[ 755.915169] ? __pfx_loop_configure+0x10/0x10
[ 755.915195] ? avc_has_extended_perms+0x107/0xf20
[ 755.915210] ? find_held_lock+0x2b/0x80
[ 755.915228] ? avc_has_extended_perms+0x23b/0xf20
[ 755.915242] ? lock_release+0xc8/0x270
[ 755.915259] lo_ioctl+0x674/0x1cb0
[ 755.915279] ? __pfx_lo_ioctl+0x10/0x10
[ 755.915294] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 755.915310] ? __pfx_perf_trace_lock+0x10/0x10
[ 755.915329] ? lock_acquire+0x15e/0x2d0
[ 755.915351] ? __virt_addr_valid+0x1c6/0x5d0
[ 755.915366] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 755.915383] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 755.915398] ? lock_release+0xc8/0x270
[ 755.915413] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 755.915432] ? blkdev_common_ioctl+0x1c3/0x2860
[ 755.915465] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 755.915484] ? __fget_files+0x34/0x3b0
[ 755.915497] ? find_held_lock+0x2b/0x80
[ 755.915516] ? __fget_files+0x203/0x3b0
[ 755.915529] ? __pfx_lo_ioctl+0x10/0x10
[ 755.915545] blkdev_ioctl+0x365/0x6d0
[ 755.915560] ? __pfx_blkdev_ioctl+0x10/0x10
[ 755.915576] ? selinux_file_ioctl+0xb9/0x280
[ 755.915595] ? __pfx_blkdev_ioctl+0x10/0x10
[ 755.915611] __x64_sys_ioctl+0x18f/0x210
[ 755.915631] do_syscall_64+0xbf/0x420
[ 755.915645] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 755.915658] RIP: 0033:0x7fb40288d8d7
[ 755.915667] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 755.915679] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 755.915690] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 755.915699] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 755.915706] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 755.915713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 755.915720] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 755.915738]
[ 755.921559] FAULT_INJECTION: forcing a failure.
[ 755.921559] name failslab, interval 1, probability 0, space 0, times 0
[ 755.924343] FAT-fs (loop2): unable to read boot sector
[ 755.929033] CPU: 0 UID: 0 PID: 7516 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 755.929067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 755.929081] Call Trace:
[ 755.929089]
[ 755.929098] dump_stack_lvl+0xfa/0x120
[ 755.929130] should_fail_ex+0x4d7/0x5e0
[ 755.929172] ? __kernfs_new_node+0xd3/0x940
[ 755.929204] should_failslab+0xc2/0x120
[ 755.929230] kmem_cache_alloc_noprof+0x80/0x760
[ 755.929274] ? __kernfs_new_node+0xd3/0x940
[ 755.929305] __kernfs_new_node+0xd3/0x940
[ 755.929334] ? __lock_acquire+0x451/0x2250
[ 755.929369] ? __pfx___kernfs_new_node+0x10/0x10
[ 755.929407] ? lock_acquire+0x15e/0x2d0
[ 755.929434] ? kernfs_root+0x23/0x2a0
[ 755.929465] ? find_held_lock+0x2b/0x80
[ 755.929501] ? kernfs_root+0xee/0x2a0
[ 755.929531] ? lock_release+0xc8/0x270
[ 755.929557] ? lock_is_held_type+0x9e/0x120
[ 755.929586] kernfs_new_node+0x13c/0x1e0
[ 755.929628] __kernfs_create_file+0x55/0x360
[ 755.929659] sysfs_add_file_mode_ns+0x21c/0x430
[ 755.929693] ? __pfx_dev_attr_store+0x10/0x10
[ 755.929731] internal_create_group+0x662/0xeb0
[ 755.929775] ? __pfx_internal_create_group+0x10/0x10
[ 755.929807] ? blk_validate_limits+0xe47/0x15d0
[ 755.929841] ? lock_is_held_type+0x9e/0x120
[ 755.929867] loop_configure+0xc46/0x15a0
[ 755.929937] ? __pfx_loop_configure+0x10/0x10
[ 755.929989] ? avc_has_extended_perms+0x107/0xf20
[ 755.930017] ? find_held_lock+0x2b/0x80
[ 755.930052] ? avc_has_extended_perms+0x23b/0xf20
[ 755.930078] ? lock_release+0xc8/0x270
[ 755.930110] lo_ioctl+0x674/0x1cb0
[ 755.930144] ? perf_tp_event+0x807/0xe70
[ 755.930169] ? __pfx_lo_ioctl+0x10/0x10
[ 755.930199] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 755.930231] ? __pfx_perf_tp_event+0x10/0x10
[ 755.930258] ? perf_trace_preemptirq_template+0x259/0x430
[ 755.930294] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 755.930325] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 755.930362] ? blkdev_common_ioctl+0x1c3/0x2860
[ 755.930427] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 755.930462] ? __fget_files+0x34/0x3b0
[ 755.930487] ? find_held_lock+0x2b/0x80
[ 755.930522] ? __fget_files+0x203/0x3b0
[ 755.930548] ? __pfx_lo_ioctl+0x10/0x10
[ 755.930579] blkdev_ioctl+0x365/0x6d0
[ 755.930607] ? __pfx_blkdev_ioctl+0x10/0x10
[ 755.930636] ? selinux_file_ioctl+0xb9/0x280
[ 755.930674] ? __pfx_blkdev_ioctl+0x10/0x10
[ 755.930706] __x64_sys_ioctl+0x18f/0x210
[ 755.930743] do_syscall_64+0xbf/0x420
[ 755.930771] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 755.930794] RIP: 0033:0x7f5a8d2b48d7
[ 755.930813] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 755.930834] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 755.930856] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 755.930871] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 755.930884] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 755.930898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 755.930911] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 755.930944]
[ 755.939770] FAT-fs (loop6): unable to read boot sector
[ 755.954855] FAULT_INJECTION: forcing a failure.
[ 755.954855] name failslab, interval 1, probability 0, space 0, times 0
07:38:19 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 46)
[ 755.983671] FAT-fs (loop0): unable to read boot sector
07:38:19 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 45)
[ 756.000215] CPU: 1 UID: 0 PID: 7515 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 756.000232] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 756.000241] Call Trace:
[ 756.000246]
[ 756.000250] dump_stack_lvl+0xfa/0x120
[ 756.000271] should_fail_ex+0x4d7/0x5e0
[ 756.000293] ? do_getname+0x2b/0x3d0
[ 756.000309] should_failslab+0xc2/0x120
[ 756.000323] kmem_cache_alloc_noprof+0x80/0x760
[ 756.000345] ? do_getname+0x2b/0x3d0
[ 756.000359] do_getname+0x2b/0x3d0
[ 756.000375] user_path_at+0x29/0x90
[ 756.000387] __x64_sys_mount+0x1fb/0x310
[ 756.000404] ? __pfx___x64_sys_mount+0x10/0x10
[ 756.000423] do_syscall_64+0xbf/0x420
[ 756.000438] entry_SYSCALL_64_after_hwframe+0x77/0x7f
07:38:19 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 22)
[ 756.000451] RIP: 0033:0x7f1e7893c04a
[ 756.000461] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 756.000472] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 756.000485] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 756.000493] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 756.000500] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 756.000508] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 756.000515] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 756.000530]
[ 756.047019] FAT-fs (loop4): unable to read boot sector
[ 756.054284] FAT-fs (loop5): unable to read boot sector
[ 756.082659] FAT-fs (loop7): unable to read boot sector
07:38:19 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 24)
07:38:19 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 37)
07:38:19 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 30)
07:38:19 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:38:19 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 46)
07:38:19 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 47)
07:38:19 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x27, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 756.147501] FAULT_INJECTION: forcing a failure.
[ 756.147501] name failslab, interval 1, probability 0, space 0, times 0
[ 756.148415] CPU: 1 UID: 0 PID: 7528 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 756.148431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 756.148439] Call Trace:
[ 756.148443]
[ 756.148449] dump_stack_lvl+0xfa/0x120
[ 756.148472] should_fail_ex+0x4d7/0x5e0
[ 756.148494] ? do_getname+0x2b/0x3d0
[ 756.148509] should_failslab+0xc2/0x120
[ 756.148524] kmem_cache_alloc_noprof+0x80/0x760
[ 756.148542] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 756.148564] ? do_getname+0x2b/0x3d0
[ 756.148578] do_getname+0x2b/0x3d0
[ 756.148594] __x64_sys_mkdir+0x5a/0xd0
[ 756.148608] do_syscall_64+0xbf/0x420
[ 756.148623] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 756.148638] RIP: 0033:0x7f775d7e2c27
[ 756.148647] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 756.148659] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 756.148671] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 756.148679] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 756.148687] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 756.148695] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 756.148702] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 756.148718]
07:38:19 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 23)
07:38:20 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 48)
[ 756.229438] FAT-fs (loop7): unable to read boot sector
[ 756.230885] No source specified
[ 756.235710] FAT-fs (loop0): unable to read boot sector
[ 756.263961] FAT-fs (loop6): unable to read boot sector
[ 756.268196] FAT-fs (loop2): unable to read boot sector
[ 756.268809] FAULT_INJECTION: forcing a failure.
[ 756.268809] name failslab, interval 1, probability 0, space 0, times 0
[ 756.269821] CPU: 1 UID: 0 PID: 7542 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 756.269838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 756.269846] Call Trace:
[ 756.269850]
[ 756.269855] dump_stack_lvl+0xfa/0x120
[ 756.269875] should_fail_ex+0x4d7/0x5e0
[ 756.269901] ? __d_alloc+0x34/0x9c0
[ 756.269916] should_failslab+0xc2/0x120
[ 756.269931] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 756.269949] ? __d_lookup+0x255/0x490
[ 756.269971] ? __d_alloc+0x34/0x9c0
[ 756.269983] __d_alloc+0x34/0x9c0
[ 756.270002] d_alloc+0x4a/0x1e0
[ 756.270018] lookup_one_qstr_excl+0x174/0x270
[ 756.270034] ? mnt_want_write+0x153/0x420
[ 756.270054] filename_create+0x1c1/0x400
[ 756.270073] ? __pfx_filename_create+0x10/0x10
[ 756.270092] ? __virt_addr_valid+0x2e8/0x5d0
[ 756.270112] filename_mkdirat+0xa6/0x430
[ 756.270127] ? __pfx_filename_mkdirat+0x10/0x10
[ 756.270140] ? strncpy_from_user+0x21b/0x2f0
[ 756.270160] __x64_sys_mkdir+0x6e/0xd0
[ 756.270173] do_syscall_64+0xbf/0x420
[ 756.270188] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 756.270202] RIP: 0033:0x7f775d7e2c27
[ 756.270211] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 756.270223] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 756.270235] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 756.270244] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 756.270251] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 756.270258] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 756.270265] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 756.270281]
07:38:20 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:20 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 24)
07:38:20 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 31)
[ 756.341056] FAT-fs (loop4): unable to read boot sector
[ 756.355129] FAT-fs (loop7): unable to read boot sector
[ 756.429100] FAULT_INJECTION: forcing a failure.
[ 756.429100] name failslab, interval 1, probability 0, space 0, times 0
[ 756.435993] CPU: 0 UID: 0 PID: 7548 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 756.436024] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 756.436038] Call Trace:
[ 756.436046]
[ 756.436054] dump_stack_lvl+0xfa/0x120
[ 756.436085] should_fail_ex+0x4d7/0x5e0
[ 756.436123] ? __kernfs_new_node+0xd3/0x940
[ 756.436154] should_failslab+0xc2/0x120
[ 756.436178] kmem_cache_alloc_noprof+0x80/0x760
[ 756.436218] ? __kernfs_new_node+0xd3/0x940
[ 756.436247] __kernfs_new_node+0xd3/0x940
[ 756.436275] ? __lock_acquire+0x451/0x2250
[ 756.436307] ? __pfx___kernfs_new_node+0x10/0x10
[ 756.436350] ? lock_acquire+0x15e/0x2d0
[ 756.436376] ? kernfs_root+0x23/0x2a0
[ 756.436405] ? find_held_lock+0x2b/0x80
[ 756.436439] ? kernfs_root+0xee/0x2a0
[ 756.436469] ? lock_release+0xc8/0x270
[ 756.436493] ? lock_is_held_type+0x9e/0x120
[ 756.436520] kernfs_new_node+0x13c/0x1e0
[ 756.436560] __kernfs_create_file+0x55/0x360
[ 756.436589] sysfs_add_file_mode_ns+0x21c/0x430
[ 756.436622] ? __pfx_dev_attr_store+0x10/0x10
[ 756.436659] internal_create_group+0x662/0xeb0
[ 756.436699] ? __pfx_internal_create_group+0x10/0x10
[ 756.436731] ? blk_validate_limits+0xe47/0x15d0
[ 756.436763] ? lock_is_held_type+0x9e/0x120
[ 756.436787] loop_configure+0xc46/0x15a0
[ 756.436841] ? __pfx_loop_configure+0x10/0x10
[ 756.436887] ? avc_has_extended_perms+0x107/0xf20
[ 756.436915] ? find_held_lock+0x2b/0x80
[ 756.436948] ? avc_has_extended_perms+0x23b/0xf20
[ 756.436975] ? lock_release+0xc8/0x270
[ 756.437005] lo_ioctl+0x674/0x1cb0
[ 756.437037] ? perf_tp_event+0x807/0xe70
[ 756.437060] ? __pfx_lo_ioctl+0x10/0x10
[ 756.437089] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 756.437119] ? __pfx_perf_tp_event+0x10/0x10
[ 756.437145] ? perf_trace_preemptirq_template+0x259/0x430
[ 756.437179] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 756.437210] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 756.437245] ? blkdev_common_ioctl+0x1c3/0x2860
[ 756.437303] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 756.437337] ? __fget_files+0x34/0x3b0
[ 756.437361] ? find_held_lock+0x2b/0x80
[ 756.437394] ? __fget_files+0x203/0x3b0
[ 756.437418] ? __pfx_lo_ioctl+0x10/0x10
[ 756.437449] blkdev_ioctl+0x365/0x6d0
[ 756.437476] ? __pfx_blkdev_ioctl+0x10/0x10
[ 756.437504] ? selinux_file_ioctl+0xb9/0x280
[ 756.437541] ? __pfx_blkdev_ioctl+0x10/0x10
[ 756.437570] __x64_sys_ioctl+0x18f/0x210
[ 756.437606] do_syscall_64+0xbf/0x420
[ 756.437633] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 756.437656] RIP: 0033:0x7fb40288d8d7
[ 756.437674] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 756.437696] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 756.437719] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 756.437734] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 756.437748] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 756.437762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 756.437775] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 756.437804]
[ 756.484890] FAT-fs (loop0): unable to read boot sector
07:38:28 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = fspick(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0)
kcmp(0xffffffffffffffff, 0x0, 0x1, r0, 0xffffffffffffffff)
07:38:28 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 32)
07:38:28 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 25)
07:38:28 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 49)
07:38:28 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 38)
07:38:28 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 25)
07:38:28 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:28 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x89, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 764.741256] FAT-fs (loop4): unable to read boot sector
[ 764.744393] FAT-fs (loop0): unable to read boot sector
[ 764.749458] FAT-fs (loop5): unable to read boot sector
[ 764.759543] FAT-fs (loop2): unable to read boot sector
[ 764.762682] FAULT_INJECTION: forcing a failure.
[ 764.762682] name failslab, interval 1, probability 0, space 0, times 0
[ 764.773256] FAULT_INJECTION: forcing a failure.
[ 764.773256] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 764.775098] CPU: 0 UID: 0 PID: 7570 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 764.775134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 764.775155] Call Trace:
[ 764.775168]
[ 764.775182] dump_stack_lvl+0xfa/0x120
[ 764.775233] should_fail_ex+0x4d7/0x5e0
[ 764.775278] strncpy_from_user+0x3b/0x2f0
[ 764.775315] do_getname+0x70/0x3d0
[ 764.775351] user_path_at+0x29/0x90
[ 764.775375] __x64_sys_mount+0x1fb/0x310
[ 764.775407] ? __pfx___x64_sys_mount+0x10/0x10
[ 764.775465] do_syscall_64+0xbf/0x420
[ 764.775496] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 764.775523] RIP: 0033:0x7f1e7893c04a
[ 764.775543] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 764.775567] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 764.775591] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 764.775608] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 764.775624] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 764.775640] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 764.775655] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 764.775691]
[ 764.780704] FAT-fs (loop2): unable to read boot sector
[ 764.782947] CPU: 0 UID: 0 PID: 7569 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 764.782984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 764.782997] Call Trace:
[ 764.783006]
[ 764.783015] dump_stack_lvl+0xfa/0x120
[ 764.783045] should_fail_ex+0x4d7/0x5e0
[ 764.783087] ? __kernfs_new_node+0xd3/0x940
[ 764.783121] should_failslab+0xc2/0x120
[ 764.783162] kmem_cache_alloc_noprof+0x80/0x760
[ 764.783236] ? __kernfs_new_node+0xd3/0x940
[ 764.783288] __kernfs_new_node+0xd3/0x940
[ 764.783329] ? __lock_acquire+0x451/0x2250
[ 764.783366] ? __pfx___kernfs_new_node+0x10/0x10
[ 764.783405] ? lock_acquire+0x15e/0x2d0
[ 764.783434] ? kernfs_root+0x23/0x2a0
[ 764.783483] ? find_held_lock+0x2b/0x80
[ 764.783523] ? kernfs_root+0xee/0x2a0
[ 764.783556] ? lock_release+0xc8/0x270
[ 764.783583] ? lock_is_held_type+0x9e/0x120
[ 764.783614] kernfs_new_node+0x13c/0x1e0
[ 764.783659] __kernfs_create_file+0x55/0x360
[ 764.783692] sysfs_add_file_mode_ns+0x21c/0x430
[ 764.783728] ? __pfx_dev_attr_store+0x10/0x10
[ 764.783769] internal_create_group+0x662/0xeb0
[ 764.783816] ? __pfx_internal_create_group+0x10/0x10
[ 764.783851] ? blk_validate_limits+0xe47/0x15d0
[ 764.783887] ? lock_is_held_type+0x9e/0x120
[ 764.783922] loop_configure+0xc46/0x15a0
[ 764.783988] ? __pfx_loop_configure+0x10/0x10
[ 764.784042] ? avc_has_extended_perms+0x107/0xf20
[ 764.784072] ? find_held_lock+0x2b/0x80
[ 764.784109] ? avc_has_extended_perms+0x23b/0xf20
[ 764.784146] ? lock_release+0xc8/0x270
[ 764.784197] lo_ioctl+0x674/0x1cb0
[ 764.784250] ? perf_tp_event+0x807/0xe70
[ 764.784277] ? __pfx_lo_ioctl+0x10/0x10
[ 764.784309] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 764.784344] ? __pfx_perf_tp_event+0x10/0x10
[ 764.784372] ? perf_trace_preemptirq_template+0x259/0x430
[ 764.784411] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 764.784445] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 764.784484] ? blkdev_common_ioctl+0x1c3/0x2860
[ 764.784553] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 764.784590] ? __fget_files+0x34/0x3b0
[ 764.784616] ? find_held_lock+0x2b/0x80
[ 764.784653] ? __fget_files+0x203/0x3b0
[ 764.784680] ? __pfx_lo_ioctl+0x10/0x10
[ 764.784713] blkdev_ioctl+0x365/0x6d0
[ 764.784743] ? __pfx_blkdev_ioctl+0x10/0x10
[ 764.784775] ? selinux_file_ioctl+0xb9/0x280
[ 764.784815] ? __pfx_blkdev_ioctl+0x10/0x10
[ 764.784849] __x64_sys_ioctl+0x18f/0x210
[ 764.784888] do_syscall_64+0xbf/0x420
[ 764.784917] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 764.784942] RIP: 0033:0x7f5a8d2b48d7
[ 764.784961] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 764.784983] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 764.785006] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 764.785022] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 764.785037] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 764.785051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 764.785066] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 764.785101]
[ 764.795385] FAT-fs (loop6): unable to read boot sector
[ 764.849302] FAULT_INJECTION: forcing a failure.
[ 764.849302] name failslab, interval 1, probability 0, space 0, times 0
[ 764.852958] CPU: 1 UID: 0 PID: 7571 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 764.852982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 764.852993] Call Trace:
[ 764.852999]
[ 764.853006] dump_stack_lvl+0xfa/0x120
[ 764.853031] should_fail_ex+0x4d7/0x5e0
[ 764.853061] ? __kernfs_new_node+0xd3/0x940
[ 764.853084] should_failslab+0xc2/0x120
[ 764.853105] kmem_cache_alloc_noprof+0x80/0x760
[ 764.853136] ? __kernfs_new_node+0xd3/0x940
[ 764.853159] __kernfs_new_node+0xd3/0x940
[ 764.853180] ? __lock_acquire+0x451/0x2250
[ 764.853206] ? __pfx___kernfs_new_node+0x10/0x10
[ 764.853233] ? lock_acquire+0x15e/0x2d0
[ 764.853254] ? kernfs_root+0x23/0x2a0
[ 764.853276] ? find_held_lock+0x2b/0x80
[ 764.853302] ? kernfs_root+0xee/0x2a0
[ 764.853325] ? lock_release+0xc8/0x270
[ 764.853344] ? lock_is_held_type+0x9e/0x120
[ 764.853366] kernfs_new_node+0x13c/0x1e0
[ 764.853397] __kernfs_create_file+0x55/0x360
[ 764.853419] sysfs_add_file_mode_ns+0x21c/0x430
[ 764.853444] ? __pfx_dev_attr_store+0x10/0x10
[ 764.853472] internal_create_group+0x662/0xeb0
[ 764.853504] ? __pfx_internal_create_group+0x10/0x10
[ 764.853528] ? blk_validate_limits+0xe47/0x15d0
[ 764.853553] ? lock_is_held_type+0x9e/0x120
[ 764.853571] loop_configure+0xc46/0x15a0
[ 764.853616] ? __pfx_loop_configure+0x10/0x10
[ 764.853654] ? avc_has_extended_perms+0x107/0xf20
[ 764.853674] ? find_held_lock+0x2b/0x80
[ 764.853700] ? avc_has_extended_perms+0x23b/0xf20
[ 764.853719] ? lock_release+0xc8/0x270
[ 764.853743] lo_ioctl+0x674/0x1cb0
[ 764.853770] ? __pfx_lo_ioctl+0x10/0x10
[ 764.853792] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 764.853813] ? __pfx_perf_trace_lock+0x10/0x10
[ 764.853840] ? lock_acquire+0x15e/0x2d0
[ 764.853859] ? __virt_addr_valid+0x1c6/0x5d0
[ 764.853880] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 764.853911] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 764.853932] ? lock_release+0xc8/0x270
[ 764.853951] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 764.853978] ? blkdev_common_ioctl+0x1c3/0x2860
[ 764.854025] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 764.854051] ? __fget_files+0x34/0x3b0
[ 764.854069] ? find_held_lock+0x2b/0x80
[ 764.854094] ? __fget_files+0x203/0x3b0
[ 764.854113] ? __pfx_lo_ioctl+0x10/0x10
[ 764.854136] blkdev_ioctl+0x365/0x6d0
[ 764.854158] ? __pfx_blkdev_ioctl+0x10/0x10
[ 764.854180] ? selinux_file_ioctl+0xb9/0x280
[ 764.854207] ? __pfx_blkdev_ioctl+0x10/0x10
[ 764.854229] __x64_sys_ioctl+0x18f/0x210
[ 764.854257] do_syscall_64+0xbf/0x420
[ 764.854277] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 764.854295] RIP: 0033:0x7f184d9088d7
[ 764.854308] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 764.854325] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 764.854341] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 764.854353] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 764.854363] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 764.854373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 764.854383] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 764.854407]
07:38:28 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 33)
07:38:28 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 50)
07:38:28 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:28 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 39)
[ 764.939215] FAT-fs (loop7): unable to read boot sector
[ 764.973426] FAULT_INJECTION: forcing a failure.
[ 764.973426] name failslab, interval 1, probability 0, space 0, times 0
[ 764.975715] CPU: 0 UID: 0 PID: 7578 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 764.975748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 764.975763] Call Trace:
[ 764.975772]
[ 764.975781] dump_stack_lvl+0xfa/0x120
[ 764.975816] should_fail_ex+0x4d7/0x5e0
[ 764.975860] ? alloc_fs_context+0x57/0xb10
[ 764.975885] should_failslab+0xc2/0x120
[ 764.975920] __kmalloc_cache_noprof+0x80/0x730
[ 764.975955] ? __get_fs_type+0xe6/0x160
[ 764.975992] ? alloc_fs_context+0x57/0xb10
[ 764.976016] alloc_fs_context+0x57/0xb10
[ 764.976046] path_mount+0xce2/0x2150
[ 764.976076] ? kasan_quarantine_put+0x84/0x1e0
[ 764.976103] ? __pfx_path_mount+0x10/0x10
[ 764.976137] ? kmem_cache_free+0x2cd/0x670
[ 764.976189] ? putname.part.0+0x85/0xe0
[ 764.976222] ? strncpy_from_user+0x120/0x2f0
[ 764.976258] ? putname.part.0+0x85/0xe0
[ 764.976285] ? putname.part.0+0x85/0xe0
[ 764.976318] __x64_sys_mount+0x293/0x310
[ 764.976349] ? __pfx___x64_sys_mount+0x10/0x10
[ 764.976388] do_syscall_64+0xbf/0x420
[ 764.976417] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 764.976444] RIP: 0033:0x7f1e7893c04a
[ 764.976463] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 764.976486] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 764.976511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 764.976528] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 764.976543] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 764.976559] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 764.976574] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 764.976606]
[ 764.978380] FAT-fs (loop4): unable to read boot sector
[ 764.997613] FAULT_INJECTION: forcing a failure.
[ 764.997613] name failslab, interval 1, probability 0, space 0, times 0
[ 764.999477] FAT-fs (loop5): unable to read boot sector
[ 765.030471] FAT-fs (loop4): unable to read boot sector
[ 765.038090] CPU: 0 UID: 0 PID: 7577 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 765.038128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 765.038144] Call Trace:
[ 765.038152]
[ 765.038162] dump_stack_lvl+0xfa/0x120
[ 765.038200] should_fail_ex+0x4d7/0x5e0
[ 765.038243] ? __kernfs_new_node+0xd3/0x940
[ 765.038276] should_failslab+0xc2/0x120
[ 765.038304] kmem_cache_alloc_noprof+0x80/0x760
[ 765.038348] ? __kernfs_new_node+0xd3/0x940
[ 765.038379] __kernfs_new_node+0xd3/0x940
[ 765.038411] ? __lock_acquire+0x451/0x2250
[ 765.038447] ? __pfx___kernfs_new_node+0x10/0x10
[ 765.038485] ? lock_acquire+0x15e/0x2d0
[ 765.038514] ? kernfs_root+0x23/0x2a0
[ 765.038546] ? find_held_lock+0x2b/0x80
[ 765.038584] ? kernfs_root+0xee/0x2a0
[ 765.038616] ? lock_release+0xc8/0x270
[ 765.038643] ? lock_is_held_type+0x9e/0x120
[ 765.038672] kernfs_new_node+0x13c/0x1e0
[ 765.038715] __kernfs_create_file+0x55/0x360
[ 765.038747] sysfs_add_file_mode_ns+0x21c/0x430
[ 765.038782] ? __pfx_dev_attr_store+0x10/0x10
[ 765.038821] internal_create_group+0x662/0xeb0
[ 765.038866] ? __pfx_internal_create_group+0x10/0x10
[ 765.038909] ? blk_validate_limits+0xe47/0x15d0
[ 765.038944] ? lock_is_held_type+0x9e/0x120
[ 765.038969] loop_configure+0xc46/0x15a0
[ 765.039029] ? __pfx_loop_configure+0x10/0x10
[ 765.039078] ? avc_has_extended_perms+0x107/0xf20
[ 765.039108] ? find_held_lock+0x2b/0x80
[ 765.039145] ? avc_has_extended_perms+0x23b/0xf20
[ 765.039173] ? lock_release+0xc8/0x270
[ 765.039206] lo_ioctl+0x674/0x1cb0
[ 765.039241] ? perf_tp_event+0x807/0xe70
[ 765.039266] ? __pfx_lo_ioctl+0x10/0x10
[ 765.039297] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 765.039329] ? __pfx_perf_tp_event+0x10/0x10
[ 765.039357] ? perf_trace_preemptirq_template+0x259/0x430
[ 765.039394] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 765.039428] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 765.039478] ? blkdev_common_ioctl+0x1c3/0x2860
[ 765.039540] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 765.039577] ? __fget_files+0x34/0x3b0
[ 765.039602] ? find_held_lock+0x2b/0x80
[ 765.039638] ? __fget_files+0x203/0x3b0
[ 765.039664] ? __pfx_lo_ioctl+0x10/0x10
[ 765.039697] blkdev_ioctl+0x365/0x6d0
[ 765.039727] ? __pfx_blkdev_ioctl+0x10/0x10
[ 765.039758] ? selinux_file_ioctl+0xb9/0x280
[ 765.039797] ? __pfx_blkdev_ioctl+0x10/0x10
[ 765.039829] __x64_sys_ioctl+0x18f/0x210
[ 765.039868] do_syscall_64+0xbf/0x420
[ 765.039897] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 765.039923] RIP: 0033:0x7fb40288d8d7
[ 765.039944] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 765.039968] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 765.039992] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 765.040008] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 765.040023] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 765.040038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 765.040053] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 765.040085]
[ 765.124963] FAT-fs (loop0): unable to read boot sector
07:38:37 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 51)
07:38:37 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc9, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:37 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 34)
07:38:37 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 40)
07:38:37 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:37 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
prlimit64(r1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r1, 0x3, r0, 0xa)
recvmmsg$unix(0xffffffffffffffff, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/140, 0x8c}, {&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000340)=""/72, 0x48}, {&(0x7f00000003c0)=""/235, 0xeb}, {&(0x7f00000004c0)}], 0x5, &(0x7f0000000580)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000000600)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000680)=""/105, 0x69}, {&(0x7f0000000700)=""/47, 0x2f}, {&(0x7f0000000740)=""/248, 0xf8}, {&(0x7f0000000840)=""/57, 0x39}, {&(0x7f0000000880)=""/138, 0x8a}, {&(0x7f0000000940)=""/118, 0x76}], 0x6, &(0x7f0000000a40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}}, {{&(0x7f0000000b80)=@abs, 0x6e, &(0x7f0000002280)=[{&(0x7f0000000c00)=""/204, 0xcc}, {&(0x7f0000000d00)=""/72, 0x48}, {&(0x7f0000000d80)=""/240, 0xf0}, {&(0x7f0000000e80)=""/70, 0x46}, {&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f0000001f00)=""/197, 0xc5}, {&(0x7f0000002000)=""/207, 0xcf}, {&(0x7f0000002100)=""/94, 0x5e}, {&(0x7f0000002180)=""/238, 0xee}], 0x9, &(0x7f0000002340)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000002400)=""/55, 0x37}, {&(0x7f0000002440)=""/254, 0xfe}, {&(0x7f0000002540)=""/199, 0xc7}, {&(0x7f0000002640)=""/219, 0xdb}, {&(0x7f0000002740)=""/17, 0x11}], 0x5, &(0x7f0000002800)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000002900)=@abs, 0x6e, &(0x7f0000002d40)=[{&(0x7f0000002980)=""/40, 0x28}, {&(0x7f00000029c0)=""/180, 0xb4}, {&(0x7f0000002a80)=""/140, 0x8c}, {&(0x7f0000002b40)=""/51, 0x33}, {&(0x7f0000002b80)=""/147, 0x93}, {&(0x7f0000002c40)=""/127, 0x7f}, {&(0x7f0000002cc0)=""/66, 0x42}], 0x7, &(0x7f0000002dc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002e40)=@abs, 0x6e, &(0x7f0000003200)=[{&(0x7f0000002ec0)=""/44, 0x2c}, {&(0x7f0000002f00)=""/68, 0x44}, {&(0x7f0000002f80)=""/192, 0xc0}, {&(0x7f0000003040)=""/61, 0x3d}, {&(0x7f0000003080)=""/142, 0x8e}, {&(0x7f0000003140)=""/184, 0xb8}], 0x6, &(0x7f0000003280)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x40}}, {{&(0x7f00000032c0)=@abs, 0x6e, &(0x7f0000004780)=[{&(0x7f0000003340)=""/160, 0xa0}, {&(0x7f0000003400)=""/87, 0x57}, {&(0x7f0000003480)=""/149, 0x95}, {&(0x7f0000003540)=""/110, 0x6e}, {&(0x7f00000035c0)=""/4096, 0x1000}, {&(0x7f00000045c0)=""/115, 0x73}, {&(0x7f0000004640)=""/23, 0x17}, {&(0x7f0000004680)=""/91, 0x5b}, {&(0x7f0000004700)=""/84, 0x54}], 0x9, &(0x7f0000004840)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}], 0x7, 0xa2, &(0x7f0000004a80)={0x77359400})
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x80, 0x1, 0x81, 0x8, 0x0, 0x401, 0x10090, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x410, 0x3, 0x37b, 0x2, 0x7, 0x4, 0x3, 0x0, 0x81, 0x0, 0xffff}, r1, 0xd, r2, 0x3)
07:38:37 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 26)
07:38:37 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 26)
[ 773.761482] FAT-fs (loop5): unable to read boot sector
[ 773.762531] FAT-fs (loop4): unable to read boot sector
[ 773.767309] FAT-fs (loop7): unable to read boot sector
[ 773.781261] FAT-fs (loop2): unable to read boot sector
[ 773.782412] FAT-fs (loop4): unable to read boot sector
[ 773.788372] FAT-fs (loop0): unable to read boot sector
[ 773.793801] FAT-fs (loop6): unable to read boot sector
[ 773.810644] FAT-fs (loop2): unable to read boot sector
07:38:37 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 27)
[ 773.813987] No source specified
07:38:37 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 52)
07:38:37 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 773.871223] FAULT_INJECTION: forcing a failure.
[ 773.871223] name failslab, interval 1, probability 0, space 0, times 0
[ 773.885610] FAULT_INJECTION: forcing a failure.
[ 773.885610] name failslab, interval 1, probability 0, space 0, times 0
[ 773.886523] CPU: 1 UID: 0 PID: 7611 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 773.886540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 773.886548] Call Trace:
[ 773.886553]
[ 773.886559] dump_stack_lvl+0xfa/0x120
[ 773.886579] should_fail_ex+0x4d7/0x5e0
[ 773.886602] ? ext4_alloc_inode+0x28/0x640
[ 773.886620] should_failslab+0xc2/0x120
[ 773.886635] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 773.886657] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 773.886675] ? ext4_alloc_inode+0x28/0x640
[ 773.886691] ext4_alloc_inode+0x28/0x640
[ 773.886707] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 773.886723] alloc_inode+0x67/0x250
[ 773.886741] new_inode+0x1e/0x160
[ 773.886758] __ext4_new_inode+0x35d/0x4cd0
[ 773.886778] ? avc_has_perm_noaudit+0x141/0x390
[ 773.886796] ? __pfx___ext4_new_inode+0x10/0x10
[ 773.886812] ? __pfx_avc_has_perm+0x10/0x10
[ 773.886825] ? __pfx___dquot_initialize+0x10/0x10
[ 773.886852] ext4_mkdir+0x331/0xb30
[ 773.886875] ? __pfx_ext4_mkdir+0x10/0x10
[ 773.886896] ? security_inode_permission+0x72/0xe0
[ 773.886913] vfs_mkdir+0x6d8/0xc00
[ 773.886934] filename_mkdirat+0x118/0x430
[ 773.886950] ? __pfx_filename_mkdirat+0x10/0x10
[ 773.886964] ? strncpy_from_user+0x21b/0x2f0
[ 773.886984] __x64_sys_mkdir+0x6e/0xd0
[ 773.886998] do_syscall_64+0xbf/0x420
[ 773.887013] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 773.887026] RIP: 0033:0x7f775d7e2c27
[ 773.887037] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 773.887048] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 773.887061] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 773.887070] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 773.887077] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 773.887085] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 773.887093] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 773.887110]
[ 773.898058] CPU: 0 UID: 0 PID: 7610 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 773.898098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 773.898112] Call Trace:
[ 773.898121]
[ 773.898131] dump_stack_lvl+0xfa/0x120
[ 773.898165] should_fail_ex+0x4d7/0x5e0
[ 773.898208] ? __kernfs_new_node+0xd3/0x940
[ 773.898240] should_failslab+0xc2/0x120
[ 773.898266] kmem_cache_alloc_noprof+0x80/0x760
[ 773.898307] ? __kernfs_new_node+0xd3/0x940
[ 773.898337] __kernfs_new_node+0xd3/0x940
[ 773.898366] ? __lock_acquire+0x451/0x2250
[ 773.898398] ? __pfx___kernfs_new_node+0x10/0x10
[ 773.898434] ? lock_acquire+0x15e/0x2d0
[ 773.898461] ? kernfs_root+0x23/0x2a0
[ 773.898490] ? find_held_lock+0x2b/0x80
[ 773.898525] ? kernfs_root+0xee/0x2a0
[ 773.898555] ? lock_release+0xc8/0x270
[ 773.898581] ? lock_is_held_type+0x9e/0x120
[ 773.898609] kernfs_new_node+0x13c/0x1e0
[ 773.898649] __kernfs_create_file+0x55/0x360
[ 773.898679] sysfs_add_file_mode_ns+0x21c/0x430
[ 773.898711] ? __pfx_dev_attr_store+0x10/0x10
[ 773.898748] internal_create_group+0x662/0xeb0
[ 773.898789] ? __pfx_internal_create_group+0x10/0x10
[ 773.898821] ? blk_validate_limits+0xe47/0x15d0
[ 773.898853] ? lock_is_held_type+0x9e/0x120
[ 773.898877] loop_configure+0xc46/0x15a0
[ 773.898941] ? __pfx_loop_configure+0x10/0x10
[ 773.898987] ? avc_has_extended_perms+0x107/0xf20
[ 773.899015] ? find_held_lock+0x2b/0x80
[ 773.899049] ? avc_has_extended_perms+0x23b/0xf20
07:38:37 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 41)
07:38:37 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 27)
07:38:37 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 35)
[ 773.899075] ? lock_release+0xc8/0x270
[ 773.899105] lo_ioctl+0x674/0x1cb0
[ 773.899141] ? __pfx_lo_ioctl+0x10/0x10
[ 773.899171] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 773.899206] ? lock_acquire+0x15e/0x2d0
[ 773.899232] ? __virt_addr_valid+0x1c6/0x5d0
[ 773.899259] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 773.899291] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 773.899319] ? lock_release+0xc8/0x270
[ 773.899346] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 773.899381] ? blkdev_common_ioctl+0x1c3/0x2860
[ 773.899439] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 773.899474] ? __fget_files+0x34/0x3b0
[ 773.899497] ? find_held_lock+0x2b/0x80
[ 773.899531] ? __fget_files+0x203/0x3b0
[ 773.899568] ? __pfx_lo_ioctl+0x10/0x10
[ 773.899598] blkdev_ioctl+0x365/0x6d0
[ 773.899626] ? __pfx_blkdev_ioctl+0x10/0x10
[ 773.899655] ? selinux_file_ioctl+0xb9/0x280
[ 773.899691] ? __pfx_blkdev_ioctl+0x10/0x10
[ 773.899721] __x64_sys_ioctl+0x18f/0x210
[ 773.899757] do_syscall_64+0xbf/0x420
[ 773.899784] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 773.899808] RIP: 0033:0x7f184d9088d7
[ 773.899827] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 773.899849] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 773.899872] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 773.899887] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 773.899900] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 773.899914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 773.899927] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 773.899957]
[ 773.905610] FAT-fs (loop7): unable to read boot sector
[ 773.944785] FAULT_INJECTION: forcing a failure.
[ 773.944785] name failslab, interval 1, probability 0, space 0, times 0
[ 773.949347] FAT-fs (loop0): unable to read boot sector
[ 773.955420] CPU: 1 UID: 0 PID: 7616 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 773.955440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 773.955448] Call Trace:
[ 773.955454]
[ 773.955459] dump_stack_lvl+0xfa/0x120
[ 773.955482] should_fail_ex+0x4d7/0x5e0
[ 773.955506] ? __kernfs_new_node+0xd3/0x940
[ 773.955523] should_failslab+0xc2/0x120
[ 773.955539] kmem_cache_alloc_noprof+0x80/0x760
[ 773.955569] ? __kernfs_new_node+0xd3/0x940
[ 773.955585] __kernfs_new_node+0xd3/0x940
[ 773.955600] ? __lock_acquire+0x451/0x2250
[ 773.955619] ? __pfx___kernfs_new_node+0x10/0x10
[ 773.955638] ? lock_acquire+0x15e/0x2d0
[ 773.955652] ? kernfs_root+0x23/0x2a0
[ 773.955669] ? find_held_lock+0x2b/0x80
[ 773.955688] ? kernfs_root+0xee/0x2a0
[ 773.955704] ? lock_release+0xc8/0x270
[ 773.955718] ? lock_is_held_type+0x9e/0x120
[ 773.955733] kernfs_new_node+0x13c/0x1e0
[ 773.955755] __kernfs_create_file+0x55/0x360
[ 773.955771] sysfs_add_file_mode_ns+0x21c/0x430
[ 773.955789] ? __pfx_dev_attr_store+0x10/0x10
[ 773.955810] internal_create_group+0x662/0xeb0
[ 773.955833] ? __pfx_internal_create_group+0x10/0x10
[ 773.955850] ? blk_validate_limits+0xe47/0x15d0
[ 773.955868] ? lock_is_held_type+0x9e/0x120
[ 773.955881] loop_configure+0xc46/0x15a0
[ 773.955916] ? __pfx_loop_configure+0x10/0x10
[ 773.955941] ? avc_has_extended_perms+0x107/0xf20
[ 773.955956] ? find_held_lock+0x2b/0x80
[ 773.955974] ? avc_has_extended_perms+0x23b/0xf20
[ 773.955988] ? lock_release+0xc8/0x270
[ 773.956005] lo_ioctl+0x674/0x1cb0
[ 773.956024] ? __pfx_lo_ioctl+0x10/0x10
[ 773.956040] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 773.956058] ? lock_acquire+0x15e/0x2d0
[ 773.956073] ? __virt_addr_valid+0x1c6/0x5d0
[ 773.956088] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 773.956106] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 773.956121] ? lock_release+0xc8/0x270
[ 773.956135] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 773.956155] ? blkdev_common_ioctl+0x1c3/0x2860
[ 773.956187] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 773.956205] ? __fget_files+0x34/0x3b0
[ 773.956218] ? find_held_lock+0x2b/0x80
[ 773.956237] ? __fget_files+0x203/0x3b0
[ 773.956250] ? __pfx_lo_ioctl+0x10/0x10
[ 773.956266] blkdev_ioctl+0x365/0x6d0
[ 773.956281] ? __pfx_blkdev_ioctl+0x10/0x10
[ 773.956296] ? selinux_file_ioctl+0xb9/0x280
[ 773.956316] ? __pfx_blkdev_ioctl+0x10/0x10
[ 773.956332] __x64_sys_ioctl+0x18f/0x210
[ 773.956352] do_syscall_64+0xbf/0x420
[ 773.956368] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 773.956381] RIP: 0033:0x7f5a8d2b48d7
[ 773.956391] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 773.956403] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 773.956416] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 773.956424] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 773.956432] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 773.956440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 773.956447] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 773.956463]
07:38:37 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:37 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffd3d, 0x7a, 0x0, 0x8, 0x0, 0x0, 0x0, 0xe402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 773.996684] FAT-fs (loop4): unable to read boot sector
[ 774.010067] FAT-fs (loop4): unable to read boot sector
07:38:37 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 36)
[ 774.033182] FAULT_INJECTION: forcing a failure.
[ 774.033182] name failslab, interval 1, probability 0, space 0, times 0
[ 774.034850] CPU: 0 UID: 0 PID: 7620 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 774.034879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 774.034903] Call Trace:
[ 774.034911]
[ 774.034920] dump_stack_lvl+0xfa/0x120
[ 774.034952] should_fail_ex+0x4d7/0x5e0
[ 774.034991] ? fat_init_fs_context+0x4d/0x640
[ 774.035025] should_failslab+0xc2/0x120
[ 774.035050] __kmalloc_cache_noprof+0x80/0x730
[ 774.035081] ? __create_object+0x59/0x80
[ 774.035116] ? fat_init_fs_context+0x4d/0x640
[ 774.035149] fat_init_fs_context+0x4d/0x640
[ 774.035186] vfat_init_fs_context+0x1c/0x70
[ 774.035209] alloc_fs_context+0x56d/0xb10
[ 774.035239] path_mount+0xce2/0x2150
[ 774.035267] ? kasan_quarantine_put+0x84/0x1e0
[ 774.035292] ? __pfx_path_mount+0x10/0x10
[ 774.035319] ? kmem_cache_free+0x2cd/0x670
[ 774.035350] ? putname.part.0+0x85/0xe0
[ 774.035376] ? strncpy_from_user+0x120/0x2f0
[ 774.035409] ? putname.part.0+0x85/0xe0
[ 774.035433] ? putname.part.0+0x85/0xe0
[ 774.035464] __x64_sys_mount+0x293/0x310
[ 774.035491] ? __pfx___x64_sys_mount+0x10/0x10
[ 774.035526] do_syscall_64+0xbf/0x420
[ 774.035564] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 774.035588] RIP: 0033:0x7f1e7893c04a
[ 774.035606] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 774.035628] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 774.035650] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 774.035665] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 774.035678] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 774.035693] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 774.035706] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 774.035735]
[ 774.050390] FAULT_INJECTION: forcing a failure.
[ 774.050390] name failslab, interval 1, probability 0, space 0, times 0
07:38:37 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 28)
[ 774.059047] CPU: 1 UID: 0 PID: 7622 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 774.059070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 774.059079] Call Trace:
[ 774.059084]
[ 774.059089] dump_stack_lvl+0xfa/0x120
[ 774.059113] should_fail_ex+0x4d7/0x5e0
[ 774.059139] ? __kernfs_new_node+0xd3/0x940
[ 774.059158] should_failslab+0xc2/0x120
[ 774.059175] kmem_cache_alloc_noprof+0x80/0x760
[ 774.059197] ? __kernfs_new_node+0xd3/0x940
[ 774.059213] __kernfs_new_node+0xd3/0x940
[ 774.059229] ? __lock_acquire+0x451/0x2250
[ 774.059248] ? __pfx___kernfs_new_node+0x10/0x10
07:38:37 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 774.059267] ? lock_acquire+0x15e/0x2d0
[ 774.059281] ? kernfs_root+0x23/0x2a0
[ 774.059298] ? find_held_lock+0x2b/0x80
[ 774.059317] ? kernfs_root+0xee/0x2a0
[ 774.059333] ? lock_release+0xc8/0x270
[ 774.059347] ? lock_is_held_type+0x9e/0x120
[ 774.059363] kernfs_new_node+0x13c/0x1e0
[ 774.059384] __kernfs_create_file+0x55/0x360
[ 774.059401] sysfs_add_file_mode_ns+0x21c/0x430
[ 774.059419] ? __pfx_dev_attr_store+0x10/0x10
[ 774.059441] internal_create_group+0x662/0xeb0
[ 774.059464] ? __pfx_internal_create_group+0x10/0x10
[ 774.059482] ? blk_validate_limits+0xe47/0x15d0
[ 774.059500] ? lock_is_held_type+0x9e/0x120
[ 774.059513] loop_configure+0xc46/0x15a0
[ 774.059544] ? __pfx_loop_configure+0x10/0x10
[ 774.059576] ? avc_has_extended_perms+0x107/0xf20
[ 774.059592] ? find_held_lock+0x2b/0x80
[ 774.059611] ? avc_has_extended_perms+0x23b/0xf20
[ 774.059625] ? lock_release+0xc8/0x270
[ 774.059641] lo_ioctl+0x674/0x1cb0
[ 774.059661] ? __pfx_lo_ioctl+0x10/0x10
[ 774.059676] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 774.059695] ? lock_acquire+0x15e/0x2d0
[ 774.059709] ? __virt_addr_valid+0x1c6/0x5d0
[ 774.059724] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 774.059743] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 774.059758] ? lock_release+0xc8/0x270
[ 774.059773] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 774.059792] ? blkdev_common_ioctl+0x1c3/0x2860
[ 774.059824] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 774.059843] ? __fget_files+0x34/0x3b0
[ 774.059857] ? find_held_lock+0x2b/0x80
[ 774.059876] ? __fget_files+0x203/0x3b0
[ 774.059888] ? __pfx_lo_ioctl+0x10/0x10
[ 774.059905] blkdev_ioctl+0x365/0x6d0
[ 774.059921] ? __pfx_blkdev_ioctl+0x10/0x10
[ 774.059936] ? selinux_file_ioctl+0xb9/0x280
[ 774.059957] ? __pfx_blkdev_ioctl+0x10/0x10
[ 774.059973] __x64_sys_ioctl+0x18f/0x210
[ 774.059993] do_syscall_64+0xbf/0x420
[ 774.060008] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 774.060022] RIP: 0033:0x7fb40288d8d7
[ 774.060032] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 774.060045] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 774.060058] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 774.060066] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 774.060074] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 774.060082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 774.060090] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 774.060106]
[ 774.063443] FAT-fs (loop6): unable to read boot sector
[ 774.071501] FAT-fs (loop0): unable to read boot sector
07:38:37 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 53)
[ 774.106642] FAT-fs (loop2): unable to read boot sector
[ 774.125004] FAT-fs (loop4): unable to read boot sector
[ 774.156772] FAT-fs (loop5): unable to read boot sector
[ 774.212872] FAT-fs (loop7): unable to read boot sector
07:38:46 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 42)
07:38:46 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:46 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 29)
07:38:46 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 37)
07:38:46 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 28)
07:38:46 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 54)
07:38:46 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf5, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:46 executing program 1:
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
r2 = dup(r1)
connect$802154_dgram(r2, &(0x7f0000000000)={0x24, @long}, 0x11)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xe8}}, './file0\x00'})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100))
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 782.720377] FAT-fs (loop2): unable to read boot sector
[ 782.720997] FAT-fs (loop0): unable to read boot sector
[ 782.733257] FAT-fs (loop2): unable to read boot sector
[ 782.736373] FAT-fs (loop4): unable to read boot sector
[ 782.757826] No source specified
[ 782.759552] FAT-fs (loop6): unable to read boot sector
[ 782.761888] FAULT_INJECTION: forcing a failure.
[ 782.761888] name failslab, interval 1, probability 0, space 0, times 0
[ 782.766463] FAULT_INJECTION: forcing a failure.
[ 782.766463] name failslab, interval 1, probability 0, space 0, times 0
07:38:46 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfe, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:46 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 38)
[ 782.768302] CPU: 0 UID: 0 PID: 7652 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 782.768335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 782.768350] Call Trace:
[ 782.768358]
[ 782.768368] dump_stack_lvl+0xfa/0x120
[ 782.768402] should_fail_ex+0x4d7/0x5e0
[ 782.768444] ? __kernfs_new_node+0xd3/0x940
[ 782.768478] should_failslab+0xc2/0x120
[ 782.768505] kmem_cache_alloc_noprof+0x80/0x760
[ 782.768549] ? __kernfs_new_node+0xd3/0x940
[ 782.768581] __kernfs_new_node+0xd3/0x940
[ 782.768612] ? __lock_acquire+0x451/0x2250
[ 782.768647] ? __pfx___kernfs_new_node+0x10/0x10
[ 782.768686] ? lock_acquire+0x15e/0x2d0
[ 782.768714] ? kernfs_root+0x23/0x2a0
[ 782.768746] ? find_held_lock+0x2b/0x80
[ 782.768791] ? kernfs_root+0xee/0x2a0
[ 782.768837] ? lock_release+0xc8/0x270
[ 782.768872] ? lock_is_held_type+0x9e/0x120
[ 782.768915] kernfs_new_node+0x13c/0x1e0
[ 782.768958] __kernfs_create_file+0x55/0x360
[ 782.768989] sysfs_add_file_mode_ns+0x21c/0x430
[ 782.769024] ? __pfx_dev_attr_store+0x10/0x10
[ 782.769062] internal_create_group+0x662/0xeb0
[ 782.769107] ? __pfx_internal_create_group+0x10/0x10
[ 782.769141] ? blk_validate_limits+0xe47/0x15d0
[ 782.769175] ? lock_is_held_type+0x9e/0x120
[ 782.769201] loop_configure+0xc46/0x15a0
[ 782.769259] ? __pfx_loop_configure+0x10/0x10
[ 782.769309] ? avc_has_extended_perms+0x107/0xf20
[ 782.769338] ? find_held_lock+0x2b/0x80
[ 782.769375] ? avc_has_extended_perms+0x23b/0xf20
[ 782.769402] ? lock_release+0xc8/0x270
[ 782.769435] lo_ioctl+0x674/0x1cb0
[ 782.769470] ? perf_tp_event+0x807/0xe70
[ 782.769496] ? __pfx_lo_ioctl+0x10/0x10
[ 782.769529] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 782.769562] ? __pfx_perf_tp_event+0x10/0x10
[ 782.769589] ? perf_trace_preemptirq_template+0x259/0x430
[ 782.769626] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 782.769659] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 782.769697] ? blkdev_common_ioctl+0x1c3/0x2860
[ 782.769759] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 782.769796] ? __fget_files+0x34/0x3b0
[ 782.769821] ? find_held_lock+0x2b/0x80
[ 782.769858] ? __fget_files+0x203/0x3b0
[ 782.769884] ? __pfx_lo_ioctl+0x10/0x10
[ 782.769916] blkdev_ioctl+0x365/0x6d0
[ 782.769946] ? __pfx_blkdev_ioctl+0x10/0x10
[ 782.769976] ? selinux_file_ioctl+0xb9/0x280
[ 782.770015] ? __pfx_blkdev_ioctl+0x10/0x10
[ 782.770047] __x64_sys_ioctl+0x18f/0x210
[ 782.770086] do_syscall_64+0xbf/0x420
[ 782.770115] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 782.770140] RIP: 0033:0x7f184d9088d7
[ 782.770160] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 782.770183] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 782.770207] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 782.770224] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 782.770239] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 782.770254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 782.770269] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 782.770301]
[ 782.815945] CPU: 1 UID: 0 PID: 7649 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 782.815964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 782.815971] Call Trace:
[ 782.815975]
[ 782.815980] dump_stack_lvl+0xfa/0x120
[ 782.816001] should_fail_ex+0x4d7/0x5e0
[ 782.816025] should_failslab+0xc2/0x120
[ 782.816039] __kmalloc_noprof+0xd6/0x830
[ 782.816057] ? security_inode_init_security+0x113/0x370
[ 782.816078] ? security_inode_init_security+0x113/0x370
[ 782.816095] security_inode_init_security+0x113/0x370
[ 782.816112] ? __pfx_ext4_initxattrs+0x10/0x10
[ 782.816132] ? __pfx_security_inode_init_security+0x10/0x10
[ 782.816148] ? _raw_spin_unlock+0x1e/0x40
[ 782.816165] ? insert_inode_locked+0x3fb/0x890
[ 782.816184] ? crc32c+0x1ae/0x350
[ 782.816202] __ext4_new_inode+0x38f7/0x4cd0
[ 782.816225] ? __pfx___ext4_new_inode+0x10/0x10
[ 782.816242] ? __pfx___dquot_initialize+0x10/0x10
[ 782.816268] ext4_mkdir+0x331/0xb30
[ 782.816292] ? __pfx_ext4_mkdir+0x10/0x10
[ 782.816308] ? security_inode_permission+0x72/0xe0
[ 782.816325] vfs_mkdir+0x6d8/0xc00
[ 782.816346] filename_mkdirat+0x118/0x430
[ 782.816361] ? __pfx_filename_mkdirat+0x10/0x10
[ 782.816376] ? strncpy_from_user+0x21b/0x2f0
[ 782.816397] __x64_sys_mkdir+0x6e/0xd0
[ 782.816411] do_syscall_64+0xbf/0x420
[ 782.816425] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 782.816438] RIP: 0033:0x7f775d7e2c27
[ 782.816448] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 782.816460] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 782.816473] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 782.816482] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 782.816489] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 782.816498] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 782.816505] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 782.816522]
[ 782.843922] FAULT_INJECTION: forcing a failure.
[ 782.843922] name failslab, interval 1, probability 0, space 0, times 0
[ 782.853264] CPU: 1 UID: 0 PID: 7660 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 782.853281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 782.853288] Call Trace:
[ 782.853292]
[ 782.853297] dump_stack_lvl+0xfa/0x120
[ 782.853313] should_fail_ex+0x4d7/0x5e0
[ 782.853334] should_failslab+0xc2/0x120
[ 782.853348] __kmalloc_noprof+0xd6/0x830
[ 782.853363] ? __create_object+0x59/0x80
[ 782.853380] ? kobject_get_path+0xc8/0x200
[ 782.853399] ? kobject_get_path+0xc8/0x200
[ 782.853413] kobject_get_path+0xc8/0x200
[ 782.853428] ? kasan_save_track+0x14/0x30
[ 782.853444] kobject_uevent_env+0x260/0xfd0
[ 782.853465] ? lock_is_held_type+0x9e/0x120
[ 782.853479] loop_configure+0xe3d/0x15a0
[ 782.853509] ? __pfx_loop_configure+0x10/0x10
[ 782.853534] ? avc_has_extended_perms+0x107/0xf20
[ 782.853550] ? find_held_lock+0x2b/0x80
[ 782.853569] ? avc_has_extended_perms+0x23b/0xf20
[ 782.853584] ? lock_release+0xc8/0x270
[ 782.853600] lo_ioctl+0x674/0x1cb0
[ 782.853619] ? __pfx_lo_ioctl+0x10/0x10
[ 782.853635] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 782.853654] ? lock_acquire+0x15e/0x2d0
[ 782.853668] ? __virt_addr_valid+0x1c6/0x5d0
[ 782.853683] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 782.853701] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 782.853716] ? lock_release+0xc8/0x270
[ 782.853731] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 782.853751] ? blkdev_common_ioctl+0x1c3/0x2860
[ 782.853782] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 782.853801] ? __fget_files+0x34/0x3b0
[ 782.853814] ? find_held_lock+0x2b/0x80
[ 782.853832] ? __fget_files+0x203/0x3b0
[ 782.853845] ? __pfx_lo_ioctl+0x10/0x10
[ 782.853861] blkdev_ioctl+0x365/0x6d0
[ 782.853876] ? __pfx_blkdev_ioctl+0x10/0x10
[ 782.853896] ? selinux_file_ioctl+0xb9/0x280
[ 782.853916] ? __pfx_blkdev_ioctl+0x10/0x10
[ 782.853932] __x64_sys_ioctl+0x18f/0x210
[ 782.853952] do_syscall_64+0xbf/0x420
[ 782.853967] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 782.853979] RIP: 0033:0x7fb40288d8d7
[ 782.853989] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 782.854001] RSP: 002b:00007fb3ffde1f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 782.854013] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 782.854022] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 782.854029] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 782.854036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 782.854043] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 782.854059]
[ 782.871349] FAT-fs (loop2): unable to read boot sector
[ 782.928512] FAT-fs (loop7): unable to read boot sector
[ 782.955999] FAT-fs (loop0): unable to read boot sector
07:38:55 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 30)
07:38:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 39)
07:38:55 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000100)=0x10)
syz_io_uring_complete(0x0)
r1 = open(&(0x7f0000000280)='./file0\x00', 0x101240, 0x180)
ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0))
finit_module(r0, &(0x7f0000000140)='\x00', 0x1)
ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000240)={'rose0\x00', {0x2, 0x0, @private}})
07:38:55 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 43)
07:38:55 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 55)
07:38:55 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 29)
07:38:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x112, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 791.794168] FAULT_INJECTION: forcing a failure.
[ 791.794168] name failslab, interval 1, probability 0, space 0, times 0
[ 791.811998] CPU: 0 UID: 0 PID: 7669 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 791.812037] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 791.812054] Call Trace:
[ 791.812063]
[ 791.812074] dump_stack_lvl+0xfa/0x120
[ 791.812110] should_fail_ex+0x4d7/0x5e0
[ 791.812157] ? kobject_uevent_env+0x23a/0xfd0
[ 791.812194] should_failslab+0xc2/0x120
[ 791.812224] __kmalloc_cache_noprof+0x80/0x730
[ 791.812260] ? set_capacity_and_notify+0xce/0x280
[ 791.812300] ? lock_release+0xc8/0x270
[ 791.812340] ? kobject_uevent_env+0x23a/0xfd0
[ 791.812378] kobject_uevent_env+0x23a/0xfd0
[ 791.812417] ? __pfx_dev_uevent_name+0x10/0x10
[ 791.812451] ? lock_is_held_type+0x9e/0x120
[ 791.812481] loop_configure+0xe3d/0x15a0
[ 791.812545] ? __pfx_loop_configure+0x10/0x10
[ 791.812608] ? avc_has_extended_perms+0x107/0xf20
[ 791.812656] ? find_held_lock+0x2b/0x80
[ 791.812703] ? avc_has_extended_perms+0x23b/0xf20
[ 791.812734] ? lock_release+0xc8/0x270
[ 791.812770] lo_ioctl+0x674/0x1cb0
[ 791.812809] ? perf_tp_event+0x807/0xe70
[ 791.812836] ? __pfx_lo_ioctl+0x10/0x10
[ 791.812871] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 791.812918] ? __pfx_perf_tp_event+0x10/0x10
[ 791.812948] ? perf_trace_preemptirq_template+0x259/0x430
[ 791.812993] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 791.813029] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 791.813071] ? blkdev_common_ioctl+0x1c3/0x2860
[ 791.813138] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 791.813180] ? __fget_files+0x34/0x3b0
[ 791.813208] ? find_held_lock+0x2b/0x80
[ 791.813249] ? __fget_files+0x203/0x3b0
[ 791.813278] ? __pfx_lo_ioctl+0x10/0x10
[ 791.813314] blkdev_ioctl+0x365/0x6d0
[ 791.813347] ? __pfx_blkdev_ioctl+0x10/0x10
[ 791.813381] ? selinux_file_ioctl+0xb9/0x280
[ 791.813426] ? __pfx_blkdev_ioctl+0x10/0x10
[ 791.813462] __x64_sys_ioctl+0x18f/0x210
[ 791.813505] do_syscall_64+0xbf/0x420
[ 791.813537] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 791.813565] RIP: 0033:0x7fb40288d8d7
[ 791.813587] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 791.813624] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 791.813663] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 791.813690] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 791.813714] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 791.813731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 791.813747] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 791.813783]
[ 791.830114] FAULT_INJECTION: forcing a failure.
[ 791.830114] name failslab, interval 1, probability 0, space 0, times 0
[ 791.852309] FAT-fs (loop2): unable to read boot sector
[ 791.856609] FAT-fs (loop4): unable to read boot sector
[ 791.859238] FAT-fs (loop7): unable to read boot sector
[ 791.861200] FAT-fs (loop5): unable to read boot sector
[ 791.875803] FAULT_INJECTION: forcing a failure.
[ 791.875803] name failslab, interval 1, probability 0, space 0, times 0
[ 791.881488] CPU: 1 UID: 0 PID: 7680 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 791.881516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 791.881528] Call Trace:
[ 791.881535]
[ 791.881543] dump_stack_lvl+0xfa/0x120
[ 791.881570] should_fail_ex+0x4d7/0x5e0
[ 791.881602] ? __kernfs_new_node+0xd3/0x940
[ 791.881628] should_failslab+0xc2/0x120
[ 791.881650] kmem_cache_alloc_noprof+0x80/0x760
[ 791.881677] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 791.881709] ? __kernfs_new_node+0xd3/0x940
[ 791.881735] __kernfs_new_node+0xd3/0x940
[ 791.881759] ? __lock_acquire+0x451/0x2250
[ 791.881787] ? __pfx___kernfs_new_node+0x10/0x10
[ 791.881817] ? lock_acquire+0x15e/0x2d0
[ 791.881839] ? kernfs_root+0x23/0x2a0
[ 791.881864] ? find_held_lock+0x2b/0x80
[ 791.881900] ? kernfs_root+0xee/0x2a0
[ 791.881925] ? lock_release+0xc8/0x270
[ 791.881947] ? lock_is_held_type+0x9e/0x120
[ 791.881969] kernfs_new_node+0x13c/0x1e0
[ 791.882002] __kernfs_create_file+0x55/0x360
[ 791.882026] sysfs_add_file_mode_ns+0x21c/0x430
[ 791.882053] ? __pfx_dev_attr_store+0x10/0x10
[ 791.882084] internal_create_group+0x662/0xeb0
[ 791.882118] ? __pfx_internal_create_group+0x10/0x10
[ 791.882144] ? blk_validate_limits+0xe47/0x15d0
[ 791.882171] ? lock_is_held_type+0x9e/0x120
[ 791.882191] loop_configure+0xc46/0x15a0
[ 791.882237] ? __pfx_loop_configure+0x10/0x10
[ 791.882276] ? avc_has_extended_perms+0x107/0xf20
[ 791.882299] ? find_held_lock+0x2b/0x80
[ 791.882327] ? avc_has_extended_perms+0x23b/0xf20
[ 791.882349] ? lock_release+0xc8/0x270
[ 791.882374] lo_ioctl+0x674/0x1cb0
[ 791.882404] ? __pfx_lo_ioctl+0x10/0x10
[ 791.882428] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 791.882457] ? lock_acquire+0x15e/0x2d0
[ 791.882480] ? __virt_addr_valid+0x1c6/0x5d0
[ 791.882503] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 791.882528] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 791.882552] ? lock_release+0xc8/0x270
[ 791.882574] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 791.882603] ? blkdev_common_ioctl+0x1c3/0x2860
[ 791.882652] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 791.882681] ? __fget_files+0x34/0x3b0
[ 791.882700] ? find_held_lock+0x2b/0x80
[ 791.882729] ? __fget_files+0x203/0x3b0
[ 791.882749] ? __pfx_lo_ioctl+0x10/0x10
[ 791.882774] blkdev_ioctl+0x365/0x6d0
[ 791.882797] ? __pfx_blkdev_ioctl+0x10/0x10
[ 791.882821] ? selinux_file_ioctl+0xb9/0x280
[ 791.882852] ? __pfx_blkdev_ioctl+0x10/0x10
[ 791.882877] __x64_sys_ioctl+0x18f/0x210
[ 791.882907] do_syscall_64+0xbf/0x420
[ 791.882929] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 791.882949] RIP: 0033:0x7f5a8d2b48d7
[ 791.882964] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 791.882982] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 791.883001] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 791.883014] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 791.883025] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 791.883036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 791.883048] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 791.883072]
[ 791.900136] FAT-fs (loop0): unable to read boot sector
[ 791.904780] FAT-fs (loop2): unable to read boot sector
[ 791.934404] CPU: 1 UID: 0 PID: 7677 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 791.934430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 791.934441] Call Trace:
[ 791.934447]
[ 791.934455] dump_stack_lvl+0xfa/0x120
[ 791.934477] should_fail_ex+0x4d7/0x5e0
[ 791.934507] should_failslab+0xc2/0x120
[ 791.934527] __kmalloc_node_track_caller_noprof+0xd7/0x840
[ 791.934558] ? do_raw_spin_lock+0x123/0x260
[ 791.934584] ? vfs_parse_fs_qstr+0x112/0x1c0
[ 791.934603] ? find_held_lock+0x2b/0x80
[ 791.934634] ? kmemdup_nul+0x3b/0xa0
[ 791.934657] kmemdup_nul+0x3b/0xa0
[ 791.934682] vfs_parse_fs_qstr+0x112/0x1c0
[ 791.934701] ? __pfx_vfs_parse_fs_qstr+0x10/0x10
[ 791.934731] ? __pfx_vfs_parse_comma_sep+0x10/0x10
[ 791.934749] vfs_parse_monolithic_sep+0x198/0x220
[ 791.934771] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10
[ 791.934793] ? alloc_fs_context+0x5bd/0xb10
[ 791.934816] path_mount+0x6d6/0x2150
[ 791.934839] ? kasan_quarantine_put+0x84/0x1e0
[ 791.934860] ? __pfx_path_mount+0x10/0x10
[ 791.934882] ? kmem_cache_free+0x2cd/0x670
[ 791.934916] ? putname.part.0+0x85/0xe0
[ 791.934937] ? strncpy_from_user+0x120/0x2f0
[ 791.934963] ? putname.part.0+0x85/0xe0
[ 791.934984] ? putname.part.0+0x85/0xe0
[ 791.935008] __x64_sys_mount+0x293/0x310
[ 791.935031] ? __pfx___x64_sys_mount+0x10/0x10
[ 791.935054] ? trace_hardirqs_on+0x4b/0x110
[ 791.935081] do_syscall_64+0xbf/0x420
[ 791.935103] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 791.935121] RIP: 0033:0x7f1e7893c04a
[ 791.935135] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 791.935153] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 791.935171] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 791.935183] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 791.935195] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 791.935208] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 791.935222] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 791.935246]
[ 791.967278] FAT-fs (loop6): unable to read boot sector
07:38:55 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 56)
07:38:55 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 31)
07:38:55 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = gettid()
perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x80, 0x80, 0x3f, 0x8, 0x0, 0x6, 0x422, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80000000, 0x3, @perf_config_ext={0x30000, 0x4}, 0x8, 0x0, 0x977f, 0x8, 0x1, 0x5, 0x9, 0x0, 0x3cf, 0x0, 0x2}, r1, 0x7, r0, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:38:55 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:55 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x300, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:55 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 40)
[ 792.066380] FAT-fs (loop4): unable to read boot sector
[ 792.081086] FAULT_INJECTION: forcing a failure.
[ 792.081086] name failslab, interval 1, probability 0, space 0, times 0
[ 792.086379] FAULT_INJECTION: forcing a failure.
[ 792.086379] name failslab, interval 1, probability 0, space 0, times 0
07:38:55 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 44)
[ 792.099034] CPU: 0 UID: 0 PID: 7691 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 792.099081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 792.099102] Call Trace:
[ 792.099114]
[ 792.099128] dump_stack_lvl+0xfa/0x120
[ 792.099174] should_fail_ex+0x4d7/0x5e0
[ 792.099234] ? __kernfs_new_node+0xd3/0x940
[ 792.099281] should_failslab+0xc2/0x120
[ 792.099319] kmem_cache_alloc_noprof+0x80/0x760
[ 792.099385] ? __kernfs_new_node+0xd3/0x940
[ 792.099432] __kernfs_new_node+0xd3/0x940
[ 792.099478] ? __lock_acquire+0x451/0x2250
[ 792.099529] ? __pfx___kernfs_new_node+0x10/0x10
[ 792.099587] ? lock_acquire+0x15e/0x2d0
[ 792.099626] ? kernfs_root+0x23/0x2a0
[ 792.099674] ? find_held_lock+0x2b/0x80
[ 792.099729] ? kernfs_root+0xee/0x2a0
[ 792.099793] ? lock_release+0xc8/0x270
[ 792.099833] ? lock_is_held_type+0x9e/0x120
[ 792.099876] kernfs_new_node+0x13c/0x1e0
[ 792.099949] __kernfs_create_file+0x55/0x360
[ 792.099995] sysfs_add_file_mode_ns+0x21c/0x430
[ 792.100047] ? __pfx_dev_attr_store+0x10/0x10
[ 792.100104] internal_create_group+0x662/0xeb0
[ 792.100170] ? __pfx_internal_create_group+0x10/0x10
[ 792.100220] ? blk_validate_limits+0xe47/0x15d0
[ 792.100271] ? lock_is_held_type+0x9e/0x120
[ 792.100309] loop_configure+0xc46/0x15a0
[ 792.100399] ? __pfx_loop_configure+0x10/0x10
[ 792.100475] ? avc_has_extended_perms+0x107/0xf20
[ 792.100518] ? find_held_lock+0x2b/0x80
[ 792.100573] ? avc_has_extended_perms+0x23b/0xf20
[ 792.100612] ? lock_release+0xc8/0x270
[ 792.100660] lo_ioctl+0x674/0x1cb0
[ 792.100712] ? perf_tp_event+0x807/0xe70
[ 792.100747] ? __pfx_lo_ioctl+0x10/0x10
[ 792.100794] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 792.100843] ? __pfx_perf_tp_event+0x10/0x10
[ 792.100884] ? perf_trace_preemptirq_template+0x259/0x430
[ 792.100938] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 792.100986] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 792.101042] ? blkdev_common_ioctl+0x1c3/0x2860
[ 792.101137] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 792.101193] ? __fget_files+0x34/0x3b0
[ 792.101227] ? find_held_lock+0x2b/0x80
[ 792.101282] ? __fget_files+0x203/0x3b0
[ 792.101319] ? __pfx_lo_ioctl+0x10/0x10
[ 792.101367] blkdev_ioctl+0x365/0x6d0
[ 792.101411] ? __pfx_blkdev_ioctl+0x10/0x10
[ 792.101456] ? selinux_file_ioctl+0xb9/0x280
[ 792.101514] ? __pfx_blkdev_ioctl+0x10/0x10
[ 792.101562] __x64_sys_ioctl+0x18f/0x210
[ 792.101616] do_syscall_64+0xbf/0x420
[ 792.101657] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 792.101694] RIP: 0033:0x7f184d9088d7
[ 792.101720] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 792.101754] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 792.101786] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 792.101809] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 792.101830] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 792.101852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 792.101873] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 792.101922]
[ 792.123981] CPU: 1 UID: 0 PID: 7693 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 792.124010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 792.124022] Call Trace:
[ 792.124030]
[ 792.124037] dump_stack_lvl+0xfa/0x120
[ 792.124069] should_fail_ex+0x4d7/0x5e0
[ 792.124104] should_failslab+0xc2/0x120
[ 792.124126] __kmalloc_noprof+0xd6/0x830
[ 792.124152] ? security_inode_init_security+0x113/0x370
[ 792.124183] ? security_inode_init_security+0x113/0x370
[ 792.124207] security_inode_init_security+0x113/0x370
[ 792.124233] ? __pfx_ext4_initxattrs+0x10/0x10
[ 792.124261] ? __pfx_security_inode_init_security+0x10/0x10
[ 792.124285] ? _raw_spin_unlock+0x1e/0x40
[ 792.124311] ? insert_inode_locked+0x3fb/0x890
[ 792.124338] ? crc32c+0x1ae/0x350
[ 792.124364] __ext4_new_inode+0x38f7/0x4cd0
[ 792.124397] ? __pfx___ext4_new_inode+0x10/0x10
[ 792.124422] ? __pfx___dquot_initialize+0x10/0x10
[ 792.124459] ext4_mkdir+0x331/0xb30
[ 792.124493] ? __pfx_ext4_mkdir+0x10/0x10
[ 792.124516] ? security_inode_permission+0x72/0xe0
[ 792.124540] vfs_mkdir+0x6d8/0xc00
[ 792.124570] filename_mkdirat+0x118/0x430
[ 792.124593] ? __pfx_filename_mkdirat+0x10/0x10
[ 792.124613] ? strncpy_from_user+0x21b/0x2f0
[ 792.124643] __x64_sys_mkdir+0x6e/0xd0
[ 792.124663] do_syscall_64+0xbf/0x420
[ 792.124685] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 792.124705] RIP: 0033:0x7f775d7e2c27
[ 792.124720] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 792.124738] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 792.124756] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 792.124768] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 792.124779] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 792.124791] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 792.124802] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 792.124825]
[ 792.188827] loop2: detected capacity change from 0 to 1
[ 792.189934] No source specified
[ 792.193276] FAT-fs (loop2): bogus number of reserved sectors
[ 792.193980] FAT-fs (loop2): Can't find a valid FAT filesystem
07:38:56 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 30)
[ 792.220651] FAT-fs (loop7): unable to read boot sector
07:38:56 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 45)
07:38:56 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x500, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 792.310887] FAT-fs (loop0): unable to read boot sector
[ 792.312719] FAT-fs (loop6): unable to read boot sector
07:38:56 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 57)
[ 792.329365] loop2: detected capacity change from 0 to 2
[ 792.331006] FAULT_INJECTION: forcing a failure.
[ 792.331006] name failslab, interval 1, probability 0, space 0, times 0
[ 792.337753] CPU: 0 UID: 0 PID: 7707 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 792.337789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 792.337804] Call Trace:
[ 792.337812]
[ 792.337822] dump_stack_lvl+0xfa/0x120
[ 792.337857] should_fail_ex+0x4d7/0x5e0
[ 792.337910] should_failslab+0xc2/0x120
[ 792.337937] __kmalloc_node_track_caller_noprof+0xd7/0x840
[ 792.337978] ? __pfx_fat_parse_param+0x10/0x10
[ 792.338014] ? do_raw_spin_lock+0x123/0x260
[ 792.338051] ? vfs_parse_fs_qstr+0x112/0x1c0
[ 792.338075] ? kfree+0x2c5/0x5d0
[ 792.338104] ? static_key_count+0x60/0x80
[ 792.338136] ? kmemdup_nul+0x3b/0xa0
[ 792.338168] kmemdup_nul+0x3b/0xa0
[ 792.338201] vfs_parse_fs_qstr+0x112/0x1c0
[ 792.338228] ? __pfx_vfs_parse_fs_qstr+0x10/0x10
[ 792.338268] ? __pfx_vfs_parse_comma_sep+0x10/0x10
[ 792.338293] vfs_parse_monolithic_sep+0x198/0x220
[ 792.338322] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10
[ 792.338351] ? alloc_fs_context+0x5bd/0xb10
[ 792.338383] path_mount+0x6d6/0x2150
[ 792.338414] ? kasan_quarantine_put+0x84/0x1e0
[ 792.338442] ? __pfx_path_mount+0x10/0x10
[ 792.338471] ? kmem_cache_free+0x2cd/0x670
[ 792.338506] ? putname.part.0+0x85/0xe0
[ 792.338535] ? strncpy_from_user+0x120/0x2f0
[ 792.338571] ? putname.part.0+0x85/0xe0
[ 792.338598] ? putname.part.0+0x85/0xe0
[ 792.338632] __x64_sys_mount+0x293/0x310
[ 792.338662] ? __pfx___x64_sys_mount+0x10/0x10
[ 792.338702] do_syscall_64+0xbf/0x420
[ 792.338731] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 792.338756] RIP: 0033:0x7f1e7893c04a
[ 792.338776] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 792.338801] RSP: 002b:00007f1e75eaffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 792.338825] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1e7893c04a
[ 792.338842] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 0000000000000000
[ 792.338857] RBP: 00007f1e75eb0040 R08: 00007f1e75eb0040 R09: 0000000020000000
[ 792.338874] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 792.338889] R13: 0000000020000040 R14: 00007f1e75eb0000 R15: 0000000020000080
[ 792.338922]
[ 792.349035] FAT-fs (loop2): bogus number of reserved sectors
07:38:56 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 32)
[ 792.401055] FAT-fs (loop7): unable to read boot sector
[ 792.408951] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 792.414391] loop2: detected capacity change from 0 to 2
[ 792.433467] FAT-fs (loop5): unable to read boot sector
07:38:56 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:38:56 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 33)
07:38:56 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 31)
07:38:56 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 46)
07:38:56 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x505, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 792.501974] FAULT_INJECTION: forcing a failure.
[ 792.501974] name failslab, interval 1, probability 0, space 0, times 0
[ 792.506410] No source specified
[ 792.509349] CPU: 1 UID: 0 PID: 7716 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 792.509370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 792.509379] Call Trace:
[ 792.509384]
[ 792.509390] dump_stack_lvl+0xfa/0x120
[ 792.509413] should_fail_ex+0x4d7/0x5e0
[ 792.509440] ? __kernfs_new_node+0xd3/0x940
[ 792.509460] should_failslab+0xc2/0x120
[ 792.509477] kmem_cache_alloc_noprof+0x80/0x760
[ 792.509502] ? __kernfs_new_node+0xd3/0x940
[ 792.509520] __kernfs_new_node+0xd3/0x940
[ 792.509538] ? __lock_acquire+0x451/0x2250
[ 792.509560] ? __pfx___kernfs_new_node+0x10/0x10
[ 792.509581] ? lock_acquire+0x15e/0x2d0
[ 792.509598] ? kernfs_root+0x23/0x2a0
[ 792.509616] ? find_held_lock+0x2b/0x80
[ 792.509638] ? kernfs_root+0xee/0x2a0
[ 792.509656] ? lock_release+0xc8/0x270
[ 792.509672] ? lock_is_held_type+0x9e/0x120
[ 792.509689] kernfs_new_node+0x13c/0x1e0
[ 792.509713] __kernfs_create_file+0x55/0x360
[ 792.509731] sysfs_add_file_mode_ns+0x21c/0x430
[ 792.509751] ? __pfx_dev_attr_store+0x10/0x10
[ 792.509775] internal_create_group+0x662/0xeb0
[ 792.509801] ? __pfx_internal_create_group+0x10/0x10
[ 792.509820] ? blk_validate_limits+0xe47/0x15d0
[ 792.509840] ? lock_is_held_type+0x9e/0x120
[ 792.509855] loop_configure+0xc46/0x15a0
[ 792.509889] ? __pfx_loop_configure+0x10/0x10
[ 792.509925] ? avc_has_extended_perms+0x107/0xf20
[ 792.509942] ? find_held_lock+0x2b/0x80
[ 792.509963] ? avc_has_extended_perms+0x23b/0xf20
[ 792.509979] ? lock_release+0xc8/0x270
[ 792.509998] lo_ioctl+0x674/0x1cb0
[ 792.510020] ? __pfx_lo_ioctl+0x10/0x10
[ 792.510038] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 792.510056] ? __pfx___pmu_ctx_sched_in+0x10/0x10
[ 792.510075] ? kvm_sched_clock_read+0x16/0x30
[ 792.510097] ? find_held_lock+0x2b/0x80
[ 792.510121] ? __lock_acquire+0x451/0x2250
[ 792.510137] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 792.510160] ? blkdev_common_ioctl+0x1c3/0x2860
[ 792.510196] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 792.510217] ? __fget_files+0x34/0x3b0
[ 792.510231] ? find_held_lock+0x2b/0x80
[ 792.510252] ? __fget_files+0x203/0x3b0
[ 792.510267] ? __pfx_lo_ioctl+0x10/0x10
[ 792.510285] blkdev_ioctl+0x365/0x6d0
[ 792.510302] ? __pfx_blkdev_ioctl+0x10/0x10
[ 792.510319] ? selinux_file_ioctl+0xb9/0x280
[ 792.510342] ? __pfx_blkdev_ioctl+0x10/0x10
[ 792.510360] __x64_sys_ioctl+0x18f/0x210
[ 792.510383] do_syscall_64+0xbf/0x420
[ 792.510399] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 792.510415] RIP: 0033:0x7f184d9088d7
[ 792.510426] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 792.510440] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 792.510454] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 792.510463] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 792.510472] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 792.510481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 792.510490] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 792.510508]
[ 792.534630] FAT-fs (loop4): unable to read boot sector
[ 792.540714] loop2: detected capacity change from 0 to 2
[ 792.553722] FAULT_INJECTION: forcing a failure.
[ 792.553722] name failslab, interval 1, probability 0, space 0, times 0
[ 792.559830] CPU: 0 UID: 0 PID: 7722 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 792.559867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 792.559881] Call Trace:
[ 792.559890]
[ 792.559904] dump_stack_lvl+0xfa/0x120
[ 792.559935] should_fail_ex+0x4d7/0x5e0
[ 792.559974] ? __kernfs_new_node+0xd3/0x940
[ 792.560004] should_failslab+0xc2/0x120
[ 792.560029] kmem_cache_alloc_noprof+0x80/0x760
[ 792.560068] ? __kernfs_new_node+0xd3/0x940
[ 792.560097] __kernfs_new_node+0xd3/0x940
[ 792.560125] ? __lock_acquire+0x451/0x2250
[ 792.560156] ? __pfx___kernfs_new_node+0x10/0x10
[ 792.560190] ? lock_acquire+0x15e/0x2d0
[ 792.560216] ? kernfs_root+0x23/0x2a0
[ 792.560245] ? find_held_lock+0x2b/0x80
[ 792.560279] ? kernfs_root+0xee/0x2a0
[ 792.560307] ? lock_release+0xc8/0x270
[ 792.560332] ? lock_is_held_type+0x9e/0x120
[ 792.560359] kernfs_new_node+0x13c/0x1e0
[ 792.560401] __kernfs_create_file+0x55/0x360
[ 792.560429] sysfs_add_file_mode_ns+0x21c/0x430
[ 792.560460] ? __pfx_dev_attr_store+0x10/0x10
[ 792.560496] internal_create_group+0x662/0xeb0
[ 792.560535] ? __pfx_internal_create_group+0x10/0x10
[ 792.560566] ? blk_validate_limits+0xe47/0x15d0
[ 792.560596] ? lock_is_held_type+0x9e/0x120
[ 792.560619] loop_configure+0xc46/0x15a0
[ 792.560672] ? __pfx_loop_configure+0x10/0x10
[ 792.560717] ? avc_has_extended_perms+0x107/0xf20
[ 792.560743] ? find_held_lock+0x2b/0x80
[ 792.560776] ? avc_has_extended_perms+0x23b/0xf20
[ 792.560801] ? lock_release+0xc8/0x270
[ 792.560830] lo_ioctl+0x674/0x1cb0
[ 792.560862] ? perf_tp_event+0x807/0xe70
[ 792.560884] ? __pfx_lo_ioctl+0x10/0x10
[ 792.560913] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 792.560943] ? __pfx_perf_tp_event+0x10/0x10
[ 792.560967] ? perf_trace_preemptirq_template+0x259/0x430
[ 792.561001] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 792.561031] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 792.561065] ? blkdev_common_ioctl+0x1c3/0x2860
[ 792.561121] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 792.561155] ? __fget_files+0x34/0x3b0
[ 792.561178] ? find_held_lock+0x2b/0x80
[ 792.561211] ? __fget_files+0x203/0x3b0
[ 792.561234] ? __pfx_lo_ioctl+0x10/0x10
[ 792.561263] blkdev_ioctl+0x365/0x6d0
[ 792.561290] ? __pfx_blkdev_ioctl+0x10/0x10
[ 792.561317] ? selinux_file_ioctl+0xb9/0x280
[ 792.561352] ? __pfx_blkdev_ioctl+0x10/0x10
[ 792.561381] __x64_sys_ioctl+0x18f/0x210
[ 792.561420] do_syscall_64+0xbf/0x420
[ 792.561446] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 792.561469] RIP: 0033:0x7f5a8d2b48d7
[ 792.561487] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 792.561507] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 792.561528] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 792.561543] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 792.561556] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 792.561569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 792.561582] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 792.561611]
[ 792.561739] FAT-fs (loop2): bogus number of reserved sectors
[ 792.581301] FAT-fs (loop7): unable to read boot sector
[ 792.589868] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 792.595877] FAT-fs (loop6): unable to read boot sector
07:39:04 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 32)
07:39:04 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 41)
07:39:04 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:04 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 58)
07:39:04 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 47)
07:39:04 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x506, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:04 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 34)
07:39:04 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0)
r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0)
r4 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r3, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r4, 0x0)
dup3(r4, r0, 0x0)
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x1f, 0x4, 0x7, 0x0, 0x0, 0x1cb, 0x20400, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x101, 0xe97}, 0x9810, 0x7ff, 0xfffffffa, 0x4, 0x1ff, 0x3, 0x401, 0x0, 0x7fffffff, 0x0, 0x1d}, 0xffffffffffffffff, 0xf, r2, 0x2)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 800.457113] FAULT_INJECTION: forcing a failure.
[ 800.457113] name failslab, interval 1, probability 0, space 0, times 0
[ 800.458065] CPU: 1 UID: 0 PID: 7732 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 800.458082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 800.458090] Call Trace:
[ 800.458095]
[ 800.458101] dump_stack_lvl+0xfa/0x120
[ 800.458124] should_fail_ex+0x4d7/0x5e0
[ 800.458149] ? jbd2__journal_start+0x193/0x820
[ 800.458168] should_failslab+0xc2/0x120
[ 800.458184] kmem_cache_alloc_noprof+0x80/0x760
[ 800.458203] ? lock_is_held_type+0x9e/0x120
[ 800.458218] ? jbd2__journal_start+0x193/0x820
[ 800.458235] jbd2__journal_start+0x193/0x820
[ 800.458256] __ext4_journal_start_sb+0x325/0x580
[ 800.458276] __ext4_new_inode+0x2c81/0x4cd0
[ 800.458299] ? __pfx___ext4_new_inode+0x10/0x10
[ 800.458315] ? __pfx_avc_has_perm+0x10/0x10
[ 800.458330] ? __pfx___dquot_initialize+0x10/0x10
[ 800.458356] ext4_mkdir+0x331/0xb30
[ 800.458379] ? __pfx_ext4_mkdir+0x10/0x10
[ 800.458397] ? security_inode_permission+0x72/0xe0
[ 800.458415] vfs_mkdir+0x6d8/0xc00
[ 800.458435] filename_mkdirat+0x118/0x430
[ 800.458451] ? __pfx_filename_mkdirat+0x10/0x10
[ 800.458465] ? strncpy_from_user+0x21b/0x2f0
[ 800.458485] __x64_sys_mkdir+0x6e/0xd0
[ 800.458498] do_syscall_64+0xbf/0x420
[ 800.458514] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 800.458527] RIP: 0033:0x7f775d7e2c27
[ 800.458537] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 800.458549] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 800.458562] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 800.458570] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 800.458578] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 800.458586] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 800.458594] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 800.458610]
[ 800.458618] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory
[ 800.478856] loop2: detected capacity change from 0 to 2
[ 800.487458] FAT-fs (loop4): unable to read boot sector
[ 800.489313] FAT-fs (loop2): bogus number of reserved sectors
[ 800.489793] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 800.498093] No source specified
[ 800.505216] FAULT_INJECTION: forcing a failure.
[ 800.505216] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 800.506957] CPU: 0 UID: 0 PID: 7737 Comm: syz-executor.3 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 800.506987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 800.507001] Call Trace:
[ 800.507010]
[ 800.507019] dump_stack_lvl+0xfa/0x120
[ 800.507051] should_fail_ex+0x4d7/0x5e0
[ 800.507093] _copy_to_user+0x32/0xd0
[ 800.507130] simple_read_from_buffer+0xe0/0x180
[ 800.507169] proc_fail_nth_read+0x18a/0x240
[ 800.507200] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 800.507229] ? security_file_permission+0x22/0x90
[ 800.507257] ? __pfx_proc_fail_nth_read+0x10/0x10
[ 800.507285] vfs_read+0x1eb/0xc70
[ 800.507322] ? __pfx___mutex_lock+0x10/0x10
[ 800.507344] ? __fget_files+0x34/0x3b0
[ 800.507366] ? __pfx_vfs_read+0x10/0x10
[ 800.507402] ? lock_release+0xc8/0x270
[ 800.507435] ? __fget_files+0x20d/0x3b0
[ 800.507467] ksys_read+0x121/0x240
[ 800.507487] ? __pfx_ksys_read+0x10/0x10
[ 800.507516] do_syscall_64+0xbf/0x420
[ 800.507543] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 800.507567] RIP: 0033:0x7f1e788ed69c
[ 800.507585] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 800.507607] RSP: 002b:00007f1e75eb0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 800.507630] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f1e788ed69c
[ 800.507645] RDX: 000000000000000f RSI: 00007f1e75eb01e0 RDI: 0000000000000004
[ 800.507659] RBP: 00007f1e75eb01d0 R08: 0000000000000000 R09: 0000000020000000
[ 800.507673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 800.507687] R13: 00007fffdc53e17f R14: 00007f1e75eb0300 R15: 0000000000022000
[ 800.507717]
07:39:04 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x507, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 800.546385] FAULT_INJECTION: forcing a failure.
[ 800.546385] name failslab, interval 1, probability 0, space 0, times 0
[ 800.548055] CPU: 0 UID: 0 PID: 7744 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 800.548083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 800.548096] Call Trace:
[ 800.548104]
[ 800.548113] dump_stack_lvl+0xfa/0x120
[ 800.548142] should_fail_ex+0x4d7/0x5e0
[ 800.548180] ? skb_clone+0x191/0x400
[ 800.548209] should_failslab+0xc2/0x120
[ 800.548235] kmem_cache_alloc_noprof+0x80/0x760
[ 800.548266] ? netlink_broadcast_filtered+0xe6/0xe90
[ 800.548306] ? skb_clone+0x191/0x400
[ 800.548333] skb_clone+0x191/0x400
[ 800.548366] netlink_broadcast_filtered+0xab1/0xe90
[ 800.548411] ? __pfx_netlink_broadcast_filtered+0x10/0x10
[ 800.548453] netlink_broadcast+0x39/0x50
[ 800.548485] kobject_uevent_env+0xa88/0xfd0
[ 800.548525] ? lock_is_held_type+0x9e/0x120
[ 800.548551] loop_configure+0xe3d/0x15a0
[ 800.548611] ? __pfx_loop_configure+0x10/0x10
[ 800.548662] ? avc_has_extended_perms+0x107/0xf20
[ 800.548690] ? find_held_lock+0x2b/0x80
[ 800.548726] ? avc_has_extended_perms+0x23b/0xf20
[ 800.548753] ? lock_release+0xc8/0x270
[ 800.548785] lo_ioctl+0x674/0x1cb0
[ 800.548819] ? perf_tp_event+0x807/0xe70
[ 800.548843] ? __pfx_lo_ioctl+0x10/0x10
[ 800.548873] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 800.548912] ? __pfx_perf_tp_event+0x10/0x10
[ 800.548933] ? __pfx_perf_trace_lock+0x10/0x10
[ 800.548967] ? find_held_lock+0x2b/0x80
[ 800.549004] ? perf_trace_lock+0xbb/0x4f0
[ 800.549033] ? __lock_acquire+0x451/0x2250
[ 800.549060] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 800.549097] ? blkdev_common_ioctl+0x1c3/0x2860
[ 800.549161] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 800.549196] ? __fget_files+0x34/0x3b0
[ 800.549218] ? find_held_lock+0x2b/0x80
[ 800.549253] ? __fget_files+0x203/0x3b0
[ 800.549278] ? __pfx_lo_ioctl+0x10/0x10
[ 800.549309] blkdev_ioctl+0x365/0x6d0
[ 800.549336] ? __pfx_blkdev_ioctl+0x10/0x10
[ 800.549366] ? selinux_file_ioctl+0xb9/0x280
[ 800.549403] ? __pfx_blkdev_ioctl+0x10/0x10
[ 800.549434] __x64_sys_ioctl+0x18f/0x210
[ 800.549470] do_syscall_64+0xbf/0x420
[ 800.549498] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 800.549520] RIP: 0033:0x7fb40288d8d7
[ 800.549538] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 800.549559] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 800.549581] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 800.549596] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 800.549610] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 800.549624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 800.549637] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 800.549671]
[ 800.597170] FAT-fs (loop7): unable to read boot sector
07:39:04 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 800.619319] loop2: detected capacity change from 0 to 2
07:39:04 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 59)
07:39:04 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 800.670566] FAT-fs (loop2): bogus number of reserved sectors
[ 800.671155] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 800.673792] FAT-fs (loop5): unable to read boot sector
[ 800.676658] FAT-fs (loop4): unable to read boot sector
[ 800.678310] FAT-fs (loop6): unable to read boot sector
[ 800.682301] FAT-fs (loop0): unable to read boot sector
[ 800.698194] FAT-fs (loop4): unable to read boot sector
07:39:04 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 35)
[ 800.710402] loop2: detected capacity change from 0 to 2
07:39:04 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 800.723098] FAULT_INJECTION: forcing a failure.
[ 800.723098] name failslab, interval 1, probability 0, space 0, times 0
[ 800.725062] CPU: 1 UID: 0 PID: 7755 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 800.725085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 800.725098] Call Trace:
[ 800.725105]
[ 800.725112] dump_stack_lvl+0xfa/0x120
[ 800.725142] should_fail_ex+0x4d7/0x5e0
[ 800.725177] ? kobject_uevent_env+0x23a/0xfd0
[ 800.725203] should_failslab+0xc2/0x120
[ 800.725228] __kmalloc_cache_noprof+0x80/0x730
[ 800.725263] ? set_capacity_and_notify+0xce/0x280
[ 800.725302] ? lock_release+0xc8/0x270
[ 800.725340] ? kobject_uevent_env+0x23a/0xfd0
[ 800.725379] kobject_uevent_env+0x23a/0xfd0
[ 800.725413] ? __pfx_dev_uevent_name+0x10/0x10
[ 800.725432] ? lock_is_held_type+0x9e/0x120
[ 800.725447] loop_configure+0xe3d/0x15a0
[ 800.725481] ? __pfx_loop_configure+0x10/0x10
[ 800.725508] ? avc_has_extended_perms+0x107/0xf20
[ 800.725524] ? find_held_lock+0x2b/0x80
[ 800.725543] ? avc_has_extended_perms+0x23b/0xf20
[ 800.725558] ? lock_release+0xc8/0x270
[ 800.725575] lo_ioctl+0x674/0x1cb0
[ 800.725595] ? __pfx_lo_ioctl+0x10/0x10
[ 800.725611] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 800.725626] ? __pfx_perf_trace_lock+0x10/0x10
[ 800.725646] ? lock_acquire+0x15e/0x2d0
[ 800.725660] ? __virt_addr_valid+0x1c6/0x5d0
[ 800.725677] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 800.725695] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 800.725711] ? lock_release+0xc8/0x270
[ 800.725726] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 800.725746] ? blkdev_common_ioctl+0x1c3/0x2860
[ 800.725783] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 800.725805] ? __fget_files+0x34/0x3b0
[ 800.725819] ? find_held_lock+0x2b/0x80
[ 800.725838] ? __fget_files+0x203/0x3b0
[ 800.725851] ? __pfx_lo_ioctl+0x10/0x10
[ 800.725868] blkdev_ioctl+0x365/0x6d0
[ 800.725884] ? __pfx_blkdev_ioctl+0x10/0x10
[ 800.725900] ? selinux_file_ioctl+0xb9/0x280
[ 800.725920] ? __pfx_blkdev_ioctl+0x10/0x10
[ 800.725937] __x64_sys_ioctl+0x18f/0x210
[ 800.725958] do_syscall_64+0xbf/0x420
[ 800.725974] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 800.725987] RIP: 0033:0x7f184d9088d7
[ 800.725998] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 800.726010] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 800.726022] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 800.726031] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 800.726039] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 800.726046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 800.726053] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 800.726071]
07:39:04 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 42)
07:39:04 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 33)
07:39:04 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x508, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:04 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 60)
[ 800.802561] FAT-fs (loop7): unable to read boot sector
[ 800.813213] FAT-fs (loop4): unable to read boot sector
[ 800.838687] No source specified
07:39:04 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 36)
[ 800.877454] FAT-fs (loop6): unable to read boot sector
[ 800.880950] FAT-fs (loop4): unable to read boot sector
[ 800.885497] FAULT_INJECTION: forcing a failure.
[ 800.885497] name failslab, interval 1, probability 0, space 0, times 0
[ 800.886446] CPU: 1 UID: 0 PID: 7765 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 800.886463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 800.886472] Call Trace:
[ 800.886479]
[ 800.886484] dump_stack_lvl+0xfa/0x120
[ 800.886506] should_fail_ex+0x4d7/0x5e0
[ 800.886530] should_failslab+0xc2/0x120
[ 800.886546] __kmalloc_noprof+0xd6/0x830
[ 800.886562] ? perf_trace_run_bpf_submit+0xef/0x180
[ 800.886578] ? ext4_find_extent+0x7f5/0xa00
[ 800.886600] ? ext4_find_extent+0x7f5/0xa00
[ 800.886616] ext4_find_extent+0x7f5/0xa00
[ 800.886636] ext4_ext_map_blocks+0x1cc/0x6050
[ 800.886656] ? lock_is_held_type+0x9e/0x120
[ 800.886674] ? bdev_getblk+0xd6/0x660
[ 800.886693] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 800.886712] ? crc32c+0x1ae/0x350
[ 800.886732] ? look_up_lock_class+0x56/0x130
[ 800.886752] ? register_lock_class+0x3f/0x790
[ 800.886772] ? __lock_acquire+0x451/0x2250
[ 800.886793] ? lock_acquire+0x15e/0x2d0
[ 800.886807] ? ext4_map_blocks+0x4a8/0x1470
[ 800.886823] ext4_map_query_blocks+0x110/0x900
[ 800.886843] ? __pfx_ext4_map_query_blocks+0x10/0x10
[ 800.886860] ? do_raw_read_unlock+0x44/0xe0
[ 800.886879] ? __pfx_down_read+0x10/0x10
[ 800.886897] ? ext4_es_lookup_extent+0xcd/0xb50
[ 800.886914] ext4_map_blocks+0x4bc/0x1470
[ 800.886930] ? __pfx_ext4_map_blocks+0x10/0x10
[ 800.886942] ? __pfx_ext4_initxattrs+0x10/0x10
[ 800.886961] ? __pfx_security_inode_init_security+0x10/0x10
[ 800.886979] ? _raw_spin_unlock+0x1e/0x40
[ 800.886996] ? insert_inode_locked+0x3fb/0x890
[ 800.887014] ? crc32c+0x1ae/0x350
[ 800.887030] ? __brelse+0x86/0xa0
[ 800.887041] ? __ext4_new_inode+0x116/0x4cd0
[ 800.887059] ext4_append+0x1af/0x530
[ 800.887075] ? __pfx_ext4_append+0x10/0x10
[ 800.887091] ? __pfx___ext4_new_inode+0x10/0x10
[ 800.887110] ext4_init_new_dir+0x13c/0x240
[ 800.887127] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 800.887149] ext4_mkdir+0x3c5/0xb30
[ 800.887169] ? __pfx_ext4_mkdir+0x10/0x10
[ 800.887186] ? security_inode_permission+0x72/0xe0
[ 800.887203] vfs_mkdir+0x6d8/0xc00
[ 800.887224] filename_mkdirat+0x118/0x430
[ 800.887240] ? __pfx_filename_mkdirat+0x10/0x10
[ 800.887254] ? strncpy_from_user+0x21b/0x2f0
[ 800.887275] __x64_sys_mkdir+0x6e/0xd0
[ 800.887288] do_syscall_64+0xbf/0x420
[ 800.887303] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 800.887317] RIP: 0033:0x7f775d7e2c27
[ 800.887327] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 800.887339] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 800.887352] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 800.887361] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 800.887368] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 800.887376] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 800.887383] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 800.887400]
[ 800.932208] FAT-fs (loop0): unable to read boot sector
07:39:04 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 800.953515] loop2: detected capacity change from 0 to 2
[ 800.993551] No source specified
[ 800.994570] No source specified
[ 801.012307] FAT-fs (loop2): bogus number of reserved sectors
[ 801.012872] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 801.044756] FAT-fs (loop7): unable to read boot sector
07:39:12 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 37)
07:39:12 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x12812}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0)
r1 = gettid()
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x7, 0x4, 0x0, 0x8, 0x0, 0x1, 0x200, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x6}, 0x200, 0x9, 0x4, 0x5, 0x5, 0xb1c, 0x5, 0x0, 0x1, 0x0, 0x80000001}, r1, 0x2, 0xffffffffffffffff, 0xb)
r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0x0, r0, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0)
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0xe1, 0x8, 0x8, 0x0, 0x2, 0x1000, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x1800, 0x80, 0x1ff, 0x6, 0x1, 0x6, 0x12f, 0x0, 0x8, 0x0, 0x100000000}, 0xffffffffffffffff, 0x9, r2, 0x1)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:39:12 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 61)
07:39:12 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 34)
07:39:12 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:12 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 43)
07:39:12 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x509, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:12 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 809.193797] No source specified
[ 809.194626] FAULT_INJECTION: forcing a failure.
[ 809.194626] name failslab, interval 1, probability 0, space 0, times 0
[ 809.196734] FAT-fs (loop5): unable to read boot sector
[ 809.197957] No source specified
[ 809.198351] CPU: 1 UID: 0 PID: 7786 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 809.198368] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 809.198376] Call Trace:
[ 809.198381]
[ 809.198386] dump_stack_lvl+0xfa/0x120
[ 809.198412] should_fail_ex+0x4d7/0x5e0
[ 809.198435] ? skb_clone+0x191/0x400
[ 809.198453] should_failslab+0xc2/0x120
[ 809.198468] kmem_cache_alloc_noprof+0x80/0x760
[ 809.198486] ? netlink_broadcast_filtered+0xe6/0xe90
[ 809.198508] ? skb_clone+0x191/0x400
[ 809.198522] skb_clone+0x191/0x400
[ 809.198539] netlink_broadcast_filtered+0xab1/0xe90
[ 809.198562] ? __pfx_netlink_broadcast_filtered+0x10/0x10
[ 809.198583] netlink_broadcast+0x39/0x50
[ 809.198600] kobject_uevent_env+0xa88/0xfd0
[ 809.198621] ? lock_is_held_type+0x9e/0x120
[ 809.198635] loop_configure+0xe3d/0x15a0
[ 809.198666] ? __pfx_loop_configure+0x10/0x10
[ 809.198691] ? avc_has_extended_perms+0x107/0xf20
[ 809.198707] ? find_held_lock+0x2b/0x80
[ 809.198728] ? avc_has_extended_perms+0x23b/0xf20
[ 809.198742] ? lock_release+0xc8/0x270
[ 809.198759] lo_ioctl+0x674/0x1cb0
[ 809.198779] ? __pfx_lo_ioctl+0x10/0x10
[ 809.198794] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 809.198813] ? lock_acquire+0x15e/0x2d0
[ 809.198827] ? __virt_addr_valid+0x1c6/0x5d0
[ 809.198842] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 809.198861] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 809.198876] ? lock_release+0xc8/0x270
[ 809.198890] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 809.198910] ? blkdev_common_ioctl+0x1c3/0x2860
[ 809.198942] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 809.198961] ? __fget_files+0x34/0x3b0
[ 809.198974] ? find_held_lock+0x2b/0x80
[ 809.198993] ? __fget_files+0x203/0x3b0
[ 809.199006] ? __pfx_lo_ioctl+0x10/0x10
[ 809.199022] blkdev_ioctl+0x365/0x6d0
[ 809.199038] ? __pfx_blkdev_ioctl+0x10/0x10
[ 809.199053] ? selinux_file_ioctl+0xb9/0x280
[ 809.199074] ? __pfx_blkdev_ioctl+0x10/0x10
[ 809.199090] __x64_sys_ioctl+0x18f/0x210
[ 809.199110] do_syscall_64+0xbf/0x420
[ 809.199125] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 809.199139] RIP: 0033:0x7fb40288d8d7
[ 809.199148] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 809.199160] RSP: 002b:00007fb3ffe02f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 809.199173] RAX: ffffffffffffffda RBX: 00007fb4028d7970 RCX: 00007fb40288d8d7
[ 809.199181] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 809.199189] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 809.199197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 809.199204] R13: 0000000000000005 R14: 0000000020000670 R15: 0000000000000002
[ 809.199220]
[ 809.224569] FAULT_INJECTION: forcing a failure.
[ 809.224569] name failslab, interval 1, probability 0, space 0, times 0
[ 809.225859] FAT-fs (loop0): unable to read boot sector
[ 809.226327] CPU: 0 UID: 0 PID: 7788 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 809.226358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 809.226372] Call Trace:
[ 809.226381]
[ 809.226390] dump_stack_lvl+0xfa/0x120
[ 809.226422] should_fail_ex+0x4d7/0x5e0
[ 809.226473] should_failslab+0xc2/0x120
[ 809.226509] __kmalloc_noprof+0xd6/0x830
[ 809.226538] ? __create_object+0x59/0x80
[ 809.226569] ? kobject_get_path+0xc8/0x200
[ 809.226603] ? kobject_get_path+0xc8/0x200
[ 809.226630] kobject_get_path+0xc8/0x200
[ 809.226659] ? kasan_save_track+0x14/0x30
[ 809.226687] kobject_uevent_env+0x260/0xfd0
[ 809.226725] ? lock_is_held_type+0x9e/0x120
[ 809.226751] loop_configure+0xe3d/0x15a0
[ 809.226806] ? __pfx_loop_configure+0x10/0x10
[ 809.226852] ? avc_has_extended_perms+0x107/0xf20
[ 809.226880] ? find_held_lock+0x2b/0x80
[ 809.226926] ? avc_has_extended_perms+0x23b/0xf20
[ 809.226952] ? lock_release+0xc8/0x270
[ 809.226983] lo_ioctl+0x674/0x1cb0
[ 809.227016] ? perf_tp_event+0x807/0xe70
[ 809.227039] ? __pfx_lo_ioctl+0x10/0x10
[ 809.227069] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 809.227099] ? __pfx_perf_tp_event+0x10/0x10
[ 809.227126] ? perf_trace_preemptirq_template+0x259/0x430
[ 809.227161] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 809.227192] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 809.227227] ? blkdev_common_ioctl+0x1c3/0x2860
[ 809.227286] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 809.227321] ? __fget_files+0x34/0x3b0
[ 809.227345] ? find_held_lock+0x2b/0x80
[ 809.227379] ? __fget_files+0x203/0x3b0
[ 809.227403] ? __pfx_lo_ioctl+0x10/0x10
[ 809.227433] blkdev_ioctl+0x365/0x6d0
[ 809.227471] ? __pfx_blkdev_ioctl+0x10/0x10
[ 809.227515] ? selinux_file_ioctl+0xb9/0x280
[ 809.227561] ? __pfx_blkdev_ioctl+0x10/0x10
[ 809.227591] __x64_sys_ioctl+0x18f/0x210
[ 809.227628] do_syscall_64+0xbf/0x420
[ 809.227655] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 809.227679] RIP: 0033:0x7f184d9088d7
[ 809.227697] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 809.227719] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 809.227741] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 809.227757] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 809.227770] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
07:39:13 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:13 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 62)
[ 809.227784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 809.227798] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 809.227827]
[ 809.234383] FAT-fs (loop7): unable to read boot sector
[ 809.235381] FAT-fs (loop4): unable to read boot sector
[ 809.285988] loop2: detected capacity change from 0 to 2
[ 809.291766] FAT-fs (loop6): unable to read boot sector
07:39:13 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 44)
[ 809.299415] FAT-fs (loop2): bogus number of reserved sectors
[ 809.300373] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 809.308214] FAULT_INJECTION: forcing a failure.
[ 809.308214] name failslab, interval 1, probability 0, space 0, times 0
[ 809.314486] loop2: detected capacity change from 0 to 2
[ 809.317957] CPU: 1 UID: 0 PID: 7793 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 809.317976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 809.317985] Call Trace:
[ 809.317990]
[ 809.317995] dump_stack_lvl+0xfa/0x120
[ 809.318017] should_fail_ex+0x4d7/0x5e0
[ 809.318040] should_failslab+0xc2/0x120
[ 809.318055] __kmalloc_noprof+0xd6/0x830
[ 809.318072] ? perf_trace_run_bpf_submit+0xef/0x180
[ 809.318087] ? perf_trace_lock_acquire+0xc8/0x580
[ 809.318105] ? ext4_find_extent+0x7f5/0xa00
[ 809.318127] ? ext4_find_extent+0x7f5/0xa00
[ 809.318143] ext4_find_extent+0x7f5/0xa00
[ 809.318163] ext4_ext_map_blocks+0x1cc/0x6050
[ 809.318184] ? lock_is_held_type+0x9e/0x120
[ 809.318203] ? bdev_getblk+0xd6/0x660
[ 809.318223] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 809.318240] ? perf_trace_lock_acquire+0xc8/0x580
[ 809.318257] ? crc32c+0x1ae/0x350
[ 809.318275] ? look_up_lock_class+0x56/0x130
[ 809.318295] ? perf_trace_lock_acquire+0xc8/0x580
[ 809.318311] ? register_lock_class+0x3f/0x790
[ 809.318331] ? __lock_acquire+0x451/0x2250
[ 809.318353] ? lock_acquire+0x15e/0x2d0
[ 809.318367] ? ext4_map_blocks+0x4a8/0x1470
[ 809.318384] ext4_map_query_blocks+0x110/0x900
[ 809.318405] ? __pfx_ext4_map_query_blocks+0x10/0x10
[ 809.318422] ? do_raw_read_unlock+0x44/0xe0
[ 809.318441] ? __pfx_down_read+0x10/0x10
[ 809.318455] ? ext4_es_lookup_extent+0xcd/0xb50
[ 809.318473] ext4_map_blocks+0x4bc/0x1470
[ 809.318490] ? __pfx_ext4_map_blocks+0x10/0x10
[ 809.318503] ? __pfx_ext4_initxattrs+0x10/0x10
[ 809.318522] ? __pfx_security_inode_init_security+0x10/0x10
[ 809.318540] ? _raw_spin_unlock+0x1e/0x40
[ 809.318557] ? insert_inode_locked+0x3fb/0x890
[ 809.318576] ? crc32c+0x1ae/0x350
[ 809.318592] ? __brelse+0x86/0xa0
[ 809.318604] ? __ext4_new_inode+0x116/0x4cd0
[ 809.318622] ext4_append+0x1af/0x530
[ 809.318639] ? __pfx_ext4_append+0x10/0x10
[ 809.318664] ? __pfx___ext4_new_inode+0x10/0x10
[ 809.318688] ext4_init_new_dir+0x13c/0x240
[ 809.318707] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 809.318735] ext4_mkdir+0x3c5/0xb30
[ 809.318760] ? __pfx_ext4_mkdir+0x10/0x10
[ 809.318778] ? security_inode_permission+0x72/0xe0
[ 809.318799] vfs_mkdir+0x6d8/0xc00
[ 809.318825] filename_mkdirat+0x118/0x430
[ 809.318844] ? __pfx_filename_mkdirat+0x10/0x10
[ 809.318859] ? strncpy_from_user+0x21b/0x2f0
[ 809.318890] __x64_sys_mkdir+0x6e/0xd0
[ 809.318905] do_syscall_64+0xbf/0x420
[ 809.318922] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 809.318936] RIP: 0033:0x7f775d7e2c27
[ 809.318947] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 809.318959] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 809.318972] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 809.318980] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 809.318988] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 809.318995] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 809.319003] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 809.319029]
07:39:13 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x27, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:13 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x50a, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:13 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 35)
[ 809.417284] FAT-fs (loop0): unable to read boot sector
[ 809.423653] FAT-fs (loop4): unable to read boot sector
[ 809.425249] No source specified
[ 809.508146] loop2: detected capacity change from 0 to 2
[ 809.511796] FAULT_INJECTION: forcing a failure.
[ 809.511796] name failslab, interval 1, probability 0, space 0, times 0
[ 809.512932] CPU: 1 UID: 0 PID: 7806 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 809.512950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 809.512959] Call Trace:
[ 809.512964]
[ 809.512969] dump_stack_lvl+0xfa/0x120
[ 809.512990] should_fail_ex+0x4d7/0x5e0
[ 809.513021] ? kobject_uevent_env+0x23a/0xfd0
[ 809.513039] should_failslab+0xc2/0x120
[ 809.513054] __kmalloc_cache_noprof+0x80/0x730
[ 809.513071] ? set_capacity_and_notify+0xce/0x280
[ 809.513089] ? lock_release+0xc8/0x270
[ 809.513109] ? kobject_uevent_env+0x23a/0xfd0
[ 809.513126] kobject_uevent_env+0x23a/0xfd0
[ 809.513144] ? __pfx_dev_uevent_name+0x10/0x10
[ 809.513161] ? lock_is_held_type+0x9e/0x120
[ 809.513175] loop_configure+0xe3d/0x15a0
[ 809.513206] ? __pfx_loop_configure+0x10/0x10
[ 809.513230] ? avc_has_extended_perms+0x107/0xf20
[ 809.513247] ? find_held_lock+0x2b/0x80
[ 809.513266] ? avc_has_extended_perms+0x23b/0xf20
[ 809.513280] ? lock_release+0xc8/0x270
[ 809.513296] lo_ioctl+0x674/0x1cb0
[ 809.513316] ? __pfx_lo_ioctl+0x10/0x10
[ 809.513331] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 809.513350] ? lock_acquire+0x15e/0x2d0
[ 809.513364] ? __virt_addr_valid+0x1c6/0x5d0
[ 809.513379] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 809.513397] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 809.513413] ? lock_release+0xc8/0x270
[ 809.513432] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 809.513451] ? blkdev_common_ioctl+0x1c3/0x2860
[ 809.513482] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 809.513500] ? __fget_files+0x34/0x3b0
[ 809.513514] ? find_held_lock+0x2b/0x80
[ 809.513532] ? __fget_files+0x203/0x3b0
[ 809.513545] ? __pfx_lo_ioctl+0x10/0x10
[ 809.513561] blkdev_ioctl+0x365/0x6d0
[ 809.513576] ? __pfx_blkdev_ioctl+0x10/0x10
[ 809.513591] ? selinux_file_ioctl+0xb9/0x280
[ 809.513611] ? __pfx_blkdev_ioctl+0x10/0x10
[ 809.513627] __x64_sys_ioctl+0x18f/0x210
[ 809.513648] do_syscall_64+0xbf/0x420
[ 809.513662] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 809.513675] RIP: 0033:0x7f5a8d2b48d7
[ 809.513685] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 809.513697] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 809.513709] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 809.513717] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 809.513725] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 809.513732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 809.513740] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 809.513755]
[ 809.521008] FAT-fs (loop2): bogus number of reserved sectors
[ 809.523196] FAT-fs (loop6): unable to read boot sector
[ 809.530286] FAT-fs (loop2): Can't find a valid FAT filesystem
07:39:21 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 63)
07:39:21 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:21 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 38)
07:39:21 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x600, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:21 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, r1, 0x70b, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0)
sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000145}, 0x20004804)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x24, r3, 0x70b, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0)
sendmsg$NL80211_CMD_JOIN_OCB(r2, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x7, 0x3c}}}}, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x56b}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7fff}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x31}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x310}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1f3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x4008800)
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:39:21 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:21 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 36)
07:39:21 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 45)
[ 817.901472] FAT-fs (loop7): unable to read boot sector
[ 817.906582] FAT-fs (loop5): unable to read boot sector
[ 817.907172] FAULT_INJECTION: forcing a failure.
[ 817.907172] name failslab, interval 1, probability 0, space 0, times 0
[ 817.908088] CPU: 1 UID: 0 PID: 7819 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 817.908104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 817.908113] Call Trace:
[ 817.908118]
[ 817.908123] dump_stack_lvl+0xfa/0x120
[ 817.908151] should_fail_ex+0x4d7/0x5e0
[ 817.908177] ? do_getname+0x2b/0x3d0
[ 817.908193] should_failslab+0xc2/0x120
[ 817.908208] kmem_cache_alloc_noprof+0x80/0x760
[ 817.908227] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 817.908248] ? do_getname+0x2b/0x3d0
[ 817.908263] do_getname+0x2b/0x3d0
[ 817.908279] __x64_sys_mkdir+0x5a/0xd0
[ 817.908294] do_syscall_64+0xbf/0x420
[ 817.908309] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 817.908324] RIP: 0033:0x7fb40288cc27
[ 817.908334] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 817.908346] RSP: 002b:00007fb3ffe02fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 817.908357] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288cc27
[ 817.908366] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 817.908373] RBP: 00007fb3ffe03040 R08: 0000000000000000 R09: ffffffffffffffff
[ 817.908381] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 817.908389] R13: 0000000020000040 R14: 00007fb3ffe03000 R15: 0000000020000080
[ 817.908405]
[ 817.921658] loop2: detected capacity change from 0 to 3
[ 817.928329] No source specified
[ 817.935419] FAT-fs (loop2): bogus number of reserved sectors
[ 817.936406] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 817.939809] FAT-fs (loop4): unable to read boot sector
07:39:21 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 64)
07:39:21 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 46)
[ 817.974820] FAT-fs (loop6): unable to read boot sector
[ 817.974825] loop2: detected capacity change from 0 to 3
[ 817.983011] FAT-fs (loop0): unable to read boot sector
[ 817.992453] FAT-fs (loop4): unable to read boot sector
[ 818.027506] FAULT_INJECTION: forcing a failure.
[ 818.027506] name failslab, interval 1, probability 0, space 0, times 0
[ 818.029267] CPU: 0 UID: 0 PID: 7829 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 818.029299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 818.029314] Call Trace:
[ 818.029322]
[ 818.029332] dump_stack_lvl+0xfa/0x120
[ 818.029366] should_fail_ex+0x4d7/0x5e0
[ 818.029410] should_failslab+0xc2/0x120
[ 818.029438] __kmalloc_noprof+0xd6/0x830
[ 818.029469] ? mark_held_locks+0x49/0x80
[ 818.029501] ? ext4_find_extent+0x7f5/0xa00
[ 818.029534] ? lockdep_hardirqs_on_prepare+0xdb/0x190
[ 818.029570] ? ext4_find_extent+0x7f5/0xa00
[ 818.029601] ext4_find_extent+0x7f5/0xa00
[ 818.029641] ext4_ext_map_blocks+0x1cc/0x6050
[ 818.029697] ? bdev_getblk+0xd6/0x660
[ 818.029729] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 818.029763] ? __lock_acquire+0x451/0x2250
[ 818.029797] ? crc32c+0x1ae/0x350
[ 818.029832] ? lock_acquire+0x15e/0x2d0
[ 818.029861] ? ext4_map_blocks+0x564/0x1470
[ 818.029904] ? down_write+0x119/0x1f0
[ 818.029931] ? __pfx_down_write+0x10/0x10
[ 818.029967] ext4_map_blocks+0x62d/0x1470
[ 818.029995] ? __up_read+0x26f/0x710
[ 818.030029] ? __pfx_ext4_map_blocks+0x10/0x10
[ 818.030053] ? __pfx___up_read+0x10/0x10
[ 818.030087] ? lock_release+0xc8/0x270
[ 818.030123] ? ext4_map_blocks+0x1e9/0x1470
[ 818.030155] ext4_getblk+0x67d/0x8e0
[ 818.030181] ? __pfx_ext4_getblk+0x10/0x10
[ 818.030204] ? __pfx_security_inode_init_security+0x10/0x10
[ 818.030243] ? crc32c+0x1ae/0x350
07:39:21 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x4f70dd1c39e3207c, 0x80, 0x6, 0x2, 0x7, 0xfc, 0x0, 0x6, 0x46208, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xc5, 0x0, @perf_config_ext={0x2, 0x8}, 0x40400, 0x3, 0x1, 0x0, 0x3, 0xc0000000, 0x8, 0x0, 0x7f, 0x0, 0x400}, 0xffffffffffffffff, 0x3, r0, 0x2)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x2)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x7f, 0x80, 0x40, 0x0, 0x1, 0x10000, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101, 0xd, @perf_config_ext={0x80000000, 0x3f}, 0x41408, 0x1000, 0x8, 0x6, 0x8db, 0x6, 0x6, 0x0, 0x6, 0x0, 0xff}, 0x0, 0x6, r1, 0x2)
[ 818.030280] ext4_bread+0x2e/0x1a0
[ 818.030306] ext4_append+0x21d/0x530
[ 818.030338] ? __pfx_ext4_append+0x10/0x10
[ 818.030368] ? __pfx___ext4_new_inode+0x10/0x10
[ 818.030407] ext4_init_new_dir+0x13c/0x240
[ 818.030441] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 818.030485] ext4_mkdir+0x3c5/0xb30
[ 818.030525] ? __pfx_ext4_mkdir+0x10/0x10
[ 818.030558] ? security_inode_permission+0x72/0xe0
[ 818.030591] vfs_mkdir+0x6d8/0xc00
[ 818.030632] filename_mkdirat+0x118/0x430
[ 818.030662] ? __pfx_filename_mkdirat+0x10/0x10
[ 818.030690] ? strncpy_from_user+0x21b/0x2f0
[ 818.030731] __x64_sys_mkdir+0x6e/0xd0
[ 818.030758] do_syscall_64+0xbf/0x420
[ 818.030787] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 818.030813] RIP: 0033:0x7f775d7e2c27
[ 818.030832] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 818.030855] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 818.030878] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 818.030895] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 818.030910] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 818.030926] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 818.030941] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 818.030974]
07:39:21 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 37)
07:39:21 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 47)
[ 818.087147] FAULT_INJECTION: forcing a failure.
[ 818.087147] name failslab, interval 1, probability 0, space 0, times 0
[ 818.091602] CPU: 1 UID: 0 PID: 7834 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 818.091619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 818.091626] Call Trace:
[ 818.091630]
[ 818.091635] dump_stack_lvl+0xfa/0x120
[ 818.091655] should_fail_ex+0x4d7/0x5e0
[ 818.091686] should_failslab+0xc2/0x120
[ 818.091701] __kmalloc_noprof+0xd6/0x830
[ 818.091717] ? __create_object+0x59/0x80
[ 818.091735] ? kobject_get_path+0xc8/0x200
[ 818.091754] ? kobject_get_path+0xc8/0x200
[ 818.091769] kobject_get_path+0xc8/0x200
[ 818.091784] ? kasan_save_track+0x14/0x30
[ 818.091801] kobject_uevent_env+0x260/0xfd0
[ 818.091822] ? lock_is_held_type+0x9e/0x120
[ 818.091837] loop_configure+0xe3d/0x15a0
[ 818.091871] ? __pfx_loop_configure+0x10/0x10
[ 818.091903] ? avc_has_extended_perms+0x107/0xf20
[ 818.091920] ? find_held_lock+0x2b/0x80
[ 818.091940] ? avc_has_extended_perms+0x23b/0xf20
[ 818.091954] ? lock_release+0xc8/0x270
[ 818.091972] lo_ioctl+0x674/0x1cb0
[ 818.091992] ? __pfx_lo_ioctl+0x10/0x10
[ 818.092008] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 818.092024] ? __pfx_perf_trace_lock+0x10/0x10
[ 818.092042] ? lock_acquire+0x15e/0x2d0
[ 818.092068] ? __virt_addr_valid+0x1c6/0x5d0
[ 818.092084] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 818.092102] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 818.092118] ? lock_release+0xc8/0x270
[ 818.092132] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 818.092153] ? blkdev_common_ioctl+0x1c3/0x2860
[ 818.092188] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 818.092207] ? __fget_files+0x34/0x3b0
[ 818.092221] ? find_held_lock+0x2b/0x80
[ 818.092240] ? __fget_files+0x203/0x3b0
[ 818.092253] ? __pfx_lo_ioctl+0x10/0x10
[ 818.092270] blkdev_ioctl+0x365/0x6d0
[ 818.092285] ? __pfx_blkdev_ioctl+0x10/0x10
[ 818.092301] ? selinux_file_ioctl+0xb9/0x280
[ 818.092322] ? __pfx_blkdev_ioctl+0x10/0x10
[ 818.092338] __x64_sys_ioctl+0x18f/0x210
[ 818.092359] do_syscall_64+0xbf/0x420
[ 818.092374] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 818.092388] RIP: 0033:0x7f5a8d2b48d7
[ 818.092397] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 818.092410] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 818.092423] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 818.092431] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 818.092439] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 818.092447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 818.092454] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 818.092472]
[ 818.113957] FAULT_INJECTION: forcing a failure.
[ 818.113957] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 818.114851] CPU: 1 UID: 0 PID: 7835 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 818.114866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 818.114873] Call Trace:
[ 818.114877]
[ 818.114881] dump_stack_lvl+0xfa/0x120
[ 818.114900] should_fail_ex+0x4d7/0x5e0
[ 818.114920] strncpy_from_user+0x3b/0x2f0
[ 818.114939] do_getname+0x70/0x3d0
[ 818.114956] __x64_sys_mkdir+0x5a/0xd0
[ 818.114970] do_syscall_64+0xbf/0x420
[ 818.114984] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 818.114997] RIP: 0033:0x7fb40288cc27
[ 818.115007] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 818.115018] RSP: 002b:00007fb3ffe02fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 818.115029] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288cc27
[ 818.115037] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 818.115045] RBP: 00007fb3ffe03040 R08: 0000000000000000 R09: ffffffffffffffff
[ 818.115053] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 818.115060] R13: 0000000020000040 R14: 00007fb3ffe03000 R15: 0000000020000080
[ 818.115078]
[ 818.164469] FAT-fs (loop6): unable to read boot sector
[ 818.198886] FAULT_INJECTION: forcing a failure.
[ 818.198886] name failslab, interval 1, probability 0, space 0, times 0
[ 818.199842] CPU: 1 UID: 0 PID: 7840 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 818.199859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 818.199868] Call Trace:
[ 818.199872]
[ 818.199878] dump_stack_lvl+0xfa/0x120
[ 818.199901] should_fail_ex+0x4d7/0x5e0
[ 818.199923] ? kobject_uevent_env+0x23a/0xfd0
[ 818.199941] should_failslab+0xc2/0x120
[ 818.199956] __kmalloc_cache_noprof+0x80/0x730
[ 818.199974] ? set_capacity_and_notify+0xce/0x280
[ 818.199992] ? lock_release+0xc8/0x270
[ 818.200011] ? kobject_uevent_env+0x23a/0xfd0
[ 818.200029] kobject_uevent_env+0x23a/0xfd0
[ 818.200046] ? __pfx_dev_uevent_name+0x10/0x10
[ 818.200072] ? lock_is_held_type+0x9e/0x120
[ 818.200086] loop_configure+0xe3d/0x15a0
[ 818.200117] ? __pfx_loop_configure+0x10/0x10
[ 818.200141] ? avc_has_extended_perms+0x107/0xf20
[ 818.200157] ? find_held_lock+0x2b/0x80
[ 818.200177] ? avc_has_extended_perms+0x23b/0xf20
[ 818.200191] ? lock_release+0xc8/0x270
[ 818.200207] lo_ioctl+0x674/0x1cb0
[ 818.200225] ? __pfx_visit_groups_merge.constprop.0.isra.0+0x10/0x10
[ 818.200245] ? __pfx_lo_ioctl+0x10/0x10
[ 818.200261] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 818.200275] ? __lock_acquire+0x451/0x2250
[ 818.200291] ? __pmu_ctx_sched_in+0xb5/0x1b0
[ 818.200307] ? __pfx___pmu_ctx_sched_in+0x10/0x10
[ 818.200323] ? kvm_sched_clock_read+0x16/0x30
[ 818.200343] ? find_held_lock+0x2b/0x80
[ 818.200364] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 818.200383] ? blkdev_common_ioctl+0x1c3/0x2860
[ 818.200414] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 818.200433] ? __fget_files+0x34/0x3b0
[ 818.200447] ? find_held_lock+0x2b/0x80
[ 818.200465] ? __fget_files+0x203/0x3b0
[ 818.200478] ? __pfx_lo_ioctl+0x10/0x10
[ 818.200495] blkdev_ioctl+0x365/0x6d0
[ 818.200509] ? __pfx_blkdev_ioctl+0x10/0x10
[ 818.200525] ? selinux_file_ioctl+0xb9/0x280
[ 818.200545] ? __pfx_blkdev_ioctl+0x10/0x10
[ 818.200561] __x64_sys_ioctl+0x18f/0x210
[ 818.200581] do_syscall_64+0xbf/0x420
[ 818.200596] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 818.200609] RIP: 0033:0x7f184d9088d7
[ 818.200619] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 818.200631] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 818.200644] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 818.200652] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 818.200660] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 818.200667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 818.200675] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 818.200690]
[ 818.210951] No source specified
[ 818.213631] FAT-fs (loop5): unable to read boot sector
07:39:21 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 65)
07:39:21 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 39)
07:39:21 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 818.227839] FAT-fs (loop7): unable to read boot sector
[ 818.249247] No source specified
07:39:30 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 66)
07:39:30 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf5, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:30 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 40)
07:39:30 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 38)
07:39:30 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x605, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:30 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 48)
07:39:30 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x50, 0x4, 0x4, 0x9, 0x0, 0x3, 0x0, 0xd, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfe, 0x1, @perf_config_ext={0x8, 0x8}, 0x1020, 0x6, 0xffffffff, 0x3, 0x3ff, 0x1, 0x8001, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r0, 0x9)
07:39:30 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 826.734452] FAT-fs (loop6): unable to read boot sector
[ 826.735239] FAT-fs (loop4): unable to read boot sector
[ 826.737461] FAT-fs (loop7): unable to read boot sector
[ 826.755489] FAULT_INJECTION: forcing a failure.
[ 826.755489] name failslab, interval 1, probability 0, space 0, times 0
[ 826.756452] CPU: 1 UID: 0 PID: 7860 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 826.756468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 826.756477] Call Trace:
[ 826.756482]
[ 826.756487] dump_stack_lvl+0xfa/0x120
[ 826.756507] should_fail_ex+0x4d7/0x5e0
[ 826.756531] ? __es_insert_extent+0xed2/0x1370
[ 826.756551] should_failslab+0xc2/0x120
[ 826.756566] kmem_cache_alloc_noprof+0x80/0x760
[ 826.756589] ? __es_insert_extent+0xed2/0x1370
[ 826.756607] __es_insert_extent+0xed2/0x1370
[ 826.756627] ? __pfx_do_raw_write_lock+0x10/0x10
[ 826.756649] ? __es_tree_search.isra.0+0x1af/0x220
[ 826.756670] ext4_es_cache_extent+0x387/0x6f0
[ 826.756690] ? kasan_save_track+0x14/0x30
[ 826.756705] ? __pfx_ext4_es_cache_extent+0x10/0x10
[ 826.756725] ? lock_acquire+0x15e/0x2d0
[ 826.756740] ? ext4_es_find_extent_range+0x1b3/0x4b0
[ 826.756759] ? find_held_lock+0x2b/0x80
[ 826.756778] ? ext4_es_find_extent_range+0x1cf/0x4b0
[ 826.756797] ? lock_release+0xc8/0x270
[ 826.756813] ? do_raw_read_unlock+0x44/0xe0
[ 826.756834] ext4_ext_map_blocks+0x1714/0x6050
[ 826.756862] ? bdev_getblk+0xd6/0x660
[ 826.756880] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 826.756904] ? crc32c+0x1ae/0x350
[ 826.756921] ? look_up_lock_class+0x56/0x130
[ 826.756942] ? register_lock_class+0x3f/0x790
[ 826.756967] ? lock_acquire+0x15e/0x2d0
[ 826.756981] ? ext4_map_blocks+0x4a8/0x1470
[ 826.756997] ext4_map_query_blocks+0x110/0x900
[ 826.757017] ? __pfx_ext4_map_query_blocks+0x10/0x10
[ 826.757034] ? do_raw_read_unlock+0x44/0xe0
[ 826.757052] ? __pfx_down_read+0x10/0x10
[ 826.757065] ? ext4_es_lookup_extent+0xcd/0xb50
[ 826.757081] ext4_map_blocks+0x4bc/0x1470
[ 826.757097] ? __pfx_ext4_map_blocks+0x10/0x10
[ 826.757109] ? __pfx_ext4_initxattrs+0x10/0x10
[ 826.757129] ? __pfx_security_inode_init_security+0x10/0x10
[ 826.757146] ? _raw_spin_unlock+0x1e/0x40
[ 826.757163] ? insert_inode_locked+0x3fb/0x890
[ 826.757182] ? crc32c+0x1ae/0x350
[ 826.757198] ? __brelse+0x86/0xa0
[ 826.757209] ? __ext4_new_inode+0x116/0x4cd0
[ 826.757226] ext4_append+0x1af/0x530
[ 826.757243] ? __pfx_ext4_append+0x10/0x10
[ 826.757259] ? __pfx___ext4_new_inode+0x10/0x10
[ 826.757278] ext4_init_new_dir+0x13c/0x240
[ 826.757295] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 826.757317] ext4_mkdir+0x3c5/0xb30
[ 826.757337] ? __pfx_ext4_mkdir+0x10/0x10
[ 826.757354] ? security_inode_permission+0x72/0xe0
[ 826.757371] vfs_mkdir+0x6d8/0xc00
[ 826.757392] filename_mkdirat+0x118/0x430
[ 826.757408] ? __pfx_filename_mkdirat+0x10/0x10
[ 826.757422] ? strncpy_from_user+0x21b/0x2f0
[ 826.757443] __x64_sys_mkdir+0x6e/0xd0
[ 826.757456] do_syscall_64+0xbf/0x420
[ 826.757471] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 826.757484] RIP: 0033:0x7f775d7e2c27
[ 826.757495] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 826.757507] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 826.757519] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 826.757528] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 826.757536] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 826.757543] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 826.757551] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 826.757568]
[ 826.787188] FAULT_INJECTION: forcing a failure.
[ 826.787188] name failslab, interval 1, probability 0, space 0, times 0
[ 826.788501] loop2: detected capacity change from 0 to 3
[ 826.788999] CPU: 0 UID: 0 PID: 7861 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 826.789031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 826.789046] Call Trace:
[ 826.789054]
[ 826.789063] dump_stack_lvl+0xfa/0x120
[ 826.789095] should_fail_ex+0x4d7/0x5e0
[ 826.789135] ? ext4_alloc_inode+0x28/0x640
[ 826.789167] should_failslab+0xc2/0x120
[ 826.789194] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 826.789236] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 826.789271] ? ext4_alloc_inode+0x28/0x640
[ 826.789302] ext4_alloc_inode+0x28/0x640
[ 826.789335] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 826.789366] alloc_inode+0x67/0x250
[ 826.789399] new_inode+0x1e/0x160
[ 826.789433] __ext4_new_inode+0x35d/0x4cd0
[ 826.789470] ? avc_has_perm_noaudit+0x141/0x390
07:39:30 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfe, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 826.789504] ? __pfx___ext4_new_inode+0x10/0x10
[ 826.789534] ? __pfx_avc_has_perm+0x10/0x10
[ 826.789561] ? __pfx___dquot_initialize+0x10/0x10
[ 826.789611] ext4_mkdir+0x331/0xb30
[ 826.789655] ? __pfx_ext4_mkdir+0x10/0x10
[ 826.789687] ? security_inode_permission+0x72/0xe0
[ 826.789719] vfs_mkdir+0x6d8/0xc00
[ 826.789759] filename_mkdirat+0x118/0x430
[ 826.789788] ? __pfx_filename_mkdirat+0x10/0x10
[ 826.789816] ? strncpy_from_user+0x21b/0x2f0
[ 826.789856] __x64_sys_mkdir+0x6e/0xd0
[ 826.789882] do_syscall_64+0xbf/0x420
[ 826.789918] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 826.789943] RIP: 0033:0x7fb40288cc27
[ 826.789963] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 826.789985] RSP: 002b:00007fb3ffe02fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 826.790009] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288cc27
[ 826.790025] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 826.790040] RBP: 00007fb3ffe03040 R08: 0000000000000000 R09: ffffffffffffffff
[ 826.790055] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 826.790070] R13: 0000000020000040 R14: 00007fb3ffe03000 R15: 0000000020000080
[ 826.790103]
[ 826.791416] No source specified
[ 826.813599] FAT-fs (loop2): bogus number of reserved sectors
[ 826.833011] FAT-fs (loop5): unable to read boot sector
[ 826.834958] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 826.855790] No source specified
[ 826.859677] FAT-fs (loop4): unable to read boot sector
07:39:39 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 67)
07:39:39 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 41)
07:39:39 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x2, 0x6)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:39:39 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:39 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 49)
07:39:39 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x630, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:39 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x112, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:39 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 39)
[ 836.086958] FAULT_INJECTION: forcing a failure.
[ 836.086958] name failslab, interval 1, probability 0, space 0, times 0
[ 836.087885] CPU: 1 UID: 0 PID: 7880 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 836.087904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 836.087912] Call Trace:
[ 836.087917]
[ 836.087922] dump_stack_lvl+0xfa/0x120
[ 836.087942] should_fail_ex+0x4d7/0x5e0
[ 836.087964] ? kobject_uevent_env+0x23a/0xfd0
[ 836.087982] should_failslab+0xc2/0x120
[ 836.087997] __kmalloc_cache_noprof+0x80/0x730
[ 836.088014] ? set_capacity_and_notify+0xce/0x280
[ 836.088032] ? lock_release+0xc8/0x270
[ 836.088051] ? kobject_uevent_env+0x23a/0xfd0
[ 836.088068] kobject_uevent_env+0x23a/0xfd0
[ 836.088086] ? __pfx_dev_uevent_name+0x10/0x10
[ 836.088103] ? lock_is_held_type+0x9e/0x120
[ 836.088117] loop_configure+0xe3d/0x15a0
[ 836.088147] ? __pfx_loop_configure+0x10/0x10
[ 836.088172] ? avc_has_extended_perms+0x107/0xf20
[ 836.088188] ? find_held_lock+0x2b/0x80
[ 836.088207] ? avc_has_extended_perms+0x23b/0xf20
[ 836.088221] ? lock_release+0xc8/0x270
[ 836.088238] lo_ioctl+0x674/0x1cb0
[ 836.088268] ? __pfx_lo_ioctl+0x10/0x10
[ 836.088284] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 836.088303] ? lock_acquire+0x15e/0x2d0
[ 836.088317] ? __virt_addr_valid+0x1c6/0x5d0
[ 836.088332] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 836.088350] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 836.088365] ? lock_release+0xc8/0x270
[ 836.088379] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 836.088399] ? blkdev_common_ioctl+0x1c3/0x2860
[ 836.088430] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 836.088449] ? __fget_files+0x34/0x3b0
[ 836.088463] ? find_held_lock+0x2b/0x80
[ 836.088481] ? __fget_files+0x203/0x3b0
[ 836.088494] ? __pfx_lo_ioctl+0x10/0x10
[ 836.088510] blkdev_ioctl+0x365/0x6d0
[ 836.088525] ? __pfx_blkdev_ioctl+0x10/0x10
[ 836.088541] ? selinux_file_ioctl+0xb9/0x280
[ 836.088561] ? __pfx_blkdev_ioctl+0x10/0x10
[ 836.088577] __x64_sys_ioctl+0x18f/0x210
[ 836.088597] do_syscall_64+0xbf/0x420
[ 836.088612] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 836.088626] RIP: 0033:0x7f184d9088d7
[ 836.088636] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 836.088648] RSP: 002b:00007f184ae7df48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 836.088660] RAX: ffffffffffffffda RBX: 00007f184d952970 RCX: 00007f184d9088d7
[ 836.088669] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 836.088676] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 836.088684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 836.088692] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 836.088707]
[ 836.117783] FAT-fs (loop5): unable to read boot sector
[ 836.120383] FAT-fs (loop4): unable to read boot sector
[ 836.133758] FAT-fs (loop0): unable to read boot sector
[ 836.135602] FAT-fs (loop6): unable to read boot sector
[ 836.137399] FAT-fs (loop7): unable to read boot sector
[ 836.142540] No source specified
[ 836.152115] No source specified
[ 836.161987] loop2: detected capacity change from 0 to 3
[ 836.172984] FAT-fs (loop2): bogus number of reserved sectors
07:39:39 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 68)
[ 836.184061] FAT-fs (loop2): Can't find a valid FAT filesystem
07:39:40 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1d1, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:40 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 42)
[ 836.220560] loop2: detected capacity change from 0 to 3
[ 836.239840] FAT-fs (loop4): unable to read boot sector
07:39:40 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:40 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 836.253478] FAULT_INJECTION: forcing a failure.
[ 836.253478] name failslab, interval 1, probability 0, space 0, times 0
[ 836.254422] CPU: 1 UID: 0 PID: 7898 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 836.254438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 836.254449] Call Trace:
[ 836.254454]
[ 836.254459] dump_stack_lvl+0xfa/0x120
[ 836.254480] should_fail_ex+0x4d7/0x5e0
[ 836.254504] ? ext4_mb_new_blocks+0x64e/0x44b0
[ 836.254518] should_failslab+0xc2/0x120
[ 836.254533] kmem_cache_alloc_noprof+0x80/0x760
[ 836.254557] ? ext4_mb_new_blocks+0x64e/0x44b0
[ 836.254569] ext4_mb_new_blocks+0x64e/0x44b0
[ 836.254588] ? __kasan_kmalloc+0x7f/0x90
[ 836.254603] ? __kmalloc_noprof+0x4b0/0x830
[ 836.254618] ? mark_held_locks+0x49/0x80
[ 836.254635] ? ext4_find_extent+0x7f5/0xa00
[ 836.254653] ? __pfx_ext4_mb_new_blocks+0x10/0x10
[ 836.254667] ? ext4_ext_search_right+0x2e8/0xbd0
[ 836.254682] ? ext4_inode_to_goal_block+0x323/0x430
[ 836.254700] ext4_ext_map_blocks+0x1bd2/0x6050
[ 836.254729] ? bdev_getblk+0xd6/0x660
[ 836.254746] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 836.254763] ? __lock_acquire+0x451/0x2250
[ 836.254780] ? crc32c+0x1ae/0x350
[ 836.254798] ? lock_acquire+0x15e/0x2d0
[ 836.254813] ? ext4_map_blocks+0x564/0x1470
[ 836.254833] ? __pfx_down_write+0x10/0x10
[ 836.254852] ext4_map_blocks+0x62d/0x1470
[ 836.254866] ? __up_read+0x26f/0x710
[ 836.254884] ? __pfx_ext4_map_blocks+0x10/0x10
[ 836.254895] ? __pfx___up_read+0x10/0x10
[ 836.254913] ? lock_release+0xc8/0x270
[ 836.254930] ? ext4_map_blocks+0x1e9/0x1470
[ 836.254946] ext4_getblk+0x67d/0x8e0
[ 836.254959] ? __pfx_ext4_getblk+0x10/0x10
[ 836.254971] ? __pfx_security_inode_init_security+0x10/0x10
[ 836.254992] ? crc32c+0x1ae/0x350
[ 836.255011] ext4_bread+0x2e/0x1a0
[ 836.255023] ext4_append+0x21d/0x530
[ 836.255039] ? __pfx_ext4_append+0x10/0x10
[ 836.255055] ? __pfx___ext4_new_inode+0x10/0x10
[ 836.255074] ext4_init_new_dir+0x13c/0x240
[ 836.255092] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 836.255114] ext4_mkdir+0x3c5/0xb30
[ 836.255134] ? __pfx_ext4_mkdir+0x10/0x10
[ 836.255151] ? security_inode_permission+0x72/0xe0
[ 836.255168] vfs_mkdir+0x6d8/0xc00
[ 836.255189] filename_mkdirat+0x118/0x430
[ 836.255205] ? __pfx_filename_mkdirat+0x10/0x10
[ 836.255219] ? strncpy_from_user+0x21b/0x2f0
[ 836.255240] __x64_sys_mkdir+0x6e/0xd0
[ 836.255253] do_syscall_64+0xbf/0x420
[ 836.255268] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 836.255282] RIP: 0033:0x7f775d7e2c27
[ 836.255292] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 836.255303] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 836.255316] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 836.255324] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 836.255332] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 836.255340] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 836.255348] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 836.255365]
[ 836.286048] FAT-fs (loop7): unable to read boot sector
[ 836.289870] FAT-fs (loop4): unable to read boot sector
07:39:40 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 50)
07:39:40 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 40)
07:39:40 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x700, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 836.332817] No source specified
[ 836.363890] FAT-fs (loop0): unable to read boot sector
[ 836.394916] FAT-fs (loop6): unable to read boot sector
[ 836.412656] loop2: detected capacity change from 0 to 3
[ 836.417922] FAT-fs (loop2): bogus number of reserved sectors
[ 836.418393] FAT-fs (loop2): Can't find a valid FAT filesystem
07:39:48 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 69)
07:39:48 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x705, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:48 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x256, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:48 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 51)
07:39:48 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 43)
07:39:48 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:48 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 41)
07:39:48 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 845.185163] loop2: detected capacity change from 0 to 3
[ 845.189559] No source specified
[ 845.193307] No source specified
[ 845.195927] FAT-fs (loop2): bogus number of reserved sectors
[ 845.196400] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 845.202473] loop2: detected capacity change from 0 to 3
[ 845.211735] loop4: detected capacity change from 0 to 1
[ 845.222619] FAT-fs (loop4): bogus number of reserved sectors
[ 845.223131] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 845.234481] loop4: detected capacity change from 0 to 1
07:39:49 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 845.239320] FAT-fs (loop6): unable to read boot sector
07:39:49 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x730, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 845.250308] FAT-fs (loop7): unable to read boot sector
[ 845.272833] FAT-fs (loop0): unable to read boot sector
[ 845.276575] FAT-fs (loop5): unable to read boot sector
07:39:49 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x257, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 845.289875] No source specified
[ 845.290776] No source specified
07:39:49 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 42)
07:39:49 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 845.342641] loop2: detected capacity change from 0 to 3
[ 845.344589] loop4: detected capacity change from 0 to 1
[ 845.349392] FAT-fs (loop4): bogus number of reserved sectors
[ 845.349875] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 845.352721] FAT-fs (loop2): bogus number of reserved sectors
[ 845.356040] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 845.360432] loop2: detected capacity change from 0 to 3
07:39:49 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 44)
07:39:49 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 70)
07:39:49 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x300, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 845.381746] No source specified
07:39:49 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 52)
[ 845.437744] loop4: detected capacity change from 0 to 1
[ 845.439581] FAT-fs (loop6): unable to read boot sector
[ 845.442574] FAT-fs (loop4): bogus number of reserved sectors
[ 845.443078] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 845.450483] loop4: detected capacity change from 0 to 1
[ 845.467474] FAULT_INJECTION: forcing a failure.
[ 845.467474] name failslab, interval 1, probability 0, space 0, times 0
[ 845.470890] CPU: 0 UID: 0 PID: 7947 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 845.470908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 845.470916] Call Trace:
[ 845.470920]
[ 845.470925] dump_stack_lvl+0xfa/0x120
[ 845.470946] should_fail_ex+0x4d7/0x5e0
[ 845.470969] ? ext4_alloc_inode+0x28/0x640
[ 845.470988] should_failslab+0xc2/0x120
[ 845.471003] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 845.471025] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 845.471043] ? ext4_alloc_inode+0x28/0x640
[ 845.471058] ext4_alloc_inode+0x28/0x640
[ 845.471074] ? __pfx_ext4_alloc_inode+0x10/0x10
[ 845.471091] alloc_inode+0x67/0x250
[ 845.471108] new_inode+0x1e/0x160
[ 845.471126] __ext4_new_inode+0x35d/0x4cd0
[ 845.471145] ? avc_has_perm_noaudit+0x141/0x390
[ 845.471164] ? __pfx___ext4_new_inode+0x10/0x10
[ 845.471179] ? __pfx_avc_has_perm+0x10/0x10
[ 845.471193] ? __pfx___dquot_initialize+0x10/0x10
[ 845.471219] ext4_mkdir+0x331/0xb30
[ 845.471243] ? __pfx_ext4_mkdir+0x10/0x10
[ 845.471259] ? security_inode_permission+0x72/0xe0
[ 845.471276] vfs_mkdir+0x6d8/0xc00
[ 845.471297] filename_mkdirat+0x118/0x430
[ 845.471312] ? __pfx_filename_mkdirat+0x10/0x10
[ 845.471326] ? strncpy_from_user+0x21b/0x2f0
[ 845.471347] __x64_sys_mkdir+0x6e/0xd0
[ 845.471360] do_syscall_64+0xbf/0x420
[ 845.471375] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 845.471389] RIP: 0033:0x7fb40288cc27
[ 845.471399] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 845.471411] RSP: 002b:00007fb3ffe02fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 845.471424] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288cc27
[ 845.471432] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 845.471440] RBP: 00007fb3ffe03040 R08: 0000000000000000 R09: ffffffffffffffff
[ 845.471448] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 845.471455] R13: 0000000020000040 R14: 00007fb3ffe03000 R15: 0000000020000080
[ 845.471473]
[ 845.479169] FAT-fs (loop7): unable to read boot sector
[ 845.529753] FAT-fs (loop5): unable to read boot sector
07:39:57 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 43)
07:39:57 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x805, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:57 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 71)
07:39:57 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 45)
07:39:57 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x330, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:57 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 53)
07:39:57 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
prlimit64(r2, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r2, 0x3, r1, 0xa)
r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r3, 0x2)
r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
r6 = dup(r5)
connect$802154_dgram(r6, &(0x7f0000000000)={0x24, @long}, 0x11)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4, {0xe8}}, './file0\x00'})
kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r3, &(0x7f0000000040)={r6, r0, 0x1000000})
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
07:39:57 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 853.591734] FAULT_INJECTION: forcing a failure.
[ 853.591734] name failslab, interval 1, probability 0, space 0, times 0
[ 853.593476] CPU: 1 UID: 0 PID: 7963 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 853.593506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 853.593520] Call Trace:
[ 853.593529]
[ 853.593538] dump_stack_lvl+0xfa/0x120
[ 853.593572] should_fail_ex+0x4d7/0x5e0
[ 853.593613] ? do_getname+0x2b/0x3d0
[ 853.593641] should_failslab+0xc2/0x120
[ 853.593667] kmem_cache_alloc_noprof+0x80/0x760
[ 853.593699] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 853.593737] ? do_getname+0x2b/0x3d0
[ 853.593763] do_getname+0x2b/0x3d0
[ 853.593793] __x64_sys_mkdir+0x5a/0xd0
[ 853.593820] do_syscall_64+0xbf/0x420
[ 853.593846] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 853.593871] RIP: 0033:0x7f184d907c27
[ 853.593896] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 853.593917] RSP: 002b:00007f184ae7dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 853.593940] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d907c27
[ 853.593955] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 853.593969] RBP: 00007f184ae7e040 R08: 0000000000000000 R09: ffffffffffffffff
[ 853.593984] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 853.593998] R13: 0000000020000040 R14: 00007f184ae7e000 R15: 0000000020000080
[ 853.594028]
[ 853.619474] FAT-fs (loop5): unable to read boot sector
[ 853.623000] loop2: detected capacity change from 0 to 4
[ 853.626444] loop4: detected capacity change from 0 to 1
[ 853.627594] FAULT_INJECTION: forcing a failure.
[ 853.627594] name failslab, interval 1, probability 0, space 0, times 0
[ 853.629261] No source specified
[ 853.632137] No source specified
[ 853.636981] CPU: 1 UID: 0 PID: 7968 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 853.637015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 853.637030] Call Trace:
[ 853.637038]
[ 853.637048] dump_stack_lvl+0xfa/0x120
[ 853.637081] should_fail_ex+0x4d7/0x5e0
[ 853.637121] ? skb_clone+0x191/0x400
[ 853.637150] should_failslab+0xc2/0x120
[ 853.637176] kmem_cache_alloc_noprof+0x80/0x760
[ 853.637208] ? netlink_broadcast_filtered+0xe6/0xe90
[ 853.637246] ? skb_clone+0x191/0x400
[ 853.637273] skb_clone+0x191/0x400
[ 853.637305] netlink_broadcast_filtered+0xab1/0xe90
[ 853.637348] ? __pfx_netlink_broadcast_filtered+0x10/0x10
[ 853.637388] netlink_broadcast+0x39/0x50
[ 853.637419] kobject_uevent_env+0xa88/0xfd0
[ 853.637457] ? lock_is_held_type+0x9e/0x120
[ 853.637482] loop_configure+0xe3d/0x15a0
[ 853.637538] ? __pfx_loop_configure+0x10/0x10
[ 853.637585] ? avc_has_extended_perms+0x107/0xf20
[ 853.637613] ? find_held_lock+0x2b/0x80
[ 853.637650] ? avc_has_extended_perms+0x23b/0xf20
[ 853.637676] ? lock_release+0xc8/0x270
[ 853.637707] lo_ioctl+0x674/0x1cb0
[ 853.637743] ? __pfx_lo_ioctl+0x10/0x10
[ 853.637773] ? __pfx_avc_has_extended_perms+0x10/0x10
[ 853.637808] ? lock_acquire+0x15e/0x2d0
[ 853.637835] ? __virt_addr_valid+0x1c6/0x5d0
[ 853.637862] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 853.637901] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 853.637930] ? lock_release+0xc8/0x270
[ 853.637957] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 853.637992] ? blkdev_common_ioctl+0x1c3/0x2860
[ 853.638050] ? debug_mutex_remove_waiter+0x1a0/0x3f0
[ 853.638085] ? __fget_files+0x34/0x3b0
[ 853.638108] ? find_held_lock+0x2b/0x80
[ 853.638143] ? __fget_files+0x203/0x3b0
[ 853.638166] ? __pfx_lo_ioctl+0x10/0x10
[ 853.638197] blkdev_ioctl+0x365/0x6d0
[ 853.638225] ? __pfx_blkdev_ioctl+0x10/0x10
[ 853.638253] ? selinux_file_ioctl+0xb9/0x280
[ 853.638289] ? __pfx_blkdev_ioctl+0x10/0x10
[ 853.638319] __x64_sys_ioctl+0x18f/0x210
[ 853.638355] do_syscall_64+0xbf/0x420
[ 853.638382] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 853.638405] RIP: 0033:0x7f5a8d2b48d7
07:39:57 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 853.638424] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 853.638445] RSP: 002b:00007f5a8a829f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 853.638468] RAX: ffffffffffffffda RBX: 00007f5a8d2fe970 RCX: 00007f5a8d2b48d7
[ 853.638483] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006
[ 853.638497] RBP: 0000000000000006 R08: 0000000000000000 R09: ffffffffffffffff
[ 853.638511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005
[ 853.638525] R13: 0000000000000005 R14: 0000000020000640 R15: 0000000000000000
[ 853.638555]
[ 853.684839] FAT-fs (loop6): unable to read boot sector
[ 853.685051] FAT-fs (loop0): unable to read boot sector
[ 853.688384] FAT-fs (loop4): bogus number of reserved sectors
[ 853.696081] FAT-fs (loop2): bogus number of reserved sectors
[ 853.700054] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 853.702042] FAT-fs (loop2): Can't find a valid FAT filesystem
07:39:57 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 44)
[ 853.768361] No source specified
07:39:57 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 72)
07:39:57 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x500, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:39:57 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 46)
07:39:57 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 54)
[ 853.875809] FAT-fs (loop7): unable to read boot sector
[ 853.877427] loop4: detected capacity change from 0 to 2
07:39:57 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000040)='./file0\x00', 0xf9)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000100)=0x1)
[ 853.891180] FAT-fs (loop6): unable to read boot sector
[ 853.895275] FAT-fs (loop5): unable to read boot sector
[ 853.924951] FAT-fs (loop4): bogus number of reserved sectors
[ 853.925822] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 853.991407] FAT-fs (loop0): unable to read boot sector
07:40:06 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 73)
07:40:06 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x900, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:06 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 45)
07:40:06 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 47)
07:40:06 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x506, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:06 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:06 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
prlimit64(r2, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r2, 0x3, r1, 0xa)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x81, 0xc0, 0x80, 0x0, 0x1, 0x28080, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000100), 0x9}, 0x100, 0x40, 0x2, 0x1, 0x2, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, r2, 0x4, r0, 0x7)
r3 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0xc0000)
setns(r3, 0x20000000)
07:40:06 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 55)
[ 862.622540] FAULT_INJECTION: forcing a failure.
[ 862.622540] name failslab, interval 1, probability 0, space 0, times 0
[ 862.623502] CPU: 1 UID: 0 PID: 7999 Comm: syz-executor.6 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 862.623519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 862.623527] Call Trace:
[ 862.623532]
[ 862.623537] dump_stack_lvl+0xfa/0x120
[ 862.623558] should_fail_ex+0x4d7/0x5e0
[ 862.623584] ? do_getname+0x2b/0x3d0
[ 862.623602] should_failslab+0xc2/0x120
[ 862.623616] kmem_cache_alloc_noprof+0x80/0x760
[ 862.623634] ? __pfx_perf_trace_preemptirq_template+0x10/0x10
[ 862.623656] ? do_getname+0x2b/0x3d0
[ 862.623670] do_getname+0x2b/0x3d0
[ 862.623686] __x64_sys_mkdir+0x5a/0xd0
[ 862.623701] do_syscall_64+0xbf/0x420
[ 862.623716] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 862.623730] RIP: 0033:0x7f5a8d2b3c27
[ 862.623740] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 862.623753] RSP: 002b:00007f5a8a829fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 862.623765] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f5a8d2b3c27
[ 862.623773] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 862.623780] RBP: 00007f5a8a82a040 R08: 0000000000000000 R09: ffffffffffffffff
[ 862.623788] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 862.623796] R13: 0000000020000040 R14: 00007f5a8a82a000 R15: 0000000020000080
[ 862.623812]
[ 862.650475] loop4: detected capacity change from 0 to 2
07:40:06 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 46)
[ 862.659023] FAT-fs (loop4): bogus number of reserved sectors
[ 862.659766] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 862.667138] FAT-fs (loop5): unable to read boot sector
[ 862.672611] FAULT_INJECTION: forcing a failure.
[ 862.672611] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 862.683679] loop2: detected capacity change from 0 to 4
[ 862.686940] CPU: 1 UID: 0 PID: 8000 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 862.686958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 862.686965] Call Trace:
[ 862.686970]
[ 862.686975] dump_stack_lvl+0xfa/0x120
[ 862.686996] should_fail_ex+0x4d7/0x5e0
[ 862.687020] strncpy_from_user+0x3b/0x2f0
[ 862.687038] do_getname+0x70/0x3d0
[ 862.687057] __x64_sys_mkdir+0x5a/0xd0
[ 862.687072] do_syscall_64+0xbf/0x420
[ 862.687088] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 862.687102] RIP: 0033:0x7f184d907c27
[ 862.687112] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 862.687125] RSP: 002b:00007f184ae7dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 862.687137] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d907c27
[ 862.687146] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 862.687154] RBP: 00007f184ae7e040 R08: 0000000000000000 R09: ffffffffffffffff
[ 862.687162] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 862.687169] R13: 0000000020000040 R14: 00007f184ae7e000 R15: 0000000020000080
[ 862.687187]
[ 862.702401] No source specified
[ 862.704962] FAT-fs (loop2): bogus number of reserved sectors
[ 862.706340] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 862.706481] FAT-fs (loop0): unable to read boot sector
07:40:06 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x507, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 862.731364] No source specified
[ 862.734431] FAT-fs (loop6): unable to read boot sector
07:40:06 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 56)
07:40:06 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 48)
[ 862.776406] loop4: detected capacity change from 0 to 2
07:40:06 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]}) (fail_nth: 47)
[ 862.798007] FAT-fs (loop4): bogus number of reserved sectors
[ 862.798518] FAT-fs (loop4): Can't find a valid FAT filesystem
07:40:06 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 862.814473] FAULT_INJECTION: forcing a failure.
[ 862.814473] name failslab, interval 1, probability 0, space 0, times 0
[ 862.815392] CPU: 1 UID: 0 PID: 8019 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 862.815408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 862.815416] Call Trace:
[ 862.815421]
[ 862.815426] dump_stack_lvl+0xfa/0x120
[ 862.815445] should_fail_ex+0x4d7/0x5e0
[ 862.815466] ? __d_alloc+0x34/0x9c0
[ 862.815480] should_failslab+0xc2/0x120
[ 862.815495] kmem_cache_alloc_lru_noprof+0x84/0x770
[ 862.815512] ? __d_lookup+0x255/0x490
[ 862.815535] ? __d_alloc+0x34/0x9c0
[ 862.815547] __d_alloc+0x34/0x9c0
[ 862.815563] d_alloc+0x4a/0x1e0
[ 862.815578] lookup_one_qstr_excl+0x174/0x270
[ 862.815593] ? mnt_want_write+0x153/0x420
[ 862.815613] filename_create+0x1c1/0x400
[ 862.815632] ? __pfx_filename_create+0x10/0x10
[ 862.815650] ? __virt_addr_valid+0x2e8/0x5d0
[ 862.815670] filename_mkdirat+0xa6/0x430
[ 862.815685] ? __pfx_filename_mkdirat+0x10/0x10
[ 862.815699] ? strncpy_from_user+0x21b/0x2f0
[ 862.815719] __x64_sys_mkdir+0x6e/0xd0
[ 862.815733] do_syscall_64+0xbf/0x420
[ 862.815748] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 862.815761] RIP: 0033:0x7f184d907c27
[ 862.815771] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 862.815786] RSP: 002b:00007f184ae7dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 862.815800] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d907c27
[ 862.815809] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 862.815818] RBP: 00007f184ae7e040 R08: 0000000000000000 R09: ffffffffffffffff
[ 862.815827] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 862.815834] R13: 0000000020000040 R14: 00007f184ae7e000 R15: 0000000020000080
[ 862.815850]
07:40:06 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x905, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:06 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x800)
r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x2)
close_range(r0, r1, 0x0)
[ 862.842041] FAULT_INJECTION: forcing a failure.
[ 862.842041] name failslab, interval 1, probability 0, space 0, times 0
[ 862.843856] CPU: 1 UID: 0 PID: 8021 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 862.843872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 862.843880] Call Trace:
[ 862.843884]
[ 862.843892] dump_stack_lvl+0xfa/0x120
[ 862.843909] should_fail_ex+0x4d7/0x5e0
[ 862.843930] should_failslab+0xc2/0x120
[ 862.843943] __kmalloc_noprof+0xd6/0x830
[ 862.843961] ? security_inode_init_security+0x113/0x370
[ 862.843982] ? security_inode_init_security+0x113/0x370
[ 862.843999] security_inode_init_security+0x113/0x370
[ 862.844016] ? __pfx_ext4_initxattrs+0x10/0x10
[ 862.844035] ? __pfx_security_inode_init_security+0x10/0x10
[ 862.844051] ? _raw_spin_unlock+0x1e/0x40
[ 862.844069] ? insert_inode_locked+0x3fb/0x890
[ 862.844087] ? crc32c+0x1ae/0x350
[ 862.844105] __ext4_new_inode+0x38f7/0x4cd0
[ 862.844128] ? __pfx___ext4_new_inode+0x10/0x10
[ 862.844144] ? __pfx___dquot_initialize+0x10/0x10
[ 862.844170] ext4_mkdir+0x331/0xb30
[ 862.844193] ? __pfx_ext4_mkdir+0x10/0x10
[ 862.844210] ? security_inode_permission+0x72/0xe0
[ 862.844227] vfs_mkdir+0x6d8/0xc00
[ 862.844246] filename_mkdirat+0x118/0x430
[ 862.844261] ? __pfx_filename_mkdirat+0x10/0x10
[ 862.844275] ? strncpy_from_user+0x21b/0x2f0
[ 862.844295] __x64_sys_mkdir+0x6e/0xd0
[ 862.844308] do_syscall_64+0xbf/0x420
[ 862.844323] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 862.844336] RIP: 0033:0x7fb40288cc27
[ 862.844345] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 862.844357] RSP: 002b:00007fb3ffe02fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 862.844369] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288cc27
[ 862.844377] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 862.844384] RBP: 00007fb3ffe03040 R08: 0000000000000000 R09: ffffffffffffffff
[ 862.844392] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 862.844399] R13: 0000000020000040 R14: 00007fb3ffe03000 R15: 0000000020000080
[ 862.844416]
[ 862.937871] No source specified
[ 862.945655] No source specified
[ 862.953452] loop2: detected capacity change from 0 to 4
[ 862.958132] FAT-fs (loop2): bogus number of reserved sectors
[ 862.958595] FAT-fs (loop2): Can't find a valid FAT filesystem
07:40:15 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0)
r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0)
open_by_handle_at(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000040000008000000032d40000000019dbe64c9b0c"], 0x82)
07:40:15 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa00, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:15 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 74)
07:40:15 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:15 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 49)
07:40:15 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x508, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:15 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 57)
07:40:15 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 871.751593] No source specified
[ 871.760600] No source specified
[ 871.763474] loop2: detected capacity change from 0 to 5
[ 871.765093] FAULT_INJECTION: forcing a failure.
[ 871.765093] name failslab, interval 1, probability 0, space 0, times 0
[ 871.765539] loop4: detected capacity change from 0 to 2
[ 871.766029] CPU: 1 UID: 0 PID: 8049 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 871.766045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 871.766054] Call Trace:
[ 871.766058]
[ 871.766063] dump_stack_lvl+0xfa/0x120
[ 871.766082] should_fail_ex+0x4d7/0x5e0
[ 871.766104] ? __es_insert_extent+0xed2/0x1370
[ 871.766124] should_failslab+0xc2/0x120
[ 871.766138] kmem_cache_alloc_noprof+0x80/0x760
[ 871.766161] ? __es_insert_extent+0xed2/0x1370
[ 871.766179] __es_insert_extent+0xed2/0x1370
[ 871.766204] ext4_es_insert_extent+0x43d/0x1060
[ 871.766227] ? crc32c+0x1ae/0x350
[ 871.766244] ? __pfx_ext4_es_insert_extent+0x10/0x10
[ 871.766264] ? lock_acquire+0x15e/0x2d0
[ 871.766280] ? ext4_map_blocks+0x564/0x1470
[ 871.766300] ? __pfx_down_write+0x10/0x10
[ 871.766318] ext4_map_blocks+0x808/0x1470
[ 871.766333] ? __up_read+0x26f/0x710
[ 871.766350] ? __pfx_ext4_map_blocks+0x10/0x10
[ 871.766362] ? __pfx___up_read+0x10/0x10
[ 871.766379] ? lock_release+0xc8/0x270
[ 871.766397] ? ext4_map_blocks+0x1e9/0x1470
[ 871.766413] ext4_getblk+0x67d/0x8e0
[ 871.766426] ? __pfx_ext4_getblk+0x10/0x10
[ 871.766438] ? __pfx_security_inode_init_security+0x10/0x10
[ 871.766458] ? crc32c+0x1ae/0x350
[ 871.766476] ext4_bread+0x2e/0x1a0
[ 871.766489] ext4_append+0x21d/0x530
[ 871.766506] ? __pfx_ext4_append+0x10/0x10
[ 871.766521] ? __pfx___ext4_new_inode+0x10/0x10
[ 871.766540] ext4_init_new_dir+0x13c/0x240
[ 871.766557] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 871.766579] ext4_mkdir+0x3c5/0xb30
[ 871.766599] ? __pfx_ext4_mkdir+0x10/0x10
[ 871.766615] ? security_inode_permission+0x72/0xe0
[ 871.766632] vfs_mkdir+0x6d8/0xc00
[ 871.766653] filename_mkdirat+0x118/0x430
[ 871.766669] ? __pfx_filename_mkdirat+0x10/0x10
[ 871.766683] ? strncpy_from_user+0x21b/0x2f0
[ 871.766703] __x64_sys_mkdir+0x6e/0xd0
[ 871.766717] do_syscall_64+0xbf/0x420
[ 871.766732] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 871.766745] RIP: 0033:0x7f775d7e2c27
[ 871.766755] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 871.766766] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 871.766778] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e2c27
[ 871.766786] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 871.766794] RBP: 00007f775ad59040 R08: 0000000000000000 R09: ffffffffffffffff
[ 871.766802] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 871.766810] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 871.766827]
[ 871.768299] FAT-fs (loop0): unable to read boot sector
[ 871.788813] FAT-fs (loop2): bogus number of reserved sectors
[ 871.792559] FAT-fs (loop5): unable to read boot sector
[ 871.795231] FAT-fs (loop6): unable to read boot sector
[ 871.798923] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 871.801405] FAT-fs (loop7): unable to read boot sector
[ 871.803080] FAT-fs (loop4): bogus number of reserved sectors
[ 871.803670] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 871.807836] loop2: detected capacity change from 0 to 5
07:40:15 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:15 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 75)
[ 871.818465] FAT-fs (loop2): bogus number of reserved sectors
[ 871.818971] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 871.858360] FAT-fs (loop5): unable to read boot sector
07:40:15 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 50)
[ 871.875682] No source specified
07:40:15 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r0 = syz_open_dev$tty20(0xc, 0x4, 0x0)
write$binfmt_aout(r0, &(0x7f00000003c0), 0x20)
ioctl$TCXONC(r0, 0x540a, 0x2)
07:40:15 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:15 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x509, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:15 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 58)
07:40:15 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa05, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:15 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 871.943343] loop4: detected capacity change from 0 to 2
[ 871.948135] loop2: detected capacity change from 0 to 5
[ 871.950253] FAULT_INJECTION: forcing a failure.
[ 871.950253] name failslab, interval 1, probability 0, space 0, times 0
[ 871.951343] CPU: 1 UID: 0 PID: 8066 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 871.951360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 871.951368] Call Trace:
[ 871.951372]
[ 871.951377] dump_stack_lvl+0xfa/0x120
[ 871.951397] should_fail_ex+0x4d7/0x5e0
[ 871.951420] should_failslab+0xc2/0x120
[ 871.951437] __kmalloc_node_track_caller_noprof+0xd7/0x840
[ 871.951466] ? lock_acquire+0x15e/0x2d0
[ 871.951489] ? sidtab_sid2str_get+0x85/0x6f0
[ 871.951517] ? sidtab_sid2str_get+0x17e/0x6f0
[ 871.951548] ? kmemdup_noprof+0x2b/0x60
[ 871.951573] kmemdup_noprof+0x2b/0x60
[ 871.951596] sidtab_sid2str_get+0x17e/0x6f0
[ 871.951628] sidtab_entry_to_string+0x33/0x110
[ 871.951656] security_sid_to_context_core+0x350/0x620
[ 871.951685] selinux_inode_init_security+0x432/0x650
[ 871.951718] ? __pfx_selinux_inode_init_security+0x10/0x10
[ 871.951750] ? security_inode_init_security+0x113/0x370
[ 871.951781] security_inode_init_security+0x1bc/0x370
[ 871.951806] ? __pfx_ext4_initxattrs+0x10/0x10
[ 871.951835] ? __pfx_security_inode_init_security+0x10/0x10
[ 871.951858] ? _raw_spin_unlock+0x1e/0x40
[ 871.951883] ? insert_inode_locked+0x3fb/0x890
[ 871.951914] ? crc32c+0x1ae/0x350
[ 871.951940] __ext4_new_inode+0x38f7/0x4cd0
[ 871.951975] ? __pfx___ext4_new_inode+0x10/0x10
[ 871.951999] ? __pfx___dquot_initialize+0x10/0x10
[ 871.952038] ext4_mkdir+0x331/0xb30
[ 871.952076] ? __pfx_ext4_mkdir+0x10/0x10
[ 871.952099] ? security_inode_permission+0x72/0xe0
[ 871.952122] vfs_mkdir+0x6d8/0xc00
[ 871.952150] filename_mkdirat+0x118/0x430
[ 871.952170] ? __pfx_filename_mkdirat+0x10/0x10
[ 871.952190] ? strncpy_from_user+0x21b/0x2f0
[ 871.952219] __x64_sys_mkdir+0x6e/0xd0
[ 871.952239] do_syscall_64+0xbf/0x420
[ 871.952260] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 871.952279] RIP: 0033:0x7fb40288cc27
[ 871.952292] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 871.952309] RSP: 002b:00007fb3ffe02fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 871.952326] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288cc27
[ 871.952338] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 871.952348] RBP: 00007fb3ffe03040 R08: 0000000000000000 R09: ffffffffffffffff
[ 871.952359] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 871.952370] R13: 0000000020000040 R14: 00007fb3ffe03000 R15: 0000000020000080
[ 871.952395]
[ 871.955108] FAT-fs (loop6): unable to read boot sector
[ 871.955387] FAT-fs (loop2): bogus number of reserved sectors
[ 871.955399] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 871.956196] FAT-fs (loop4): bogus number of reserved sectors
[ 871.956206] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 871.956876] FAULT_INJECTION: forcing a failure.
[ 871.956876] name failslab, interval 1, probability 0, space 0, times 0
[ 871.956914] CPU: 0 UID: 0 PID: 8070 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 871.956929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 871.956936] Call Trace:
[ 871.956940]
[ 871.956945] dump_stack_lvl+0xfa/0x120
[ 871.956959] should_fail_ex+0x4d7/0x5e0
[ 871.956979] ? security_inode_alloc+0x3e/0x130
[ 871.956996] should_failslab+0xc2/0x120
[ 871.957009] kmem_cache_alloc_noprof+0x80/0x760
[ 871.957025] ? __pfx_map_id_range_down+0x10/0x10
[ 871.957050] ? security_inode_alloc+0x3e/0x130
[ 871.957070] security_inode_alloc+0x3e/0x130
[ 871.957090] inode_init_always_gfp+0xc9d/0xff0
[ 871.957106] alloc_inode+0x8d/0x250
[ 871.957122] new_inode+0x1e/0x160
[ 871.957139] __ext4_new_inode+0x35d/0x4cd0
[ 871.957157] ? avc_has_perm_noaudit+0x141/0x390
[ 871.957174] ? __pfx___ext4_new_inode+0x10/0x10
[ 871.957190] ? __pfx_avc_has_perm+0x10/0x10
[ 871.957203] ? __pfx___dquot_initialize+0x10/0x10
[ 871.957228] ext4_mkdir+0x331/0xb30
[ 871.957250] ? __pfx_ext4_mkdir+0x10/0x10
[ 871.957266] ? security_inode_permission+0x72/0xe0
[ 871.957282] vfs_mkdir+0x6d8/0xc00
[ 871.957301] filename_mkdirat+0x118/0x430
[ 871.957316] ? __pfx_filename_mkdirat+0x10/0x10
[ 871.957330] ? strncpy_from_user+0x21b/0x2f0
[ 871.957349] __x64_sys_mkdir+0x6e/0xd0
[ 871.957363] do_syscall_64+0xbf/0x420
[ 871.957379] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 871.957391] RIP: 0033:0x7f184d907c27
[ 871.957401] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 871.957412] RSP: 002b:00007f184ae7dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 871.957427] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d907c27
[ 871.957435] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 871.957442] RBP: 00007f184ae7e040 R08: 0000000000000000 R09: ffffffffffffffff
[ 871.957450] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 871.957457] R13: 0000000020000040 R14: 00007f184ae7e000 R15: 0000000020000080
[ 871.957473]
[ 871.960220] loop4: detected capacity change from 0 to 2
[ 871.964940] loop2: detected capacity change from 0 to 5
[ 871.966202] FAT-fs (loop6): unable to read boot sector
[ 871.966935] FAT-fs (loop4): bogus number of reserved sectors
[ 871.967322] No source specified
[ 871.967470] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 871.970515] No source specified
07:40:24 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:24 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:24 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 76)
07:40:24 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x50a, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:24 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 59)
07:40:24 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb00, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:24 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0)
perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xff, 0x3, 0x7f, 0x7f, 0x0, 0x100000001, 0x19c10, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x8, 0x10001, 0x8, 0x7, 0x8001, 0x9, 0x1375, 0x0, 0x3, 0x0, 0x9}, r0, 0x9, 0xffffffffffffffff, 0x0)
07:40:24 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 51)
[ 880.392462] loop4: detected capacity change from 0 to 2
[ 880.400161] loop2: detected capacity change from 0 to 5
[ 880.402604] FAULT_INJECTION: forcing a failure.
[ 880.402604] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 880.403537] CPU: 1 UID: 0 PID: 8089 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 880.403552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 880.403560] Call Trace:
[ 880.403565]
[ 880.403570] dump_stack_lvl+0xfa/0x120
[ 880.403590] should_fail_ex+0x4d7/0x5e0
[ 880.403616] _copy_from_user+0x30/0xd0
[ 880.403638] memdup_user+0x7e/0xe0
[ 880.403656] strndup_user+0x78/0xe0
[ 880.403673] __x64_sys_mount+0x136/0x310
[ 880.403690] ? __pfx___x64_sys_mount+0x10/0x10
[ 880.403710] do_syscall_64+0xbf/0x420
[ 880.403725] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 880.403739] RIP: 0033:0x7f775d7e504a
[ 880.403749] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 880.403761] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 880.403773] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e504a
[ 880.403781] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f775ad59000
[ 880.403789] RBP: 00007f775ad59040 R08: 00007f775ad59040 R09: 0000000020000000
[ 880.403797] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 880.403805] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 880.403821]
[ 880.418832] FAT-fs (loop2): bogus number of reserved sectors
[ 880.419323] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 880.430781] FAT-fs (loop4): bogus number of reserved sectors
[ 880.431870] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 880.437291] loop2: detected capacity change from 0 to 5
[ 880.445587] No source specified
[ 880.446192] FAT-fs (loop7): unable to read boot sector
[ 880.449249] FAT-fs (loop0): unable to read boot sector
[ 880.451476] loop4: detected capacity change from 0 to 2
[ 880.451781] FAT-fs (loop6): unable to read boot sector
07:40:24 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 77)
07:40:24 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc00, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:24 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x600, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:24 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:24 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 52)
[ 880.567064] loop2: detected capacity change from 0 to 6
[ 880.569215] FAT-fs (loop2): bogus number of reserved sectors
[ 880.569679] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 880.570392] loop4: detected capacity change from 0 to 3
[ 880.574511] FAT-fs (loop5): unable to read boot sector
[ 880.575835] FAT-fs (loop4): bogus number of reserved sectors
[ 880.576327] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 880.608944] No source specified
07:40:24 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:24 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 60)
[ 880.615420] No source specified
07:40:24 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_udp(0xa, 0x2, 0x0)
ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100))
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 880.630036] FAT-fs (loop7): unable to read boot sector
07:40:24 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe00, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 880.691418] loop2: detected capacity change from 0 to 7
[ 880.695042] FAT-fs (loop6): unable to read boot sector
[ 880.695145] FAT-fs (loop2): bogus number of reserved sectors
[ 880.696377] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 880.710662] loop2: detected capacity change from 0 to 7
[ 880.711609] FAT-fs (loop0): unable to read boot sector
07:40:33 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:33 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 78)
07:40:33 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x605, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:33 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1020, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:33 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 53)
07:40:33 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:33 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 61)
[ 889.976550] No source specified
07:40:33 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
r3 = dup(r2)
connect$802154_dgram(r3, &(0x7f0000000000)={0x24, @long}, 0x11)
r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10410, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0)
r6 = dup(r5)
connect$802154_dgram(r6, &(0x7f0000000000)={0x24, @long}, 0x11)
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4, {0xe8}}, './file0\x00'})
ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="e8000000000000002e2f66692c653000"])
setns(r3, 0x80)
setns(r0, 0x0)
[ 889.993475] FAULT_INJECTION: forcing a failure.
[ 889.993475] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 889.994418] CPU: 1 UID: 0 PID: 8129 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 889.994434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 889.994442] Call Trace:
[ 889.994447]
[ 889.994452] dump_stack_lvl+0xfa/0x120
[ 889.994471] should_fail_ex+0x4d7/0x5e0
[ 889.994494] _copy_from_user+0x30/0xd0
[ 889.994515] memdup_user+0x7e/0xe0
[ 889.994533] strndup_user+0x78/0xe0
[ 889.994550] __x64_sys_mount+0x136/0x310
[ 889.994566] ? __pfx___x64_sys_mount+0x10/0x10
[ 889.994586] do_syscall_64+0xbf/0x420
[ 889.994601] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 889.994614] RIP: 0033:0x7f775d7e504a
[ 889.994624] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 889.994636] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 889.994648] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e504a
[ 889.994657] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f775ad59000
[ 889.994664] RBP: 00007f775ad59040 R08: 00007f775ad59040 R09: 0000000020000000
[ 889.994672] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 889.994680] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 889.994696]
[ 889.997235] loop2: detected capacity change from 0 to 8
[ 890.012791] FAT-fs (loop6): unable to read boot sector
[ 890.048805] loop4: detected capacity change from 0 to 3
[ 890.053988] FAT-fs (loop2): bogus number of reserved sectors
07:40:33 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x258d, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:33 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 79)
[ 890.072060] FAT-fs (loop7): unable to read boot sector
[ 890.074447] FAT-fs (loop4): bogus number of reserved sectors
[ 890.075363] FAT-fs (loop4): Can't find a valid FAT filesystem
07:40:33 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 890.084974] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 890.088511] FAT-fs (loop0): unable to read boot sector
[ 890.114126] No source specified
[ 890.117137] No source specified
07:40:33 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 54)
[ 890.148199] FAT-fs (loop6): unable to read boot sector
07:40:33 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 80)
07:40:33 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x700, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:34 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8d25, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:34 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1201, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 890.203864] FAULT_INJECTION: forcing a failure.
[ 890.203864] name failslab, interval 1, probability 0, space 0, times 0
[ 890.204783] CPU: 1 UID: 0 PID: 8153 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 890.204798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 890.204806] Call Trace:
[ 890.204811]
[ 890.204816] dump_stack_lvl+0xfa/0x120
[ 890.204836] should_fail_ex+0x4d7/0x5e0
[ 890.204859] ? jbd2__journal_start+0x193/0x820
[ 890.204889] should_failslab+0xc2/0x120
[ 890.204905] kmem_cache_alloc_noprof+0x80/0x760
[ 890.204923] ? lock_is_held_type+0x9e/0x120
[ 890.204938] ? jbd2__journal_start+0x193/0x820
[ 890.204955] jbd2__journal_start+0x193/0x820
[ 890.204976] __ext4_journal_start_sb+0x325/0x580
[ 890.204994] __ext4_new_inode+0x2c81/0x4cd0
[ 890.205017] ? __pfx___ext4_new_inode+0x10/0x10
[ 890.205032] ? __pfx_avc_has_perm+0x10/0x10
[ 890.205047] ? __pfx___dquot_initialize+0x10/0x10
[ 890.205073] ext4_mkdir+0x331/0xb30
[ 890.205096] ? __pfx_ext4_mkdir+0x10/0x10
[ 890.205112] ? security_inode_permission+0x72/0xe0
[ 890.205129] vfs_mkdir+0x6d8/0xc00
[ 890.205150] filename_mkdirat+0x118/0x430
[ 890.205165] ? __pfx_filename_mkdirat+0x10/0x10
[ 890.205179] ? strncpy_from_user+0x21b/0x2f0
[ 890.205199] __x64_sys_mkdir+0x6e/0xd0
[ 890.205212] do_syscall_64+0xbf/0x420
[ 890.205227] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 890.205240] RIP: 0033:0x7f184d907c27
[ 890.205250] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 890.205263] RSP: 002b:00007f184ae7dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 890.205275] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d907c27
[ 890.205283] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 890.205291] RBP: 00007f184ae7e040 R08: 0000000000000000 R09: ffffffffffffffff
[ 890.205298] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 890.205306] R13: 0000000020000040 R14: 00007f184ae7e000 R15: 0000000020000080
[ 890.205322]
[ 890.242619] FAULT_INJECTION: forcing a failure.
[ 890.242619] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 890.243593] CPU: 1 UID: 0 PID: 8156 Comm: syz-executor.5 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 890.243608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 890.243615] Call Trace:
[ 890.243620]
[ 890.243624] dump_stack_lvl+0xfa/0x120
[ 890.243641] should_fail_ex+0x4d7/0x5e0
[ 890.243662] _copy_from_user+0x30/0xd0
[ 890.243683] memdup_user+0x7e/0xe0
[ 890.243701] strndup_user+0x78/0xe0
[ 890.243718] __x64_sys_mount+0x17f/0x310
[ 890.243734] ? __pfx___x64_sys_mount+0x10/0x10
[ 890.243753] do_syscall_64+0xbf/0x420
[ 890.243768] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 890.243781] RIP: 0033:0x7f775d7e504a
[ 890.243790] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 890.243802] RSP: 002b:00007f775ad58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
[ 890.243814] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f775d7e504a
[ 890.243822] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f775ad59000
[ 890.243830] RBP: 00007f775ad59040 R08: 00007f775ad59040 R09: 0000000020000000
[ 890.243838] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000
[ 890.243845] R13: 0000000020000040 R14: 00007f775ad59000 R15: 0000000020000080
[ 890.243861]
[ 890.271147] loop2: detected capacity change from 0 to 9
[ 890.273109] FAT-fs (loop2): bogus number of reserved sectors
[ 890.273600] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 890.274131] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory
[ 890.287752] loop2: detected capacity change from 0 to 9
[ 890.288762] loop4: detected capacity change from 0 to 3
[ 890.295360] No source specified
[ 890.300871] FAT-fs (loop4): bogus number of reserved sectors
[ 890.305014] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 890.311871] No source specified
[ 890.323995] loop4: detected capacity change from 0 to 3
07:40:41 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:41 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x705, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:41 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 81)
07:40:41 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 62)
07:40:41 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:41 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 55)
07:40:41 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x18cc, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:41 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
prlimit64(r1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6, 0x40b06, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000740)}, 0x10, 0x1, 0x0, 0x0, 0x40, 0xa5ba, 0x1157, 0x0, 0x6}, r1, 0x3, r0, 0xa)
r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0)
r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x2)
mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0)
perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x4, 0x1, 0x4, 0xd2, 0x0, 0x8000, 0x50000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xb40, 0x4, @perf_config_ext={0x20}, 0x40020, 0x100, 0xa63, 0x4, 0xd53, 0x7, 0x9, 0x0, 0x4, 0x0, 0x4}, r1, 0x2, r3, 0x2)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
[ 898.056342] loop2: detected capacity change from 0 to 12
[ 898.059656] FAULT_INJECTION: forcing a failure.
[ 898.059656] name failslab, interval 1, probability 0, space 0, times 0
[ 898.060603] CPU: 1 UID: 0 PID: 8179 Comm: syz-executor.0 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 898.060619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 898.060626] Call Trace:
[ 898.060631]
[ 898.060636] dump_stack_lvl+0xfa/0x120
[ 898.060656] should_fail_ex+0x4d7/0x5e0
[ 898.060679] ? __es_insert_extent+0xed2/0x1370
[ 898.060699] should_failslab+0xc2/0x120
[ 898.060713] kmem_cache_alloc_noprof+0x80/0x760
[ 898.060736] ? __es_insert_extent+0xed2/0x1370
[ 898.060753] __es_insert_extent+0xed2/0x1370
[ 898.060773] ? __pfx_do_raw_write_lock+0x10/0x10
[ 898.060796] ? __es_tree_search.isra.0+0x1af/0x220
[ 898.060816] ext4_es_cache_extent+0x387/0x6f0
[ 898.060836] ? kasan_save_track+0x14/0x30
[ 898.060852] ? __pfx_ext4_es_cache_extent+0x10/0x10
[ 898.060871] ? lock_acquire+0x15e/0x2d0
[ 898.060890] ? ext4_es_find_extent_range+0x1b3/0x4b0
[ 898.060909] ? find_held_lock+0x2b/0x80
[ 898.060928] ? ext4_es_find_extent_range+0x1cf/0x4b0
[ 898.060948] ? lock_release+0xc8/0x270
[ 898.060963] ? do_raw_read_unlock+0x44/0xe0
[ 898.061014] ext4_ext_map_blocks+0x1714/0x6050
[ 898.061041] ? bdev_getblk+0xd6/0x660
[ 898.061059] ? __pfx_ext4_ext_map_blocks+0x10/0x10
[ 898.061078] ? crc32c+0x1ae/0x350
[ 898.061095] ? look_up_lock_class+0x56/0x130
[ 898.061116] ? register_lock_class+0x3f/0x790
[ 898.061141] ? lock_acquire+0x15e/0x2d0
[ 898.061155] ? ext4_map_blocks+0x4a8/0x1470
[ 898.061170] ext4_map_query_blocks+0x110/0x900
[ 898.061190] ? __pfx_ext4_map_query_blocks+0x10/0x10
[ 898.061207] ? do_raw_read_unlock+0x44/0xe0
[ 898.061224] ? __pfx_down_read+0x10/0x10
[ 898.061237] ? ext4_es_lookup_extent+0xcd/0xb50
[ 898.061253] ext4_map_blocks+0x4bc/0x1470
[ 898.061270] ? __pfx_ext4_map_blocks+0x10/0x10
[ 898.061281] ? __pfx_ext4_initxattrs+0x10/0x10
[ 898.061300] ? __pfx_security_inode_init_security+0x10/0x10
[ 898.061318] ? _raw_spin_unlock+0x1e/0x40
[ 898.061334] ? insert_inode_locked+0x3fb/0x890
[ 898.061352] ? crc32c+0x1ae/0x350
[ 898.061367] ? __brelse+0x86/0xa0
[ 898.061378] ? __ext4_new_inode+0x116/0x4cd0
[ 898.061395] ext4_append+0x1af/0x530
[ 898.061411] ? __pfx_ext4_append+0x10/0x10
[ 898.061426] ? __pfx___ext4_new_inode+0x10/0x10
[ 898.061445] ext4_init_new_dir+0x13c/0x240
[ 898.061462] ? __pfx_ext4_init_new_dir+0x10/0x10
[ 898.061484] ext4_mkdir+0x3c5/0xb30
[ 898.061504] ? __pfx_ext4_mkdir+0x10/0x10
[ 898.061521] ? security_inode_permission+0x72/0xe0
[ 898.061538] vfs_mkdir+0x6d8/0xc00
[ 898.061559] filename_mkdirat+0x118/0x430
[ 898.061574] ? __pfx_filename_mkdirat+0x10/0x10
[ 898.061588] ? strncpy_from_user+0x21b/0x2f0
[ 898.061608] __x64_sys_mkdir+0x6e/0xd0
[ 898.061621] do_syscall_64+0xbf/0x420
[ 898.061636] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 898.061649] RIP: 0033:0x7fb40288cc27
[ 898.061659] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 898.061671] RSP: 002b:00007fb3ffe02fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 898.061683] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007fb40288cc27
[ 898.061691] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 898.061698] RBP: 00007fb3ffe03040 R08: 0000000000000000 R09: ffffffffffffffff
[ 898.061706] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 898.061713] R13: 0000000020000040 R14: 00007fb3ffe03000 R15: 0000000020000080
[ 898.061730]
[ 898.085285] loop4: detected capacity change from 0 to 3
[ 898.088802] FAT-fs (loop5): unable to read boot sector
[ 898.092560] FAT-fs (loop7): unable to read boot sector
[ 898.093955] FAT-fs (loop2): bogus number of reserved sectors
[ 898.094434] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 898.097533] No source specified
[ 898.103348] No source specified
[ 898.118689] FAT-fs (loop6): unable to read boot sector
07:40:41 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 56)
[ 898.121233] FAT-fs (loop4): bogus number of reserved sectors
[ 898.122216] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 898.122644] FAT-fs (loop0): unable to read boot sector
[ 898.141728] loop4: detected capacity change from 0 to 3
07:40:41 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:41 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 82)
[ 898.183580] loop2: detected capacity change from 0 to 16
07:40:41 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 63)
[ 898.188647] FAT-fs (loop5): unable to read boot sector
[ 898.189158] FAULT_INJECTION: forcing a failure.
[ 898.189158] name failslab, interval 1, probability 0, space 0, times 0
[ 898.190075] CPU: 1 UID: 0 PID: 8190 Comm: syz-executor.7 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 898.190090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 898.190098] Call Trace:
[ 898.190103]
[ 898.190108] dump_stack_lvl+0xfa/0x120
[ 898.190128] should_fail_ex+0x4d7/0x5e0
[ 898.190151] should_failslab+0xc2/0x120
[ 898.190166] __kmalloc_noprof+0xd6/0x830
[ 898.190188] ? security_inode_init_security+0x113/0x370
[ 898.190210] ? security_inode_init_security+0x113/0x370
[ 898.190226] security_inode_init_security+0x113/0x370
[ 898.190243] ? __pfx_ext4_initxattrs+0x10/0x10
[ 898.190263] ? __pfx_security_inode_init_security+0x10/0x10
[ 898.190279] ? _raw_spin_unlock+0x1e/0x40
[ 898.190297] ? insert_inode_locked+0x3fb/0x890
[ 898.190315] ? crc32c+0x1ae/0x350
[ 898.190334] __ext4_new_inode+0x38f7/0x4cd0
[ 898.190357] ? __pfx___ext4_new_inode+0x10/0x10
[ 898.190373] ? __pfx___dquot_initialize+0x10/0x10
[ 898.190399] ext4_mkdir+0x331/0xb30
[ 898.190422] ? __pfx_ext4_mkdir+0x10/0x10
[ 898.190439] ? security_inode_permission+0x72/0xe0
[ 898.190455] vfs_mkdir+0x6d8/0xc00
[ 898.190476] filename_mkdirat+0x118/0x430
[ 898.190491] ? __pfx_filename_mkdirat+0x10/0x10
[ 898.190505] ? strncpy_from_user+0x21b/0x2f0
[ 898.190525] __x64_sys_mkdir+0x6e/0xd0
[ 898.190538] do_syscall_64+0xbf/0x420
[ 898.190553] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 898.190566] RIP: 0033:0x7f184d907c27
[ 898.190577] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 898.190589] RSP: 002b:00007f184ae7dfa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053
[ 898.190601] RAX: ffffffffffffffda RBX: 0000000020000640 RCX: 00007f184d907c27
[ 898.190609] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000040
[ 898.190617] RBP: 00007f184ae7e040 R08: 0000000000000000 R09: ffffffffffffffff
[ 898.190624] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000
[ 898.190632] R13: 0000000020000040 R14: 00007f184ae7e000 R15: 0000000020000080
[ 898.190648]
07:40:42 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:42 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:42 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x805, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 898.273194] FAT-fs (loop2): bogus number of reserved sectors
[ 898.273727] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 898.285050] FAT-fs (loop6): unable to read boot sector
07:40:42 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 57)
07:40:42 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 83)
[ 898.316124] loop4: detected capacity change from 0 to 4
[ 898.319599] No source specified
[ 898.328694] No source specified
[ 898.330567] FAT-fs (loop5): unable to read boot sector
[ 898.333158] FAT-fs (loop4): bogus number of reserved sectors
[ 898.334166] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 898.345466] FAT-fs (loop0): unable to read boot sector
07:40:42 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2010, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
[ 898.364793]
[ 898.364990] =====================================
[ 898.365373] WARNING: bad unlock balance detected!
[ 898.365755] 6.19.0-rc5-next-20260116 #1 Not tainted
[ 898.366149] -------------------------------------
[ 898.366522] syz-executor.2/8205 is trying to release lock (rcu_read_lock) at:
[ 898.367178] [] __wait_on_freeing_inode+0x105/0x350
[ 898.367769] but there are no more locks to release!
[ 898.368207]
[ 898.368207] other info that might help us debug this:
[ 898.368725] 4 locks held by syz-executor.2/8205:
[ 898.369105] #0: ffff88800f6123f8 (sb_writers#3){.+.+}-{0:0}, at: filename_create+0xf7/0x400
[ 898.369798] #1: ffff88804a46ecb8 (&type->i_mutex_dir_key#3/1){+.+.}-{4:4}, at: filename_create+0x1b1/0x400
[ 898.370583] #2: ffff88800f616950 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0xe32/0x12d0
[ 898.371286] #3: ffffffff85c16898 (inode_hash_lock){+.+.}-{3:3}, at: insert_inode_locked+0xf9/0x890
[ 898.372011]
[ 898.372011] stack backtrace:
[ 898.372361] CPU: 1 UID: 0 PID: 8205 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 898.372376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 898.372384] Call Trace:
[ 898.372389]
[ 898.372393] dump_stack_lvl+0xca/0x120
[ 898.372408] ? __wait_on_freeing_inode+0x105/0x350
[ 898.372423] print_unlock_imbalance_bug+0x118/0x130
[ 898.372439] ? __wait_on_freeing_inode+0x105/0x350
[ 898.372453] lock_release+0x1ee/0x270
[ 898.372468] __wait_on_freeing_inode+0x10a/0x350
[ 898.372484] ? __pfx___wait_on_freeing_inode+0x10/0x10
[ 898.372500] ? __pfx_var_wake_function+0x10/0x10
[ 898.372517] ? lock_is_held_type+0x9e/0x120
[ 898.372530] insert_inode_locked+0x25f/0x890
[ 898.372547] __ext4_new_inode+0x223d/0x4cd0
[ 898.372565] ? __pfx___ext4_new_inode+0x10/0x10
[ 898.372580] ? __pfx___dquot_initialize+0x10/0x10
[ 898.372598] ? __pfx_avc_has_perm+0x10/0x10
[ 898.372615] ext4_symlink+0x623/0xb40
[ 898.372634] ? __pfx_ext4_symlink+0x10/0x10
[ 898.372651] ? security_inode_permission+0x72/0xe0
[ 898.372664] vfs_symlink+0x44b/0x840
[ 898.372681] filename_symlinkat+0x158/0x440
[ 898.372696] ? __pfx_filename_symlinkat+0x10/0x10
[ 898.372710] ? strncpy_from_user+0x21b/0x2f0
[ 898.372727] __x64_sys_symlink+0x82/0x110
[ 898.372741] do_syscall_64+0xbf/0x420
[ 898.372755] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 898.372768] RIP: 0033:0x7f591fd23427
[ 898.372777] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 898.372789] RSP: 002b:00007ffd6d51c928 EFLAGS: 00000206 ORIG_RAX: 0000000000000058
[ 898.372801] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f591fd23427
[ 898.372809] RDX: 00007ffd6d51ca07 RSI: 00007f591fd7e019 RDI: 00007ffd6d51c9f0
[ 898.372817] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd6d51c7c0
[ 898.372824] R10: 00007ffd6d51c677 R11: 0000000000000206 R12: 0000000000000001
[ 898.372833] R13: 0000000000000001 R14: 0000000000000001 R15: 00007ffd6d51c9f0
[ 898.372846]
[ 898.393620] ------------[ cut here ]------------
[ 898.407139] WARNING: kernel/rcu/tree_plugin.h:443 at __rcu_read_unlock+0x25f/0x5c0, CPU#1: syz-executor.2/8205
[ 898.438324] Modules linked in:
[ 898.438625] CPU: 1 UID: 0 PID: 8205 Comm: syz-executor.2 Not tainted 6.19.0-rc5-next-20260116 #1 PREEMPT(lazy)
[ 898.462236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 898.482408] RIP: 0010:__rcu_read_unlock+0x25f/0x5c0
[ 898.498439] Code: f2 02 00 00 c7 43 58 01 00 00 00 bf 09 00 00 00 e8 d6 b7 de ff 4d 85 f6 0f 84 73 fe ff ff e8 38 8a 20 00 fb e9 68 fe ff ff 90 <0f> 0b 90 5b 5d 41 5c 41 5d 41 5e e9 81 4d 74 03 e8 2c 5d 56 00 e9
[ 898.525766] RSP: 0018:ffff88801dcbf9a0 EFLAGS: 00010286
[ 898.547702] RAX: 00000000ffffffff RBX: ffff88800f60d280 RCX: ffffffff815660f7
[ 898.565339] RDX: 0000000000000000 RSI: ffffffff81566100 RDI: ffff88800f60d67c
[ 898.586668] RBP: ffff88800f60d280 R08: 0000000000000000 R09: fffffbfff0ba7040
[ 898.604957] R10: 0000000000000000 R11: fffffffffffee010 R12: ffff88800f60d280
[ 898.605530] R13: 0000000000000001 R14: ffffffff85c0f9f0 R15: ffff88804a468318
[ 898.624660] FS: 0000555580a36400(0000) GS:ffff8880e5442000(0000) knlGS:0000000000000000
[ 898.644019] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 898.644480] CR2: 00007f591fda3542 CR3: 000000001d530000 CR4: 0000000000350ef0
[ 898.659244] Call Trace:
[ 898.659484]
[ 898.688297] __wait_on_freeing_inode+0x10f/0x350
[ 898.712134] ? __pfx___wait_on_freeing_inode+0x10/0x10
[ 898.735542] ? __pfx_var_wake_function+0x10/0x10
[ 898.778754] ? lock_is_held_type+0x9e/0x120
[ 898.802769] insert_inode_locked+0x25f/0x890
[ 898.849795] __ext4_new_inode+0x223d/0x4cd0
[ 898.973214] ? __pfx___ext4_new_inode+0x10/0x10
[ 899.017468] ? __pfx___dquot_initialize+0x10/0x10
[ 899.036876] ? __pfx_avc_has_perm+0x10/0x10
[ 899.038698] ext4_symlink+0x623/0xb40
[ 899.040924] ? __pfx_ext4_symlink+0x10/0x10
[ 899.041936] ? security_inode_permission+0x72/0xe0
[ 899.043530] vfs_symlink+0x44b/0x840
[ 899.044796] filename_symlinkat+0x158/0x440
[ 899.045963] ? __pfx_filename_symlinkat+0x10/0x10
[ 899.046693] ? strncpy_from_user+0x21b/0x2f0
[ 899.048561] __x64_sys_symlink+0x82/0x110
[ 899.049314] do_syscall_64+0xbf/0x420
[ 899.050125] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 899.050639] RIP: 0033:0x7f591fd23427
[ 899.051047] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 899.052540] RSP: 002b:00007ffd6d51c928 EFLAGS: 00000206 ORIG_RAX: 0000000000000058
[ 899.053201] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f591fd23427
[ 899.053776] RDX: 00007ffd6d51ca07 RSI: 00007f591fd7e019 RDI: 00007ffd6d51c9f0
[ 899.054401] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd6d51c7c0
[ 899.055013] R10: 00007ffd6d51c677 R11: 0000000000000206 R12: 0000000000000001
[ 899.055585] R13: 0000000000000001 R14: 0000000000000001 R15: 00007ffd6d51c9f0
[ 899.058244]
[ 899.058441] irq event stamp: 175
[ 899.058711] hardirqs last enabled at (175): [] _raw_spin_unlock_irqrestore+0x2c/0x50
[ 899.059548] hardirqs last disabled at (174): [] _raw_spin_lock_irqsave+0x53/0x60
[ 899.060354] softirqs last enabled at (170): [] kernel_fpu_end+0x59/0x70
[ 899.061108] softirqs last disabled at (168): [] kernel_fpu_begin_mask+0x1bb/0x300
[ 899.061878] ---[ end trace 0000000000000000 ]---
[ 899.110454] loop2: detected capacity change from 0 to 16
[ 899.119126] FAT-fs (loop2): bogus number of reserved sectors
[ 899.120723] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 899.131293] loop2: detected capacity change from 0 to 16
07:40:50 executing program 5:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 84)
07:40:50 executing program 2:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2630, 0x2, &(0x7f0000000640)=[{0x0}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:50 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x900, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:50 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 64)
07:40:50 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:50 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:50 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
07:40:50 executing program 1:
perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82000, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x100, 0xe}, 0x0, 0xfffffffffdffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='ns/uts\x00')
[ 906.568967] No source specified
[ 906.572389] FAT-fs (loop6): unable to read boot sector
[ 906.573872] FAT-fs (loop7): unable to read boot sector
[ 906.581328] FAT-fs (loop0): unable to read boot sector
[ 906.583075] loop4: detected capacity change from 0 to 4
[ 906.588746] loop2: detected capacity change from 0 to 19
[ 906.600073] FAT-fs (loop4): bogus number of reserved sectors
[ 906.601178] FAT-fs (loop4): Can't find a valid FAT filesystem
[ 906.604213] FAT-fs (loop5): unable to read boot sector
07:40:50 executing program 6:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}]})
[ 906.615082] FAT-fs (loop2): bogus number of reserved sectors
[ 906.616032] FAT-fs (loop2): Can't find a valid FAT filesystem
[ 906.620781] loop4: detected capacity change from 0 to 4
07:40:50 executing program 7:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp864'}}]})
07:40:50 executing program 0:
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000640)=[{&(0x7f0000000180)}, {0x0}], 0x10080, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp869'}}, {@iocharset={'iocharset', 0x3d, 'cp864'}}]}) (fail_nth: 65)
07:40:50 executing program 1:
r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00')
ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000100)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}})
[ 906.653078] FAT-fs (loop7): unable to read boot sector
[ 906.655782] FAT-fs (loop6): unable to read boot sector
[ 906.671309] FAT-fs (loop7): unable to read boot sector
[ 906.676303] FAT-fs (loop0): unable to read boot sector
VM DIAGNOSIS:
07:40:42 Registers:
info registers vcpu 0
RAX=0000000000000000 RBX=0000000000000001 RCX=0000000000000002 RDX=0000000000000000
RSI=0000000000000000 RDI=ffffffff885e5288 RBP=ffffffff885e5288 RSP=ffff88806ce08cb8
R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000000 R11=ffff88806ce08ff8
R12=0000000000000002 R13=0000000000000000 R14=0000000000000000 R15=dffffc0000000000
RIP=ffffffff815c00b0 RFL=00000047 [---Z-PC] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000000000000000 00000000 00000000
GS =0000 ffff8880e5342000 00000000 00000000
LDT=0000 fffffe7c00000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=000055c56d4fbf48 CR3=000000000d2c4000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525
XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000
XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
info registers vcpu 1
RAX=0000000000000078 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff82975135 RDI=ffffffff889c19e0 RBP=ffffffff889c19a0 RSP=ffff88806cf08938
R8 =0000000000000000 R9 =ffffed10016e6046 R10=0000000000000078 R11=7866705f5f203f20
R12=0000000000000078 R13=0000000000000010 R14=ffffffff889c19a0 R15=ffffffff82975120
RIP=ffffffff8297518d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 0000555580a36400 00000000 00000000
GS =0000 ffff8880e5442000 00000000 00000000
LDT=0000 fffffe6a00000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=00007f591fda3542 CR3=000000001d530000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000a60ce07b00000000cec3662e XMM01=000000000000000003515b82db34ca11
XMM02=0000000000000000333bebdfd0a6a21d XMM03=00000000000000000000000000000000
XMM04=000000ff0000000000000000000000ff XMM05=00000000000000000000000000000000
XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000